{"id":"https://openalex.org/W2948458318","doi":"https://doi.org/10.1109/access.2019.2920956","title":"A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things","display_name":"A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2948458318","doi":"https://doi.org/10.1109/access.2019.2920956","mag":"2948458318"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2920956","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08731888.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08731888.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006872172","display_name":"Ruohan Meng","orcid":"https://orcid.org/0000-0003-4221-0842"},"institutions":[{"id":"https://openalex.org/I4210123196","display_name":"Zhejiang Environmental Monitoring Center","ror":"https://ror.org/02n2ntt72","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210123196"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruohan Meng","raw_affiliation_strings":["Jiangsu Engineering Centre of Network Monitoring, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Engineering Centre of Network Monitoring, Nanjing, China","institution_ids":["https://openalex.org/I4210123196"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011131365","display_name":"Qi Cui","orcid":"https://orcid.org/0000-0002-0282-9758"},"institutions":[{"id":"https://openalex.org/I4210123196","display_name":"Zhejiang Environmental Monitoring Center","ror":"https://ror.org/02n2ntt72","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210123196"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Cui","raw_affiliation_strings":["Jiangsu Engineering Centre of Network Monitoring, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Engineering Centre of Network Monitoring, Nanjing, China","institution_ids":["https://openalex.org/I4210123196"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089418255","display_name":"Zhili Zhou","orcid":"https://orcid.org/0000-0002-5641-7169"},"institutions":[{"id":"https://openalex.org/I4210123196","display_name":"Zhejiang Environmental Monitoring Center","ror":"https://ror.org/02n2ntt72","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210123196"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhili Zhou","raw_affiliation_strings":["Jiangsu Engineering Centre of Network Monitoring, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Engineering Centre of Network Monitoring, Nanjing, China","institution_ids":["https://openalex.org/I4210123196"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066341740","display_name":"Zhangjie Fu","orcid":"https://orcid.org/0000-0002-4363-2521"},"institutions":[{"id":"https://openalex.org/I4210123196","display_name":"Zhejiang Environmental Monitoring Center","ror":"https://ror.org/02n2ntt72","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210123196"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhangjie Fu","raw_affiliation_strings":["Jiangsu Engineering Centre of Network Monitoring, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Engineering Centre of Network Monitoring, Nanjing, China","institution_ids":["https://openalex.org/I4210123196"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100388504","display_name":"Xingming Sun","orcid":"https://orcid.org/0000-0001-7982-726X"},"institutions":[{"id":"https://openalex.org/I4210123196","display_name":"Zhejiang Environmental Monitoring Center","ror":"https://ror.org/02n2ntt72","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210123196"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingming Sun","raw_affiliation_strings":["Jiangsu Engineering Centre of Network Monitoring, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Engineering Centre of Network Monitoring, Nanjing, China","institution_ids":["https://openalex.org/I4210123196"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"fwci":2.029,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.828105,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"7","issue":null,"first_page":"90574","last_page":"90584"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.94674575},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.68023586},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.6329577},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.4691604}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.94674575},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.88294506},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8571951},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.68023586},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.6329577},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5515558},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5280676},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5118515},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4807227},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.4691604},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.44240806},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41933793},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38764983},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33233538},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32268357},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1340656},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.09845865},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07969886},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2920956","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08731888.