Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (193)

Search Parameters:
Keywords = hiding efficiency

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 6306 KB  
Article
Trustless Federated Reinforcement Learning for VPP Dispatch
by Xin Zhang and Fan Liang
Electronics 2026, 15(6), 1303; https://doi.org/10.3390/electronics15061303 - 20 Mar 2026
Abstract
Large-scale Virtual Power Plants (VPPs) are increasingly essential as Distributed Energy Resources (DERs) assume ancillary service duties once supplied by conventional generation, yet scaling a VPP exposes a persistent trilemma among economic efficiency, data privacy, and operational security. Centralized coordination can approach optimal [...] Read more.
Large-scale Virtual Power Plants (VPPs) are increasingly essential as Distributed Energy Resources (DERs) assume ancillary service duties once supplied by conventional generation, yet scaling a VPP exposes a persistent trilemma among economic efficiency, data privacy, and operational security. Centralized coordination can approach optimal revenue but requires collecting fine-grained DER operational data and creates a single point of compromise. Federated Learning (FL) mitigates raw data centralization by keeping measurements and experience local, but it introduces a fragile trust assumption that the aggregator will correctly and fairly combine model updates. This trust gap is acute in reinforcement learning-based VPP control because aggregation deviations, including selectively dropping updates, manipulating weights, replaying stale models, or injecting a replacement model, can silently bias the learned policy and degrade both profit and compliance. We propose a zero-knowledge federated reinforcement learning framework for trustless VPP coordination in which each DER trains a local deep reinforcement learning agent to solve a multi-objective dispatch problem that balances ancillary service revenue against battery degradation under operational and grid constraints, while the global aggregation step is made externally verifiable. In each round, participants bind membership via signed receipts and commit to their updates, and the aggregator produces a zk-SNARK, proving that the published global parameters equal the agreed aggregation rule applied to the receipt-bound set of committed updates under a fixed-point encoding with range constraints. Verification is lightweight and can be performed independently by each DER, removing the need to trust the aggregator for aggregation integrity without centralizing raw DER operational data or trajectories. The proposed design does not aim to hide model updates from the aggregator. Instead, it provides external verifiability of the aggregation computation while keeping raw measurements and local experience. We formalize the threat model and verifiable security properties for aggregation correctness and update inclusion, present a circuit construction with proof complexity characterized by model dimension and fleet size, and evaluate the approach in power and cyber co-simulation on the IEEE 33 bus feeder with ancillary service signals. Results show near-centralized economic performance under benign conditions and improved robustness to aggregator side deviations compared to standard federated reinforcement learning. Full article
Show Figures

Figure 1

28 pages, 1682 KB  
Review
A Scoping Analysis of the Literature on the Use of Hybrid Cryptographic Systems for Data Hiding in Cloud Storage
by Luthando Mletshe, Mnoneleli Nogwina and Colin Chibaya
Cryptography 2026, 10(2), 19; https://doi.org/10.3390/cryptography10020019 - 13 Mar 2026
Viewed by 274
Abstract
Organizations have been moving on-premises data functionalities to cloud storage environments. The need for advanced hybrid cryptography is deemed a promising solution for securing data on cloud storage. This scoping review explores the application of hybrid cryptographic systems for data hiding in cloud [...] Read more.
Organizations have been moving on-premises data functionalities to cloud storage environments. The need for advanced hybrid cryptography is deemed a promising solution for securing data on cloud storage. This scoping review explores the application of hybrid cryptographic systems for data hiding in cloud storage. It focuses on identifying global research trends, technological approaches, and contextual gaps in implementation. The review systematically examines the literature from major scholarly databases to identify existing models that combine traditional and modern cryptographic techniques to enhance data confidentiality, integrity, and authenticity against cloud-based security threats. Out of the 8250 eligible papers, 24 were included in the review. The findings reveal that the majority of scholarly contributions originate from Asia, averaging 87.5%, as reflected in the distribution of included articles by continent. Particularly, India and China dominate in the space, with a complete absence of studies from Africa, including South Africa. This geographical disparity underscores a significant research gap in the contextualization of hybrid cryptographic frameworks suited to Africa’s unique infrastructural and regulatory environments. The review further reveals a limited focus on the development of lightweight, scalable, and adaptable hybrid cryptographic schemes. Such approaches are essential for addressing challenges related to bandwidth limitations, computational efficiency, and regulatory compliance in developing regions. Consequently, this study contributes by establishing a comprehensive knowledge map of hybrid cryptography for cloud security, emphasizing the necessity for region-specific, context-aware frameworks. The findings provide a foundation for future investigations aimed at developing robust efficient hybrid cryptographic models that can strengthen data security in African cloud infrastructures. Full article
(This article belongs to the Collection Survey of Cryptographic Topics)
Show Figures

