Image Steganography For Securing Intellicise Wireless Networks: "Invisible Encryption" Against Eavesdroppers Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2505.04467
As one of the most promising technologies for intellicise (intelligent and consice) wireless networks, Semantic Communication (SemCom) significantly improves communication efficiency by extracting, transmitting, and recovering semantic information, while reducing transmission delay. However, an integration of communication and artificial intelligence (AI) also exposes SemCom to security and privacy threats posed by intelligent eavesdroppers. To address this challenge, image steganography in SemCom embeds secret semantic features within cover semantic features, allowing intelligent eavesdroppers to decode only the cover image. This technique offers a form of "invisible encryption" for SemCom. Motivated by these advancements, this paper conducts a comprehensive exploration of integrating image steganography into SemCom. Firstly, we review existing encryption techniques in SemCom and assess the potential of image steganography in enhancing its security. Secondly, we delve into various image steganographic paradigms designed to secure SemCom, encompassing three categories of joint source-channel coding (JSCC) models tailored for image steganography SemCom, along with multiple training strategies. Thirdly, we present a case study to illustrate the effectiveness of coverless steganography SemCom. Finally, we propose future research directions for image steganography SemCom.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2505.04467
- https://arxiv.org/pdf/2505.04467
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W4416013654
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4416013654Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2505.04467Digital Object Identifier
- Title
-
Image Steganography For Securing Intellicise Wireless Networks: "Invisible Encryption" Against EavesdroppersWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-05-07Full publication date if available
- Authors
-
Bizhu Wang, Song Gao, Rui Meng, Haixiao Gao, Xiaodong Xu, Mengying Sun, Dong Chen, Ping Zhang, Dusit NiyatoList of authors in order
- Landing page
-
https://arxiv.org/abs/2505.04467Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2505.04467Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2505.04467Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W4416013654 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2505.04467 |
| ids.doi | https://doi.org/10.48550/arxiv.2505.04467 |
| ids.openalex | https://openalex.org/W4416013654 |
| fwci | |
| type | preprint |
| title | Image Steganography For Securing Intellicise Wireless Networks: "Invisible Encryption" Against Eavesdroppers |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2505.04467 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2505.04467 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2505.04467 |
| locations[1].id | doi:10.48550/arxiv.2505.04467 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2505.04467 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5017735092 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9259-9126 |
| authorships[0].author.display_name | Bizhu Wang |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Wang, Bizhu |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5101864982 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Song Gao |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Gao, Song |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5023884578 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-0486-1409 |
| authorships[2].author.display_name | Rui Meng |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Meng, Rui |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5110165444 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Haixiao Gao |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Gao, Haixiao |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5061030501 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-4245-5989 |
| authorships[4].author.display_name | Xiaodong Xu |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Xu, Xiaodong |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5029818822 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-1137-7546 |
| authorships[5].author.display_name | Mengying Sun |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Sun, Mengying |
| authorships[5].is_corresponding | False |
| authorships[6].author.id | https://openalex.org/A5101487157 |
| authorships[6].author.orcid | https://orcid.org/0000-0003-0588-9331 |
| authorships[6].author.display_name | Dong Chen |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | Dong, Chen |
| authorships[6].is_corresponding | False |
| authorships[7].author.id | https://openalex.org/A5100405787 |
| authorships[7].author.orcid | https://orcid.org/0000-0002-0269-104X |
| authorships[7].author.display_name | Ping Zhang |
| authorships[7].author_position | middle |
| authorships[7].raw_author_name | Zhang, Ping |
| authorships[7].is_corresponding | False |
| authorships[8].author.id | https://openalex.org/A5091266202 |
| authorships[8].author.orcid | https://orcid.org/0000-0002-7442-7416 |
| authorships[8].author.display_name | Dusit Niyato |
| authorships[8].author_position | last |
| authorships[8].raw_author_name | Niyato, Dusit |
| authorships[8].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2505.04467 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Image Steganography For Securing Intellicise Wireless Networks: "Invisible Encryption" Against Eavesdroppers |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-08T23:21:52.890332 |
| primary_topic | |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2505.04467 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2505.04467 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2505.04467 |
