Peer Review History

Original SubmissionApril 22, 2024
Decision Letter - Feng Ding, Editor

PONE-D-24-16179Image Steganography Without Embedding by Carrier Secret Information for Secure Communication in NetworksPLOS ONE

Dear Dr. Chen,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Jul 18 2024 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.
  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.
  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Feng Ding

Academic Editor

PLOS ONE

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Please note that funding information should not appear in any section or other areas of your manuscript. We will only publish funding information present in the Funding Statement section of the online submission form. Please remove any funding-related text from the manuscript.

3. Thank you for stating the following financial disclosure: 

   "This research was supported by Foundation of National Natural Science Foundation of China (62202118), and Scientific and Technological Research Projects from Guizhou Education Department (Qian jiao ji [2023]003 ), 

and Provincial Department of Science and Technology's Hundred level Innovation Talents Project (Guizhou Science and Technology Cooperation Platform Talents-GCC [2023] 018), Guizhou Province Major Project 

(Qiankehe Major Project No. [2024] 003), and Top Technology Talent Project from Guizhou Education Department (Qian jiao ji [2022]073). (By Corresponding authors: Yuling Chen). Guizhou Provincial Basic Research Program(Natural Science):ZK[2024](652) and Science and Technology Program of GuiYang:(ZK[2024]-1-2). (by Authors: Haiwei Sang)"

Please state what role the funders took in the study.  If the funders had no role, please state: "The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript." 

If this statement is not correct you must amend it as needed. 

Please include this amended Role of Funder statement in your cover letter; we will change the online submission form on your behalf.

4. We note that your Data Availability Statement is currently as follows: All relevant data are within the manuscript and its Supporting Information files.

Please confirm at this time whether or not your submission contains all raw data required to replicate the results of your study. Authors must share the “minimal data set” for their submission. PLOS defines the minimal data set to consist of the data required to replicate all study findings reported in the article, as well as related metadata and methods (https://journals.plos.org/plosone/s/data-availability#loc-minimal-data-set-definition).

For example, authors should submit the following data:

- The values behind the means, standard deviations and other measures reported;

- The values used to build graphs;

- The points extracted from images for analysis.

Authors do not need to submit their entire data set if only a portion of the data was used in the reported study.

If your submission does not contain these data, please either upload them as Supporting Information files or deposit them to a stable, public repository and provide us with the relevant URLs, DOIs, or accession numbers. For a list of recommended repositories, please see https://journals.plos.org/plosone/s/recommended-repositories.

If there are ethical or legal restrictions on sharing a de-identified data set, please explain them in detail (e.g., data contain potentially sensitive information, data are owned by a third-party organization, etc.) and who has imposed them (e.g., an ethics committee). Please also provide contact information for a data access committee, ethics committee, or other institutional body to which data requests may be sent. If data are owned by a third party, please indicate how others may request data access.

5. We note that Figure 1,2 and 6 includes an image of a participant in the study. 

As per the PLOS ONE policy (http://journals.plos.org/plosone/s/submission-guidelines#loc-human-subjects-research) on papers that include identifying, or potentially identifying, information, the individual(s) or parent(s)/guardian(s) must be informed of the terms of the PLOS open-access (CC-BY) license and provide specific permission for publication of these details under the terms of this license. Please download the Consent Form for Publication in a PLOS Journal (http://journals.plos.org/plosone/s/file?id=8ce6/plos-consent-form-english.pdf). The signed consent form should not be submitted with the manuscript, but should be securely filed in the individual's case notes. Please amend the methods section and ethics statement of the manuscript to explicitly state that the patient/participant has provided consent for publication: “The individual in this manuscript has given written informed consent (as outlined in PLOS consent form) to publish these case details”. 

If you are unable to obtain consent from the subject of the photograph, you will need to remove the figure and any other textual identifying information or case descriptions for this individual.

6. Please remove your figures from within your manuscript file, leaving only the individual TIFF/EPS image files, uploaded separately. These will be automatically included in the reviewers’ PDF.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #2: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: 1. The abstract needs substential revision. Please write the abstact as: 2 lines with introducing the work, next 2 lines with presenting the peoblem and objectives, and then 2-3 lines discussing the methods and results.