Figure 1

15 pages, 1509 KB  
Article
Effects of Pen Partition Design and Hiding Facilities on Elimination and Lying Behavior of Finishing Pigs
by Zhou Yu, Hao Wang, Zhi He, Bin Hu, Renli Qi and Yaqiong Zeng
Animals 2026, 16(5), 788; https://doi.org/10.3390/ani16050788 - 3 Mar 2026
Viewed by 247
Abstract
In intensive commercial pig production systems, the spatial distribution of elimination and lying behaviors plays a crucial role in pen hygiene, management efficiency, and animal welfare. Pen partition design and the provision of hiding facilities are key structural factors that may influence pigs’ [...] Read more.
In intensive commercial pig production systems, the spatial distribution of elimination and lying behaviors plays a crucial role in pen hygiene, management efficiency, and animal welfare. Pen partition design and the provision of hiding facilities are key structural factors that may influence pigs’ spatial preferences; however, systematic evaluations of their combined effects remain limited. A total of 108 growing–finishing pigs were used in a 3 × 2 factorial design to assess the effects of different partition types and hiding facility configurations, as well as their interaction, on the spatial distribution of elimination and lying behaviors. Behavioral data were analyzed using non-parametric statistical methods. The results showed that partition type and hiding facilities significantly influenced the spatial patterns of elimination and lying behaviors (p < 0.05), whereas no significant effects were observed on total daily elimination duration, elimination frequency, or lying posture distribution (p > 0.05). Elimination behavior was predominantly concentrated in the slatted floor area. The combination of a front-closed partition with a hiding facility significantly increased the proportion of disturbed elimination events (16.2 ± 14.3%), which was higher than that observed in the open partition combined with a hiding facility (7.9 ± 7.6%, p < 0.05). In contrast, the rear-closed partition design was associated with atypical elimination occurring on the solid floor area. Overall, pigs showed a clear preference for lying on the solid floor. The front-closed partition combined with a hiding facility significantly reduced the proportion of lying on the solid floor (64.6 ± 8.5%), whereas the open partition combined with a hiding facility resulted in a higher-than-average proportion of solid-floor lying behavior (80.6 ± 8.9%). These findings indicate that an open partition design combined with a hiding facility is more effective in maintaining functional separation between elimination and resting areas while reducing disturbed elimination events. This study provides experimental evidence to support structural optimization of growing–finishing pig housing, contributing to improved pen hygiene and enhanced animal welfare. Full article
(This article belongs to the Section Animal Welfare)
Show Figures

Figure 1

24 pages, 9307 KB  
Article
Fast and Lightweight Hybrid Image Encryption and Steganography Leveraging an SPN, Chaotic Maps, and LSB Substitution
by Abdullah Alaklabi, Muhammad Asfand Hafeez and Arslan Munir
J. Cybersecur. Priv. 2026, 6(1), 31; https://doi.org/10.3390/jcp6010031 - 9 Feb 2026
Viewed by 577
Abstract
The rapid growth of digital communication has heightened the need for the secure transfer of sensitive image data. This is due to the increasing threats posed by cyberattacks and unauthorized access. Traditional encryption methods, while effective for text and binary data, often face [...] Read more.
The rapid growth of digital communication has heightened the need for the secure transfer of sensitive image data. This is due to the increasing threats posed by cyberattacks and unauthorized access. Traditional encryption methods, while effective for text and binary data, often face significant challenges when applied to images, due to their larger size and complex structure. These characteristics make it difficult to provide a robust security solution. In this paper, we present a fast and efficient hybrid image encryption and steganography algorithm that leverages a substitution–permutation network (SPN), a chaotic logistic map (CLM), and least-significant-bit (LSB) substitution. This approach aims to improve data security and confidentiality while maintaining low computational complexity. The chaotic map generates random sequences for substitution and permutation, ensuring high unpredictability. The SPN framework improves the confusion and diffusion properties of the encryption process. The LSB substitution method hides the encrypted data values within the pixels of the cover image. We evaluate the security and efficiency of the proposed algorithm using various statistical tests, including measurement of the mean square error (MSE) and peak signal-to-noise ratio (PSNR) and pixel difference histogram (PDH) analysis. The results indicate that our algorithm outperforms many existing methods in terms of speed and efficiency, making it suitable for real-time hybrid encryption and steganography applications. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