| primary_location.id | pmh:oai:arXiv.org:2505.04467 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2505.04467 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2505.04467 |
| publication_date | 2025-05-07 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 81, 95, 157 |
| abstract_inverted_index.As | 0 |
| abstract_inverted_index.To | 53 |
| abstract_inverted_index.an | 33 |
| abstract_inverted_index.by | 21, 50, 89 |
| abstract_inverted_index.in | 59, 110, 119 |
| abstract_inverted_index.of | 2, 35, 83, 98, 116, 138, 164 |
| abstract_inverted_index.to | 44, 72, 132, 160 |
| abstract_inverted_index.we | 105, 124, 155, 169 |
| abstract_inverted_index.and | 10, 24, 37, 46, 112 |
| abstract_inverted_index.for | 7, 86, 145, 174 |
| abstract_inverted_index.its | 121 |
| abstract_inverted_index.one | 1 |
| abstract_inverted_index.the | 3, 75, 114, 162 |
| abstract_inverted_index.(AI) | 40 |
| abstract_inverted_index.This | 78 |
| abstract_inverted_index.also | 41 |
| abstract_inverted_index.case | 158 |
| abstract_inverted_index.form | 82 |
| abstract_inverted_index.into | 102, 126 |
| abstract_inverted_index.most | 4 |
| abstract_inverted_index.only | 74 |
| abstract_inverted_index.this | 55, 92 |
| abstract_inverted_index.with | 150 |
| abstract_inverted_index.along | 149 |
| abstract_inverted_index.cover | 66, 76 |
| abstract_inverted_index.delve | 125 |
| abstract_inverted_index.image | 57, 100, 117, 128, 146, 175 |
| abstract_inverted_index.joint | 139 |
| abstract_inverted_index.paper | 93 |
| abstract_inverted_index.posed | 49 |
| abstract_inverted_index.study | 159 |
| abstract_inverted_index.these | 90 |
| abstract_inverted_index.three | 136 |
| abstract_inverted_index.while | 28 |
| abstract_inverted_index.(JSCC) | 142 |
| abstract_inverted_index.SemCom | 43, 60, 111 |
| abstract_inverted_index.assess | 113 |
| abstract_inverted_index.coding | 141 |
| abstract_inverted_index.decode | 73 |
| abstract_inverted_index.delay. | 31 |
| abstract_inverted_index.embeds | 61 |
| abstract_inverted_index.future | 171 |
| abstract_inverted_index.image. | 77 |
| abstract_inverted_index.models | 143 |
| abstract_inverted_index.offers | 80 |
| abstract_inverted_index.review | 106 |
| abstract_inverted_index.secret | 62 |
| abstract_inverted_index.secure | 133 |
| abstract_inverted_index.within | 65 |
| abstract_inverted_index.SemCom, | 134, 148 |
| abstract_inverted_index.SemCom. | 87, 103, 167, 177 |
| abstract_inverted_index.address | 54 |
| abstract_inverted_index.exposes | 42 |
| abstract_inverted_index.present | 156 |
| abstract_inverted_index.privacy | 47 |
| abstract_inverted_index.propose | 170 |
| abstract_inverted_index.threats | 48 |
| abstract_inverted_index.various | 127 |
| abstract_inverted_index.(SemCom) | 16 |
| abstract_inverted_index.Finally, | 168 |
| abstract_inverted_index.Firstly, | 104 |
| abstract_inverted_index.However, | 32 |
| abstract_inverted_index.Semantic | 14 |
| abstract_inverted_index.Thirdly, | 154 |
| abstract_inverted_index.allowing | 69 |
| abstract_inverted_index.conducts | 94 |
| abstract_inverted_index.consice) | 11 |
| abstract_inverted_index.designed | 131 |
| abstract_inverted_index.existing | 107 |
| abstract_inverted_index.features | 64 |
| abstract_inverted_index.improves | 18 |
| abstract_inverted_index.multiple | 151 |
| abstract_inverted_index.reducing | 29 |
| abstract_inverted_index.research | 172 |
| abstract_inverted_index.security | 45 |
| abstract_inverted_index.semantic | 26, 63, 67 |
| abstract_inverted_index.tailored | 144 |
| abstract_inverted_index.training | 152 |
| abstract_inverted_index.wireless | 12 |
| abstract_inverted_index.Motivated | 88 |
| abstract_inverted_index.Secondly, | 123 |
| abstract_inverted_index.coverless | 165 |
| abstract_inverted_index.enhancing | 120 |
| abstract_inverted_index.features, | 68 |
| abstract_inverted_index.networks, | 13 |
| abstract_inverted_index.paradigms | 130 |
| abstract_inverted_index.potential | 115 |
| abstract_inverted_index.promising | 5 |
| abstract_inverted_index.security. | 122 |
| abstract_inverted_index.technique | 79 |
| abstract_inverted_index."invisible | 84 |
| abstract_inverted_index.artificial | 38 |
| abstract_inverted_index.categories | 137 |
| abstract_inverted_index.challenge, | 56 |
| abstract_inverted_index.directions | 173 |
| abstract_inverted_index.efficiency | 20 |
| abstract_inverted_index.encryption | 108 |
| abstract_inverted_index.illustrate | 161 |
| abstract_inverted_index.recovering | 25 |
| abstract_inverted_index.techniques | 109 |
| abstract_inverted_index.encryption" | 85 |
| abstract_inverted_index.exploration | 97 |
| abstract_inverted_index.extracting, | 22 |
| abstract_inverted_index.integrating | 99 |
| abstract_inverted_index.integration | 34 |
| abstract_inverted_index.intellicise | 8 |
| abstract_inverted_index.intelligent | 51, 70 |
| abstract_inverted_index.strategies. | 153 |
| abstract_inverted_index.(intelligent | 9 |
| abstract_inverted_index.encompassing | 135 |
| abstract_inverted_index.information, | 27 |
| abstract_inverted_index.intelligence | 39 |
| abstract_inverted_index.technologies | 6 |
| abstract_inverted_index.transmission | 30 |
| abstract_inverted_index.Communication | 15 |
| abstract_inverted_index.advancements, | 91 |
| abstract_inverted_index.communication | 19, 36 |
| abstract_inverted_index.comprehensive | 96 |
| abstract_inverted_index.eavesdroppers | 71 |
| abstract_inverted_index.effectiveness | 163 |
| abstract_inverted_index.significantly | 17 |
| abstract_inverted_index.steganography | 58, 101, 118, 147, 166, 176 |
| abstract_inverted_index.transmitting, | 23 |
| abstract_inverted_index.eavesdroppers. | 52 |
| abstract_inverted_index.source-channel | 140 |
| abstract_inverted_index.steganographic | 129 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 9 |
| citation_normalized_percentile |