2. The literature review needs to be strenghtened.

3. The research issue and objective of the work is missing.

4. The recnt and related works should be discussed with its merits and issues: DOI: 10.4018/IJDCF.318666, https://doi.org/10.1007/s12652-021-03365-9, https://doi.org/10.3390/electronics12051222, Digital image steganography techniques in spatial domain: A study, https://doi.org/10.1016/j.jisa.2023.103541

5. Present the embedding and extraction process in an algorithmic way.

6. Provide numerical illustration.

7. Validate the results with proper experimentation and sufficient performance measuring parameters.

8. Mention the limitation and implications.

Reviewer #2: The manuscript presents a novel approach to image steganography without embedding by utilizing carrier secret information for secure communication. The method leverages the Wasserstein distance and weight clipping to enhance the capacity and accuracy of secret data extraction while maintaining image quality. In general, the manuscript is well-structured and also provides a comprehensive experimental evaluation. However, several areas require improvement for clarity and completeness.

1. There are several grammatical errors and awkward phrasings throughout the manuscript. A thorough proofreading is necessary to improve readability. For example, "the covert information can increase the covert information capacity of steganography" could be rephrased for clarity.

2. Ensure that all figures and tables are correctly labeled and referenced in the text. Some figures are referenced in a way that is not immediately clear.

3. The related work section is comprehensive but could benefit from a more critical analysis of the limitations of existing methods. This would better highlight the novelty and advantages of the proposed approach. Besides, the title of Section 2.2 does not align with the content discussed. It is suggested to refine the title to better reflect the scope of the section, e.g., Image Steganography Based on Cover Generation.

4. The introduction should provide a clearer motivation. Why is the proposed method important, and what specific gap does it fill in the current literature?

5. The terminologies should be standardized, e.g., "picture" should be consistently referred to as "image."

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Revision 1

RESPONSE LETTER

Manuscript Number: PONE-D-24-16179

Title: “Image steganography without embedding by carrier secret information for secure communication in networks”

Authors: Yangwen Zhang, Yuling Chen, Hui Dou, Chaoyue Tan, Yun Luo, Haiwei Sang

Dear editor and reviewers,

Thank you very much for your time involved in reviewing the manuscript. On behalf of all the contributing authors, I would like to express our sincere appreciations of your constructive comments concerning our article entitled “Image Steganography Without Embedding by Carrier Secret Information for Secure Communication in Networks” (Manuscript No.: PONE-D-24-16179). These comments are all valuable and helpful for improving our article. According to your comments, we have made extensive modifications to our manuscript to make our results convincing.

In addition, we promise to continuously revise our paper until all reviewers and the editor are satisfied. The following are the comments, our responses, and the detailed revisions that we have made. Finally, we would like to thank all of you very much for your constructive comments and positive support for this manuscript.

Response to Reviewers:

Response to Review 1

Comment 1: The abstract needs substential revision. Please write the abstact as: 2 lines with introducing the work, next 2 lines with presenting the peoblem and objectives, and then 2-3 lines discussing the methods and results.

Response 1: Thank you very much for the reviewers' suggestions. In response to your question, we have carefully revised the abstract section of the article. The first 2 lines introduced the work of image without embedding steganography. In the next 2 lines, we will introduce the existing problems of image without embedding steganography and the objectives of this article. In the last 3 lines, we discussed the method proposed in this article and its effectiveness. With the following modifications in the manuscript:

(Abstract) (Page 1)

Steganography, the use of algorithms to embed secret information in a carrier image, is widely used in the field of information transmission, but steganalysis tools built using traditional steganographic algorithms can easily identify them. Steganography without embedding (SWE) can effectively resist detection by steganography analysis tools by mapping noise onto secret information and generating secret images from secret noise. However, most SWE still have problems with the small capacity of steganographic data and the difficulty of extracting the data. Based on the above problems, this paper proposes image steganography without embedding carrier secret information. The objective of this approach is to enhance the capacity of secret information and the accuracy of secret information extraction for the purpose of improving the performance of security network communication. The proposed technique exploits the carrier characteristics to generate the carrier secret tensor, which improves the accuracy of information extraction while ensuring the accuracy of secret information extraction. Furthermore, the Wasserstein distance is employed as a constraint for the discriminator, and weight clipping is introduced to enhance the secret information capacity and extraction accuracy. Experimental results show that the proposed method can improve the data extraction accuracy by 10.03% at the capacity of 2304 bits, which verifies the effectiveness and universality of the method. The research presented here introduces a new intelligent information steganography secure communication model for secure communication in networks, which can improve the information capacity and extraction accuracy of image steganography without embedding.