7 pages, 1025 KB  
Proceeding Paper
A Novel Pattern-Based Dual-Image Reversible Data Hiding Scheme
by Chin-Feng Lee and Yu-Yun Yeh
Eng. Proc. 2025, 120(1), 45; https://doi.org/10.3390/engproc2025120045 - 4 Feb 2026
Viewed by 193
Abstract
We developed a novel pattern-based dual-image reversible data hiding scheme utilizing vertical bars and bitten square blocks to improve data capacity, security, embedding efficiency, and visual quality. By embedding secret messages into two grayscale images that closely match the original, the approach significantly [...] Read more.
We developed a novel pattern-based dual-image reversible data hiding scheme utilizing vertical bars and bitten square blocks to improve data capacity, security, embedding efficiency, and visual quality. By embedding secret messages into two grayscale images that closely match the original, the approach significantly lowers the risk of detection by unauthorized parties. The technique includes reference matrix construction, position-based embedding, and perfect message extraction and image recovery. Experimental results demonstrate that the pattern-based method achieves a superior balance between payload and visual quality, making it well-suited for secure and high-performance applications. Full article
(This article belongs to the Proceedings of 8th International Conference on Knowledge Innovation and Invention)
Show Figures

Figure 1

18 pages, 3358 KB  
Article
Applicability Assessment of a Microbial Proteolytic Fermentation Broth to Leather Processing and Protein Stain Removal
by Manuela Lageiro, Maria João Moura, Fernanda Simões, Nuno Alvarenga and Alberto Reis
Appl. Sci. 2026, 16(3), 1348; https://doi.org/10.3390/app16031348 - 29 Jan 2026
Viewed by 504
Abstract
Microbial proteases are fundamental towards the eco-sustainability of proteolysis at the industrial scale. A proteolytic broth was obtained from a bioreactor fermentation of a proteolytic Bacillus strain isolated from an industrial alkaline bath. Broth proteolytic activity was applied to leather tanning and to [...] Read more.
Microbial proteases are fundamental towards the eco-sustainability of proteolysis at the industrial scale. A proteolytic broth was obtained from a bioreactor fermentation of a proteolytic Bacillus strain isolated from an industrial alkaline bath. Broth proteolytic activity was applied to leather tanning and to the removal of protein stains. The hide tanned with the microbial proteolytic fermentation broth showed better physical properties than the one tanned with commercial pancreatic proteases of the same activity (780 LVU). Proteinaceous stains on cotton fabric were removed more efficiently using the Bacillus proteolytic broth than water or a commercial detergent. Blood and egg yolk disappeared in less than 30 min. The removal of soya and English sauce stains was even faster. Broth proteolytic activity was characterised by caseinolytic (5200 LVU), collagenolytic (10.0 U mg−1), elastolytic (3.7 U mg−1), and keratinolytic (0.7 U mg−1) activities, which were compared with those of a commonly used commercial protease. Alkaline protease activity in the broth was demonstrated by a 20% increase in caseinolytic activity from pH 5 to 8. Besides the demonstrated applications in the leather and detergent industries, the produced alkaline microbial proteases can also be used in the treatment of proteinaceous wastes and effluents, offering potential environmental benefits reinforcing and impacting the bioeconomy. Full article
(This article belongs to the Special Issue Advances in Microbial Biotechnology)
Show Figures