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/72035537597a4dd7a2f6c5061b30adb0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2920956","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08731888.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.76,"display_name":"Peace, justice, and strong institutions"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61672294"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1836208"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61602253"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1836110"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1536206"}],"datasets":[],"versions":[],"referenced_works_count":55,"referenced_works":["https://openalex.org/W1955882805","https://openalex.org/W1994582915","https://openalex.org/W2009130368","https://openalex.org/W2024823793","https://openalex.org/W2046180645","https://openalex.org/W2102511552","https://openalex.org/W2108598243","https://openalex.org/W2124325062","https://openalex.org/W2125389028","https://openalex.org/W2129533588","https://openalex.org/W2133274310","https://openalex.org/W2170598445","https://openalex.org/W2183341477","https://openalex.org/W22271197","https://openalex.org/W2292976057","https://openalex.org/W2416075718","https://openalex.org/W2502312327","https://openalex.org/W2512120017","https://openalex.org/W2515172089","https://openalex.org/W2539862077","https://openalex.org/W2542290803","https://openalex.org/W2587027871","https://openalex.org/W2605121773","https://openalex.org/W2611984554","https://openalex.org/W2749509372","https://openalex.org/W2771036112","https://openalex.org/W2774208477","https://openalex.org/W2779237383","https://openalex.org/W2785985841","https://openalex.org/W2799062770","https://openalex.org/W2802292638","https://openalex.org/W2805209699","https://openalex.org/W2809443788","https://openalex.org/W2810607117","https://openalex.org/W2900501183","https://openalex.org/W2900510321","https://openalex.org/W2914227139","https://openalex.org/W2930279444","https://openalex.org/W2942694278","https://openalex.org/W2949882016","https://openalex.org/W2962793481","https://openalex.org/W2963073614","https://openalex.org/W2963344645","https://openalex.org/W2963373786","https://openalex.org/W2963684088","https://openalex.org/W2963684405","https://openalex.org/W2963767194","https://openalex.org/W2963800363","https://openalex.org/W2964267196","https://openalex.org/W2969121634","https://openalex.org/W2995820148","https://openalex.org/W3105479728","https://openalex.org/W4295274059","https://openalex.org/W4301206121","https://openalex.org/W4320013936"],"related_works":["https://openalex.org/W2497446005","https://openalex.org/W2370747589","https://openalex.org/W2166431153","https://openalex.org/W2158736088","https://openalex.org/W2154118756","https://openalex.org/W1974279004","https://openalex.org/W1965991389","https://openalex.org/W1716757876","https://openalex.org/W1659544335","https://openalex.org/W129330134"],"abstract_inverted_index":{"With":[0],"the":[1,5,10,31,46,51,89,96,104,117,120,124,127,153],"wide":[2],"application":[3],"of":[4,7,12,45,53,95,107,119],"Internet":[6],"Things":[8],"(IoT),":[9],"risk":[11],"data":[13,28],"leakage":[14],"and":[15,57,82,92,138],"theft":[16],"in":[17,27,39,113],"IoT":[18,32],"is":[19,25,43,100],"gradually":[20],"increasing":[21],"since":[22],"communication":[23,91],"channel":[24],"public":[26],"transmission.":[29],"Thus,":[30],"security":[33],"has":[34,148],"become":[35],"a":[36,70,149],"major":[37],"problem":[38],"information":[40],"security.":[41],"Steganography":[42],"one":[44],"key":[47],"methods":[48],"to":[49,62,85,88,102,135],"solve":[50],"problems":[52],"personal":[54],"privacy":[55,93],"disclosure":[56],"covert":[58,90],"communication.":[59],"In":[60],"order":[61],"make":[63],"sure":[64],"secure":[65],"communications,":[66],"this":[67,146],"paper":[68],"proposes":[69],"novel":[71],"steganography":[72,80],"algorithm":[73],"based":[74],"on":[75],"image-to-image":[76],"translation":[77],"by":[78,133],"adding":[79],"module":[81,84],"steganalysis":[83,132],"CycleGAN,":[86],"adapting":[87],"preserving":[94],"IoT.":[97],"Steganalysis":[98],"network":[99],"used":[101],"improve":[103],"anti-detection":[105],"ability":[106],"stego":[108,128],"image.":[109,122],"Moreover,":[110],"cycle":[111],"consistent":[112],"CycleGAN":[114],"can":[115,130],"guarantee":[116],"quality":[118],"generated":[121],"Through":[123],"proposed":[125],"scheme,":[126],"image":[129],"resist":[131],"monitors":[134],"some":[136],"extent":[137],"remain":[139],"intact.":[140],"The":[141],"experimental":[142],"results":[143],"show":[144],"that":[145],"method":[147],"better":[150],"performance":[151],"than":[152],"state-of-the-art":[154],"approach.":[155]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2948458318","counts_by_year":[{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":3}],"updated_date":"2024-12-09T07:02:03.993558","created_date":"2019-06-14"}