{"id":"https://openalex.org/W7147638736","doi":"https://doi.org/10.1109/icvisp68610.2025.11451682","title":"MS-CCS: A Customizable Covert Communication System Based on Multi-Modal Steganography","display_name":"MS-CCS: A Customizable Covert Communication System Based on Multi-Modal Steganography","publication_year":2025,"publication_date":"2025-11-28","ids":{"openalex":"https://openalex.org/W7147638736","doi":"https://doi.org/10.1109/icvisp68610.2025.11451682"},"language":null,"primary_location":{"id":"doi:10.1109/icvisp68610.2025.11451682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icvisp68610.2025.11451682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 9th International Conference on Vision, Image and Signal Processing (ICVISP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102360024","display_name":"Huiyan Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huiyan Chang","raw_affiliation_strings":["Information Engineering University,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100437036","display_name":"Kai Wang","orcid":"https://orcid.org/0000-0002-6170-4744"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kangxu Wang","raw_affiliation_strings":["Information Engineering University,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100458144","display_name":"Xinliang Zhang","orcid":"https://orcid.org/0000-0001-8513-3328"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaixin Zhang","raw_affiliation_strings":["Information Engineering University,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123505098","display_name":"Wenyan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyan Liu","raw_affiliation_strings":["Information Engineering University,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132699914","display_name":"Tao Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Hu","raw_affiliation_strings":["Information Engineering University,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038028171","display_name":"Dacheng Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dacheng Zhou","raw_affiliation_strings":["Information Engineering University,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102360024"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87316967,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.927299976348877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.927299976348877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.050599999725818634,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.00570000009611249,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8657000064849854},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7419000267982483},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6784999966621399},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5615000128746033},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5533999800682068},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4652999937534332},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4521999955177307},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.44179999828338623}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8657000064849854},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7419000267982483},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7297999858856201},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6784999966621399},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5615000128746033},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5533999800682068},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4724999964237213},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4652999937534332},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4521999955177307},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.44179999828338623},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39169999957084656},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36500000953674316},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.33239999413490295},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.32710000872612},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32440000772476196},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.32330000400543213},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.320499986410141},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3131999969482422},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.2928999960422516},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.27959999442100525},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2754000127315521},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.2660999894142151},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.2538999915122986},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icvisp68610.2025.11451682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icvisp68610.2025.11451682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 9th International Conference on Vision, Image and Signal Processing (ICVISP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5555821061134338,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2159390040","https://openalex.org/W2402967204","https://openalex.org/W2496047533","https://openalex.org/W2794584741","https://openalex.org/W2901329636","https://openalex.org/W2913133959","https://openalex.org/W2914224456","https://openalex.org/W2962744622","https://openalex.org/W2998457557","https://openalex.org/W3085519426","https://openalex.org/W3109937020","https://openalex.org/W3119339993","https://openalex.org/W3135239326","https://openalex.org/W3135748828","https://openalex.org/W4281389110","https://openalex.org/W4327808793","https://openalex.org/W4383899706","https://openalex.org/W4385080306","https://openalex.org/W4391454200","https://openalex.org/W4392151900","https://openalex.org/W4399119984","https://openalex.org/W4407637798","https://openalex.org/W4409536983","https://openalex.org/W4409561482"],"related_works":[],"abstract_inverted_index":{"Covert":[0],"communication":[1,59],"is":[2],"pivotal":[3],"for":[4,112,159],"the":[5,19,41,79,87,110],"secure":[6],"transmission":[7,132],"of":[8,21,81,89],"sensitive":[9],"information,":[10],"yet":[11],"existing":[12],"systems":[13],"face":[14],"significant":[15],"challenges.":[16],"These":[17],"include":[18],"detectability":[20],"single-modal":[22],"covers":[23],"and":[24,40,92,108,138,152,157],"static":[25],"steganographic":[26,74,98],"methods,":[27],"high":[28],"deployment":[29,117],"costs":[30],"due":[31],"to":[32,106,115],"reliance":[33],"on":[34,62],"proprietary":[35],"software":[36],"or":[37],"specialized":[38],"hardware,":[39],"difficulty":[42],"in":[43,70],"balancing":[44],"security":[45],"with":[46,127],"embedding":[47,90],"capacity.":[48],"To":[49],"overcome":[50],"these":[51],"limitations,":[52],"we":[53,119],"propose":[54],"MS-CCS,":[55],"a":[56,71,146],"customizable":[57],"covert":[58],"system":[60],"based":[61],"Multi-Modal":[63],"hybrid":[64],"Steganography.":[65],"Our":[66],"core":[67],"innovation":[68],"lies":[69],"dynamic,":[72],"multi-modal":[73],"framework":[75],"that":[76,142],"collaboratively":[77],"leverages":[78],"heterogeneity":[80],"diverse":[82],"cover":[83],"(images,":[84],"audio,":[85],"text),":[86],"diversity":[88],"techniques,":[91],"strategy":[93],"dynamism.":[94],"This":[95],"approach":[96],"disperses":[97],"features":[99],"across":[100],"unrelated":[101],"dimensions,":[102],"significantly":[103],"enhancing":[104],"resistance":[105],"detection":[107],"increasing":[109],"cost":[111],"steganalysis.":[113],"Furthermore,":[114],"reduce":[116],"dependency,":[118],"design":[120],"an":[121],"intelligent":[122],"split":[123],"routing":[124],"mechanism":[125],"integrated":[126],"plug-and-play":[128],"software,":[129],"enabling":[130],"high-performance":[131],"over":[133],"public":[134],"networks.":[135],"Comprehensive":[136],"theoretical":[137],"empirical":[139],"evaluations":[140],"demonstrate":[141],"MS-CCS":[143],"reliably":[144],"achieves":[145],"superior":[147],"trade-off":[148],"between":[149],"security,":[150],"capacity,":[151],"practicality,":[153],"proving":[154],"its":[155],"effectiveness":[156],"cost-efficiency":[158],"real-world":[160],"deployment.":[161]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-04-02T00:00:00"}