Figure 1

16 pages, 3268 KB  
Article
Lightweight CNN’s Superiority in Industrial Defect Detection: A Case Study of Wind Turbine Blades
by Liang Du, Soon-Hyung Lee, Kyung-Min Lee and Yong-Sung Choi
Machines 2026, 14(1), 69; https://doi.org/10.3390/machines14010069 - 6 Jan 2026
Cited by 1 | Viewed by 604
Abstract
This paper investigates the effectiveness of lightweight Convolutional Neural Networks (CNNs) compared with Vision Transformers (ViTs) for industrial defect detection, with a focus on wind turbine blades. While ViTs have recently attracted significant attention in computer vision research, their advantages over traditional CNNs [...] Read more.
This paper investigates the effectiveness of lightweight Convolutional Neural Networks (CNNs) compared with Vision Transformers (ViTs) for industrial defect detection, with a focus on wind turbine blades. While ViTs have recently attracted significant attention in computer vision research, their advantages over traditional CNNs remain unclear in highly specialized industrial applications. To address this gap, a rigorous comparative study was conducted using a labeled dataset of wind turbine blade surface defects, including corrosion, craze, hide_craze, surface_attach, surface_corrosion, surface_injure, surface_oil, thunderstrike. Experimental results demonstrate that lightweight CNNs outperform ViTs in both accuracy and efficiency. Specifically, CNN-based models achieved a maximum accuracy of 98.2%, while the best-performing ViT reached only 50.6%. Beyond accuracy, CNNs also showed superior data efficiency and robustness when trained on relatively small datasets, underscoring their suitability for industrial defect detection tasks where large-scale annotated data are often unavailable. These findings highlight the continuing relevance of lightweight CNNs in industrial settings and provide practical guidance for selecting models in safety-critical applications such as wind turbine blade inspection. This paper contributes by clarifying the limitations of ViTs under industrial conditions and reinforcing the value of lightweight CNNs as a reliable and computationally efficient solution for defect detection. Full article
(This article belongs to the Section Turbomachinery)
Show Figures

Figure 1

21 pages, 5078 KB  
Article
Parallelizable and Lightweight Reversible Data Hiding Framework for Encryption-Then-Compression Systems
by Ruifeng Li and Masaaki Fujiyoshi
Electronics 2026, 15(1), 136; https://doi.org/10.3390/electronics15010136 - 28 Dec 2025
Cited by 1 | Viewed by 314
Abstract
Encryption-then-compression (EtC) enables secure image processing while retaining coding efficiency. In grayscale-based EtC pipelines with YCbCr transformation and component serialization, reversible data hiding (RDH) becomes challenging because cross-channel correspondence is disrupted, and block-wise encryption operations (permutation, rotation, and brightness inversion) break embedding synchronization. [...] Read more.
Encryption-then-compression (EtC) enables secure image processing while retaining coding efficiency. In grayscale-based EtC pipelines with YCbCr transformation and component serialization, reversible data hiding (RDH) becomes challenging because cross-channel correspondence is disrupted, and block-wise encryption operations (permutation, rotation, and brightness inversion) break embedding synchronization. This paper presents a block-independent and lightweight RDH framework for such component-serialized grayscale EtC systems. The framework combines diagonal pixel absolute difference (DPAD)-based embedding with an encryption-invariant synchronization index (EISI), enabling reliable encrypted-domain extraction and self-synchronization under component serialization and block permutation, without auxiliary side information or any modification to the underlying EtC pipeline. All operations are performed locally at the block level, making the framework naturally parallelizable when needed. Experiments on standard datasets with diverse texture characteristics demonstrate reliable data extraction and perfect reversibility while preserving the structural properties required for secure encryption and lossless-mode compression. These results indicate that the proposed framework is well-suited to practical EtC deployments where lightweight implementation and block-level independence are essential. Full article
(This article belongs to the Special Issue Advanced Techniques in Real-Time Image Processing)
Show Figures

Figure 1

20 pages, 549 KB  
Article
From Synergy to Strain: Exploring the Psychological Mechanisms Linking Employee–AI Collaboration and Knowledge Hiding
by Yi-Bin Li, Ting-Hsiu Liao, Chih-Hao Tsai and Tung-Ju Wu
Behav. Sci. 2026, 16(1), 13; https://doi.org/10.3390/bs16010013 - 20 Dec 2025
Cited by 1 | Viewed by 1146
Abstract
As artificial intelligence (AI) becomes an integral part of organizational operations, collaboration between humans and AI is transforming employees’ work experiences and behavioral patterns. This study examines the psychological challenges and coping responses associated with such collaboration. Drawing on Cognitive Appraisal Theory, we [...] Read more.
As artificial intelligence (AI) becomes an integral part of organizational operations, collaboration between humans and AI is transforming employees’ work experiences and behavioral patterns. This study examines the psychological challenges and coping responses associated with such collaboration. Drawing on Cognitive Appraisal Theory, we construct and test a theoretical framework that connects employee–AI collaboration to knowledge hiding via job insecurity, while considering AI trust as a moderating variable. Data were collected through a three-wave time-lagged survey of 348 employees working in knowledge-intensive enterprises in China. The empirical results demonstrate that (1) employee–AI collaboration elevates perceptions of job insecurity; (2) job insecurity fosters knowledge-hiding behavior; (3) job insecurity mediates the link between collaboration and knowledge hiding; and (4) AI trust buffers the positive effect of collaboration on job insecurity, thereby reducing its indirect impact on knowledge hiding. These findings reveal the paradoxical role of AI collaboration: although it enhances efficiency, it may also provoke defensive reactions that inhibit knowledge exchange. By highlighting the role of AI trust in shaping employees’ cognitive appraisals, this study advances understanding of how cognitive appraisals influence human adaptation to intelligent technologies. Practical insights are offered for managers aiming to cultivate trust-based and psychologically secure environments that promote effective human–AI collaboration and organizational innovation. Full article
Show Figures