Comment 2: The literature review needs to be strenghtened.

Response 2: Thank you very much for your suggestions. Based on your suggestion, we have made modifications and enhancements to the literature review section. It mainly enriches the content of the literature review and expresses the advantages and limitations of its work on the content of the literature review. In addition, we also discussed the advantages and limitations of existing work in related work to enhance the novelty and advantages of the proposed methods in the manuscript. The corresponding changes in the manuscript are as follows:

(Lines 2 to 11) (Page 1)

Information hiding techniques include steganography [1, 2] and watermarking [3, 4]. Digital watermarking is the process of embedding a watermark into a cover image by means of an algorithm or a deep neural network, which is used to protect the copyright of an image without the human eye being able to detect the watermark. Aditya [4] proposes a logistic map based fragile watermarking technique, which takes advantage of the sensitivity property of the logistic map to generate the watermark bits. Steganography is the process of hiding secret messages within a medium to create a steganographic carrier, which is then used to secure communication in networks [5], where steganography using images as the carrier medium is known as image steganography.

(Lines 64 to 66 and Lines 84 to 104) (Page 3)

The first strategy is to generate the corresponding hash sequences [17, 18] through a mapping association mechanism that involves the secret message and the set of available images.

The majority of existing SWE methods are afflicted by a number of shortcomings. These include the quality of steganographic images, which is often insufficient to achieve the desired effect of cover images; the capacity of steganographic information in steganographic images, which is often limited; and the accuracy of steganographic information extraction, which is frequently inadequate. Inspired by [22], we propose the carrier secret message method, which introduces a carrier component into the process of mapping secret message to secret noise. The properties of the carrier component enable the generation of carrier secret noise, which in turn enhances the capacity of the secret message to generate steganography images. Martin et al. [23] proposed that the Wasserstein distance enables the computation of the full set of all possible joint distributions. This allows for the estimation of the expected distance between samples to the distribution of the dataset, even when the data is unevenly distributed. Inspired by [24], we use the Wasserstein distance is integrated into the loss function of the discriminator. This enables us to assess the joint distribution between the cover image and the generated image, thereby enabling the generator to balance the quality of the steganographic image and the steganographic capacity of the secret message. Furthermore, inspired by [25], we believe that it is difficult for an unconstrained discriminator to balance the relationship between the quality of the generated image and the accuracy of secret message extraction. In order to address this issue, we use weight clipping, which enables the generated image to achieve a balance between the quality of the generated image and the accuracy of secret message extraction.

(Lines 135 to 182) (Page 4),

With the increasing awareness of network user security, secure network communication [27, 28] of message has received widespread attention. Image steganography has received widespread attention from scholars due to its characteristics. At the present time, two main types of image steganography [29]: traditional image steganography and deep learning [30, 31] based image steganography. Image steganography is able to hide secret message in cover images. It is a widely employed method in the fields of message security transmission [32–34], privacy protection [35], and copyright protection [36].

Ma et al. [37] proposed a hierarchical embedding RDHEI method that is capable of generating hierarchical labels from plaintext image distributions. This method categorizes hierarchical labels into three distinct categories: small, medium, and large. The labels are then used to categorize the types of plaintext images. Through predictive technology, hierarchical label maps are calculated before image steganographic embedding can increase the payload capacity while ensuring full reversibility of data. The secret information is precompressed and embedded into the carrier image. In comparison to previous spatial domain technologies, the RDHEI method of hierarchical embedding exhibits a higher load capacity. However, the method employs image steganography in the spatial domain, which will result in the loss of secret information in the steganography image if robustness attacks are performed on the steganography image.

