{"id":"https://openalex.org/W4416214747","doi":"https://doi.org/10.1109/jiot.2025.3632928","title":"A Steganography-Based Scheme for Secure Transmission of Monitoring Data in Smart Substations","display_name":"A Steganography-Based Scheme for Secure Transmission of Monitoring Data in Smart Substations","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W4416214747","doi":"https://doi.org/10.1109/jiot.2025.3632928"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3632928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3632928","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ruixv Jiang","orcid":"https://orcid.org/0009-0009-7918-3447"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruixv Jiang","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100726803","display_name":"Yamin Liu","orcid":"https://orcid.org/0000-0003-4659-3529"},"institutions":[{"id":"https://openalex.org/I4210140589","display_name":"China Huadian Corporation (China)","ror":"https://ror.org/03wj9h986","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210140589"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yamin Liu","raw_affiliation_strings":["Huadian Electric Power Research Institute Company Ltd., Hangzhou, Zhejiang, China","Huadian Electric Power Research Institute Co., Ltd, Zhejiang Province, China"],"affiliations":[{"raw_affiliation_string":"Huadian Electric Power Research Institute Company Ltd., Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I4210140589"]},{"raw_affiliation_string":"Huadian Electric Power Research Institute Co., Ltd, Zhejiang Province, China","institution_ids":["https://openalex.org/I4210140589"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100386895","display_name":"Fang Fang","orcid":"https://orcid.org/0000-0003-3784-3696"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fang Fang","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"last","author":{"id":null,"display_name":"Le Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Le Wei","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I153473198"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34052061,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"3","first_page":"4261","last_page":"4276"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.3467000126838684,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.3467000126838684,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.10620000213384628,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.06459999829530716,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7644000053405762},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.5701000094413757},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5674999952316284},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.5471000075340271},{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.5378000140190125},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5187000036239624},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5008000135421753},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.46239998936653137},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4528999924659729}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8133999705314636},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7644000053405762},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.5701000094413757},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5674999952316284},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.5471000075340271},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.5378000140190125},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5187000036239624},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5008000135421753},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.46239998936653137},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4528999924659729},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4487000107765198},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4146000146865845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40540000796318054},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.39399999380111694},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.34200000762939453},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3215000033378601},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.3167000114917755},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.314300000667572},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.31040000915527344},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.30309998989105225},{"id":"https://openalex.org/C140311924","wikidata":"https://www.wikidata.org/wiki/Q200928","display_name":"Electric power transmission","level":2,"score":0.30230000615119934},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2924000024795532},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2784999907016754},{"id":"https://openalex.org/C92018576","wikidata":"https://www.wikidata.org/wiki/Q3242194","display_name":"Power transmission","level":3,"score":0.2768000066280365},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2632000148296356},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26109999418258667}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3632928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3632928","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1605392498","display_name":null,"funder_award_id":"HNKJ20-H88","funder_id":"https://openalex.org/F4320336753","funder_display_name":"Changsha Science and Technology Project"}],"funders":[{"id":"https://openalex.org/F4320336753","display_name":"Changsha Science and Technology Project","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1976570511","https://openalex.org/W2009130368","https://openalex.org/W2134527668","https://openalex.org/W2192227561","https://openalex.org/W2322622188","https://openalex.org/W2396326594","https://openalex.org/W2542290803","https://openalex.org/W2561258173","https://openalex.org/W2621048556","https://openalex.org/W2751202750","https://openalex.org/W2892948265","https://openalex.org/W2949862294","https://openalex.org/W2953197802","https://openalex.org/W2960139675","https://openalex.org/W2963828702","https://openalex.org/W2963957509","https://openalex.org/W3011768656","https://openalex.org/W3088440139","https://openalex.org/W3103947479","https://openalex.org/W3123742938","https://openalex.org/W3134876667","https://openalex.org/W3202332855","https://openalex.org/W4226310015","https://openalex.org/W4307940876","https://openalex.org/W4312961220","https://openalex.org/W4313506322","https://openalex.org/W4376865343","https://openalex.org/W4387092851","https://openalex.org/W4388283577","https://openalex.org/W4388837972","https://openalex.org/W4392005668","https://openalex.org/W4392126508","https://openalex.org/W4399365500","https://openalex.org/W4400229723","https://openalex.org/W4400310667","https://openalex.org/W4400620568","https://openalex.org/W4401725766","https://openalex.org/W4404103070","https://openalex.org/W4407894292"],"related_works":[],"abstract_inverted_index":{"As":[0],"Internet":[1],"of":[2,21,99,145],"Things":[3],"(IoT)":[4],"technology":[5],"advances":[6],"rapidly,":[7],"intelligent":[8,56],"substation":[9,57,181],"monitoring":[10,23,58,182],"systems":[11],"become":[12],"crucial":[13],"for":[14],"power":[15],"system":[16],"stability.":[17],"However,":[18],"the":[19,42,62,69,77,82,96,105,113,123],"transmission":[20],"its":[22],"data":[24,43,59],"faces":[25],"security":[26,44],"threats":[27],"like":[28],"theft":[29],"and":[30,65,79,94,102,134,140,156,175,178],"tampering,":[31],"so":[32],"it":[33],"is":[34,149],"urgent":[35],"to":[36,40,54,89,115],"take":[37],"effective":[38],"measures":[39],"ensure":[41],"during":[45],"transmission.":[46,60],"This":[47],"paper":[48],"introduces":[49],"a":[50,66,168],"GAN-based":[51,135],"steganography":[52,132],"(DM-GAN)":[53],"secure":[55],"Firstly,":[61],"dual-stream":[63],"generator":[64,78,114],"multi-steganalyzer":[67],"in":[68,73,85,171,180],"discriminator":[70],"are":[71,87],"adopted":[72],"DM-GAN,":[74],"which":[75],"balances":[76],"discriminator.":[80],"Secondly,":[81],"skip":[83],"connections":[84],"DM-GAN":[86,165],"redesigned":[88],"fully":[90],"integrate":[91],"multi-scale":[92],"features":[93],"enhance":[95],"model\u2019s":[97],"understanding":[98],"image":[100,118],"details":[101],"structures.":[103],"Furthermore,":[104],"proposed":[106,147],"spatial-channel":[107],"combined":[108],"attention":[109],"(SCCA)":[110],"mechanism":[111],"enables":[112],"focus":[116],"on":[117,158],"key":[119],"regions":[120],"adaptively,":[121],"improving":[122],"embedded":[124],"probability":[125],"map":[126],"quality.":[127],"Finally,":[128],"compared":[129],"with":[130],"traditional":[131],"HILL":[133],"methods":[136],"UT-GAN,":[137],"CF-UT-GAN,":[138],"Wang-Net,":[139],"Steg-GMAN,":[141],"steganalyzer":[142],"detection":[143],"accuracy":[144],"our":[146],"method":[148],"reduced":[150],"by":[151],"4.82%,":[152],"3.11%,":[153],"1.71%,":[154],"0.81%,":[155],"0.55%":[157],"average,":[159],"respectively.":[160],"Experimental":[161],"results":[162],"show":[163],"that":[164],"has":[166,176],"achieved":[167],"significant":[169],"improvement":[170],"steganalysis":[172],"resistance":[173],"ability,":[174],"effectiveness":[177],"superiority":[179],"system.":[183]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-14T00:00:00"}