Figure 1

19 pages, 7269 KB  
Article
Fully-Cascaded Spatial-Aware Convolutional Network for Motion Deblurring
by Yinghan Hong, Bishenghui Tao, Qian Wang, Guizhen Mai and Cai Guo
Information 2025, 16(12), 1055; https://doi.org/10.3390/info16121055 - 2 Dec 2025
Viewed by 441
Abstract
Motion deblurring is an ill-posed, challenging problem in image restoration due to non-uniform motion blurs. Although recent deep convolutional neural networks have made significant progress, many existing methods adopt multi-scale or multi-patch subnetworks that involve additional inter-subnetwork processing (e.g., feature alignment and fusion) [...] Read more.
Motion deblurring is an ill-posed, challenging problem in image restoration due to non-uniform motion blurs. Although recent deep convolutional neural networks have made significant progress, many existing methods adopt multi-scale or multi-patch subnetworks that involve additional inter-subnetwork processing (e.g., feature alignment and fusion) across different scales or patches, leading to substantial computational cost. In this paper, we propose a novel fully-cascaded spatial-aware convolutional network (FSCNet) that effectively restores sharp images from blurry inputs while maintaining a favorable balance between restoration quality and computational efficiency. The proposed architecture consists of simple yet effective subnetworks connected through a fully-cascaded feature fusion (FCFF) module, enabling the exploitation of diverse and complementary features generated at each stage. In addition, we design a lightweight spatial-aware block (SAB), whose core component is a channel-weighted spatial attention (CWSA) module. The SAB is integrated into both the FCFF module and skip connections, enhancing feature fusion by enriching spatial detail representation. On the GoPro dataset, FSCNet achieves 33.01 dB PSNR and 0.962 SSIM, delivering comparable or higher accuracy than state-of-the-art methods such as HINet, while reducing model size by nearly 80%. Furthermore, when the GoPro-trained model is evaluated on three additional benchmark datasets (HIDE, REDS, and RealBlur), FSCNet attains the highest average PSNR (29.53 dB) and SSIM (0.903) among all compared methods. This consistent cross-dataset superiority highlights FSCNet’s strong generalization and robustness under diverse blur conditions, confirming that it achieves state-of-the-art performance with a favorable performance–complexity trade-off. Full article
Show Figures

Graphical abstract

28 pages, 16687 KB  
Article
A Symmetrically Verifiable Outsourced Decryption Data Sharing Scheme with Privacy-Preserving for VANETs
by Han Luo, Menglong Qi, Chengzhi Yu, Qianxi Liu and Jintian Lu
Symmetry 2025, 17(12), 2032; https://doi.org/10.3390/sym17122032 - 27 Nov 2025
Viewed by 514
Abstract
Frequent data sharing in Vehicular Ad Hoc Networks (VANETs) necessitates a robust foundation of secure access control to ensure data security. Existing ciphertext-policy attribute-based encryption schemes are constrained by the performance bottleneck of a single attribute authority. Furthermore, although many schemes adopt outsourced [...] Read more.
Frequent data sharing in Vehicular Ad Hoc Networks (VANETs) necessitates a robust foundation of secure access control to ensure data security. Existing ciphertext-policy attribute-based encryption schemes are constrained by the performance bottleneck of a single attribute authority. Furthermore, although many schemes adopt outsourced decryption, the verifiability of the decryption results is not guaranteed. Therefore, this paper proposes a Symmetrically Verifiable Outsourced Decryption Data Sharing Scheme with Privacy-Preserving for VANETs (VODDS). To balance the computational overhead across multiple authorities, VODDS introduces a distributed key distribution mechanism that organizes them into groups. Within each group, the key distribution credential is generated through a Group Key Agreement, with each round secured by a Byzantine consensus mechanism to achieve a balance between security and efficiency. User identities are converted into anonymous representations via hashing for embedding into the attribute keys. Furthermore, blockchain technology is used to record a hash commitment for the verification ciphertext. This enables the user to verify the outsourced result through a smart contract, which performs a symmetrical verification by matching the user’s locally computed hash against the on-chain record. Moreover, VODDS employs a linear secret sharing scheme to achieve policy hiding. We provide security analysis under the q-parallel Bilinear Diffie–Hellman Exponent and Decisional Diffie–Hellman assumptions, which proves the security of VODDS. In addition, VODDS exhibits higher efficiency compared to related schemes in the performance evaluation. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