The traditional image steganography of frequency domain transformation hides the secret data within the frequency domain of the cover image, which can significantly decrease the drop of secret data caused by robustness attacks. Giboulot Q et al [38] propose JPEG-based steganography and quantization table modification, by segmenting the carrier image into 8x8 pixel non-overlapping blocks and converting each non-overlapping into DCT coefficient by DCT respectively and designing an encryption algorithm for information encryption to become secret information. Conversion of spatial domain into frequency domain into 2D cosine wave. The secret information is then concealed within the DCT ratio, according to a pre-designed algorithm. However, the method generates steganography images that are susceptible to being identified by a steganography analysis tool when the method is subjected to a deep neural network steganography analysis tool that has been trained against it will leading to insecure transmission of secret information.

Mandal P C et al. [39] proposed an integer wavelet transform (IWT)-based steganography that uses the LSB method and coefficient value difference to utilize wavelet coefficients in approximate and diagonal subbands and in horizontal and vertical subbands, respectively. Since the perceptual range of the low-frequency coefficient is highly sensitive to the human eye, in this method, a small amount of secret information is embeded in the low-frequency coefficient to reduce the imperceptibility of the hidden image to the human eye after the image is hidden, and the threshold is set to ensure that the generated steganographic image has better visual quality. Nevertheless, the quality of the steganography image is guaranteed by the threshold setting method employed in the method, which results in the overall scheme being overly reliant on the expertise of the experts, thereby reducing its versatility.

3. Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using interpolation technique. IEEE Transactions on information forensics and security. 2009;5(1):187–193.

4. Sahu AK. A logistic map based blind and fragile watermarking for tamper detection and localization in images. Journal of Ambient Intelligence and Humanized Computing. 2022;13(8):3869–3881

17. Zhang X, Peng F, Long M. Robust coverless image steganography based on DCT and LDA topic classification. IEEE Transactions on Multimedia. 2018;20(12):3223–3238.

18. Zou L, Sun J, Gao M, Wan W, Gupta BB. A novel coverless information hiding method based on the average pixel value of the sub-images. Multimedia tools and applications. 2019;78:7965–7980.

22. Ren W, Xu Y, Zhai L, Wang L, Jia J. Fast carrier selection of JPEG steganography appropriate for application. Tsinghua Science and Technology. 2020;25(5):614–624.

23. Arjovsky M, Chintala S, Bottou L. Wasserstein GAN. 2017;.

24. Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville AC. Improved training of wasserstein gans. Advances in neural information processing systems. 2017;30.

35. Sahu AK, Gutub A. Improving grayscale steganography to protect personal information disclosure within hotel services. Multimedia Tools and Applications. 2022;81(21):30663–30683.

36. Sahu AK, Sahu M, Patro P, Sahu G, Nayak SR. Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Analysis and Applications. 2023;26(2):571–590.

Comment 3: The research issue and objective of the work is missing.

Response 3: Many thanks to the reviewers for their suggestions, which have greatly enhanced our article.

Based on your feedback, we have added the research questions and objectives of this work in the introduction section. Our work mainly focuses on the research problem of low secret information capacity and poor extraction accuracy in the field of image steganography without embedding. Our work can improve the capacity and extraction accuracy of secret information while ensuring certain security conditions. Specific changes in the manuscript are listed below:

(Lines 12 to 25) (Page 2)

In the field of steganography without embedding, steganography without embedding is able to effectively resist the recognition of steganography analysis tools due to the fact that it does not directly employ the embedding of secret message into the cover image, thus achieving the purpose of securely transmitting information. The field of image steganography without embedding has attracted considerable interest among researchers due to its characteristics. However, the majority of studies on image steganography without embedding have been unable to effectively enhance the capacity and extraction accuracy of secret message while maintaining security. Previous methods have been to have limitations in terms of image distortion and the accuracy of message extraction, particularly when dealing with large capacities of steganographic message. This has led to a reduction in the usability of image steganography without embedding. This paper examines the potential of image steganography without embedding, with the objective of enhancing the capacity and extraction accuracy of secret message while maintaining a certain level of security.