32 pages, 5285 KB  
Article
Simultaneous Reversible Data Hiding and Quality Enhancement for VQ-Compressed Images via Quality Improvement Codes
by Chun-Hsiu Yeh, Chung-Wei Kuo, Xian-Zhong Lin, Wei-Cheng Shen and Chin-Wei Liao
Electronics 2025, 14(22), 4463; https://doi.org/10.3390/electronics14224463 - 16 Nov 2025
Cited by 2 | Viewed by 562
Abstract
With the rapid proliferation of digital multimedia in resource-constrained Internet of Things (IoT) environments, there is growing demand for efficient image compression combined with secure data embedding. Existing Vector Quantization (VQ)-based Reversible Data Hiding (RDH) methods prioritize embedding capacity while neglecting reconstruction fidelity, [...] Read more.
With the rapid proliferation of digital multimedia in resource-constrained Internet of Things (IoT) environments, there is growing demand for efficient image compression combined with secure data embedding. Existing Vector Quantization (VQ)-based Reversible Data Hiding (RDH) methods prioritize embedding capacity while neglecting reconstruction fidelity, often introducing noticeable quality degradation in edge regions—unacceptable for high-fidelity applications such as medical imaging and forensic analysis. This paper proposes a lightweight RDH framework with a once-offline trained VQ codebook that simultaneously performs secure data embedding and visual quality enhancement for VQ-compressed images. Quality Improvement Codes (QIC) are generated from pixel-wise residuals between original and VQ-decompressed images and embedded into the VQ index table using a novel Recoding Index Value (RIV) mechanism without additional transmission overhead. Sobel edge detection identifies perceptually sensitive blocks for targeted enhancement. Comprehensive experiments on ten standard test images across multiple resolutions (256 × 256, 512 × 512) and codebook sizes (64–1024) demonstrate Peak Signal-to-Noise Ratio (PSNR) gains of +4 to +5.39 dB and Structural Similarity Index Measure (SSIM) improvements of +4.12% to +9.86%, with embedding capacities approaching 100 Kbits. The proposed approach consistently outperforms existing methods in both image quality and payload capacity while eliminating computational overhead of deep learning models, making it highly suitable for resource-constrained edge devices and real-time multimedia security applications. Full article
Show Figures

Figure 1

20 pages, 11319 KB  
Article
Enhancing Feature Integrity and Transmission Stealth: A Multi-Channel Imaging Hiding Method for Network Abnormal Traffic
by Zhenghao Qian, Fengzheng Liu, Mingdong He and Denghui Zhang
Buildings 2025, 15(20), 3638; https://doi.org/10.3390/buildings15203638 - 10 Oct 2025
Viewed by 812
Abstract
In open-network environments of smart buildings and urban infrastructure, abnormal traffic from security and energy monitoring systems is critical for operational safety and decision reliability. We can develop malware that exploits building automation protocols to simulate attacks involving the falsification or modification of [...] Read more.
In open-network environments of smart buildings and urban infrastructure, abnormal traffic from security and energy monitoring systems is critical for operational safety and decision reliability. We can develop malware that exploits building automation protocols to simulate attacks involving the falsification or modification of chiller controller commands, thereby endangering the entire network infrastructure. Intrusion detection systems rely on abundant labeled abnormal traffic data to detect attack patterns, improving network system reliability. However, transmitting such data faces two major challenges: single-feature representations fail to capture comprehensive traffic features, limiting the information representation for artificial intelligence (AI)-based detection models, and unconcealed abnormal traffic is easily intercepted by firewalls or intrusion detection systems, hindering cross-departmental sharing. Existing methods struggle to balance feature integrity and transmission stealth, often sacrificing one for the other or relying on easily detectable spatial-domain steganography. To address these gaps, we propose a multi-channel imaging hiding method that reconstructs abnormal traffic into multi-channel images by combining three mappings to generate grayscale images that depict traffic state transitions, dynamic trends, and internal similarity, respectively. These images are combined to enhance feature representation and embedded into frequency-domain adversarial examples, enabling evasion of security devices while preserving traffic integrity. Experimental results demonstrate that our method captures richer information than single-representation approaches, achieving a PSNR of 44.5 dB (a 6.0 dB improvement over existing methods) and an SSIM of 0.97. The high-fidelity reconstructions enabled by these gains facilitate the secure and efficient sharing of abnormal traffic data, thereby enhancing AI-driven security in smart buildings. Full article
Show Figures

Figure 1

15 pages, 4604 KB  
Article
A JPEG Reversible Data Hiding Algorithm Based on Block Smoothness Estimation and Optimal Zero Coefficient Selection
by Ya Yue, Minqing Zhang, Peizheng Lai and Fuqiang Di
Appl. Sci. 2025, 15(18), 10282; https://doi.org/10.3390/app151810282 - 22 Sep 2025
Viewed by 778
Abstract
To address the issues of image quality degradation and file size expansion encountered during reversible data hiding (RDH) of JPEG images, a JPEG reversible data hiding algorithm based on block smoothness estimation and optimal zero coefficient selection is proposed. Firstly, a block smoothness [...] Read more.
To address the issues of image quality degradation and file size expansion encountered during reversible data hiding (RDH) of JPEG images, a JPEG reversible data hiding algorithm based on block smoothness estimation and optimal zero coefficient selection is proposed. Firstly, a block smoothness estimation strategy is designed based on the number of zero coefficients and non-zero quantisation table values within DCT blocks, prioritising DCT blocks with higher smoothness for information embedding. Subsequently, under a given embedding payload, an optimal zero coefficient selection strategy is introduced. Blocks are partitioned into embedding regions and non-embedding regions based on a preset position threshold T. Within embedding regions, the frequency of zero coefficients at different positions across all blocks is statistically analysed, with embedding prioritised at positions exhibiting the highest zero coefficient frequency to enhance embedding efficiency. Concurrently, by setting positive and negative displacement gaps to constrain the modification range of non-zero coefficients, invalid shifts are minimised. This further enhances visual quality while controlling file expansion. Experimental results demonstrate that, compared to existing algorithms, the proposed method achieves a peak signal-to-noise ratio improvement of 0.75 to 3.62 dB under fixed embedding capacity. File expansion is reduced by 1038 to 2243 bits, whilst enabling fully reversible image restoration. Full article
Show Figures

Figure 1

29 pages, 419 KB  
Article
Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation
by Kwangsu Lee
Mathematics 2025, 13(17), 2854; https://doi.org/10.3390/math13172854 - 4 Sep 2025
Viewed by 933
Abstract
Anonymous identity-based encryption (AIBE) is an extension of identity-based encryption (IBE) that enhances the privacy of a ciphertext by providing ciphertext anonymity. In this paper, we introduce the concept of revocable IBE with anonymous revocation (RIBE-AR), which can issue an update key and [...] Read more.
Anonymous identity-based encryption (AIBE) is an extension of identity-based encryption (IBE) that enhances the privacy of a ciphertext by providing ciphertext anonymity. In this paper, we introduce the concept of revocable IBE with anonymous revocation (RIBE-AR), which can issue an update key and hide the revoked set of the update key that efficiently revokes private keys of AIBE. We first define the security models of RIBE-AR and propose an efficient RIBE-AR scheme in bilinear groups. Our RIBE-AR scheme is similar to the existing RIBE scheme in terms of efficiency, but it is the first RIBE scheme to provide additional ciphertext anonymity and revocation privacy. We show that our RIBE-AR scheme provides selective message privacy, selective identity privacy, and selective revocation privacy. Full article
(This article belongs to the Special Issue New Advances in Cryptographic Theory and Application)
Back to TopTop