Comment 4: The recent and related works should be discussed with its merits and issues: DOI: 10.4018/IJDCF.318666, https://doi.org/10.1007/s12652-021-03365-9, https://doi.org/10.3390/electronics12051222, Digital image steganography techniques in spatial domain: A study, https://doi.org/10.1016/j.jisa.2023.103541

Response 4: Thank you very much for the problems pointed out by the reviewers, which have greatly contributed to enhancing our article. Based on your feedback, carefully read the work of the above article and discuss its advantages and issues in our manuscript. In addition, we have read the follow-up work of the aforementioned paper, including DOI: https://doi.org/10.1016/j.jksuci.2019.07.004, https://doi.org/10.1007/s11042-022-13015-7, and https://doi.org/10.1007/s10044-022-01104-0, and also discussed the advantages and issues of their work in the manuscript. Specific changes in the manuscript are listed below:

(Lines 2 to 11) (Page 1)

Information hiding techniques include steganography [1, 2] and watermarking [3, 4]. Digital watermarking is the process of embedding a watermark into a cover image by means of an algorithm or a deep neural network, which is used to protect the copyright of an image without the human eye being able to detect the watermark. Aditya [4] proposes a logistic map based fragile watermarking technique, which takes advantage of the sensitivity property of the logistic map to generate the watermark bits. Steganography is the process of hiding secret messages within a medium to create a steganographic carrier, which is then used to secure communication in networks [5], where steganography using images as the carrier medium is known as image steganography.

(Lines 26 to 45) (Page 2)

Traditional image steganography is mainly based on algorithms for embedding of secret information into the carrier image, which is the main part of image steganography. The embedding method is divided into the spatial domain and frequency domain. Representatives of traditional steganography in the spatial domain are the LSB [6, 7], SUNIWARD [8]. Samar et al. [9] proposed a data hiding method that exploits the low embedding capacity and high variability properties of block-wise histogram shifting, thereby enhancing the robustness and embedding capacity of steganography. However, the spatial domain image steganography method will cause the pixel to change v

Attachments
Attachment
Submitted filename: Response to Reviewers.docx
Decision Letter - Feng Ding, Editor

Image steganography without embedding by carrier secret information for secure communication in networks

PONE-D-24-16179R1

Dear Dr. Chen,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice will be generated when your article is formally accepted. Please note, if your institution has a publishing partnership with PLOS and your article meets the relevant criteria, all or part of your publication costs will be covered. Please make sure your user information is up-to-date by logging into Editorial Manager at Editorial Manager® and clicking the ‘Update My Information' link at the top of the page. If you have any questions relating to publication charges, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Feng Ding

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #2: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: The authors have made significant improvements in the revised manuscript. I am now recomending to accept the work.

Reviewer #2: (No Response)

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

**********

Formally Accepted
Acceptance Letter - Feng Ding, Editor

PONE-D-24-16179R1

PLOS ONE

Dear Dr. Chen,

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now being handed over to our production team.

At this stage, our production department will prepare your paper for publication. This includes ensuring the following:

* All references, tables, and figures are properly cited

* All relevant supporting information is included in the manuscript submission,

* There are no issues that prevent the paper from being properly typeset

If revisions are needed, the production department will contact you directly to resolve them. If no revisions are needed, you will receive an email when the publication date has been set. At this time, we do not offer pre-publication proofs to authors during production of the accepted work. Please keep in mind that we are working through a large volume of accepted articles, so please give us a few weeks to review your paper and let you know the next and final steps.

Lastly, if your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

If we can help with anything else, please email us at customercare@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Feng Ding

Academic Editor

PLOS ONE

Open letter on the publication of peer review reports

PLOS recognizes the benefits of transparency in the peer review process. Therefore, we enable the publication of all of the content of peer review and author responses alongside final, published articles. Reviewers remain anonymous, unless they choose to reveal their names.

We encourage other journals to join us in this initiative. We hope that our action inspires the community, including researchers, research funders, and research institutions, to recognize the benefits of published peer review reports for all parts of the research system.

Learn more at ASAPbio .