2023
DOI: 10.1109/tnse.2022.3186393
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…Multimodal data in 6G networks will be heavily reliant on network and information security as a result of this trend, which creates signi cant privacy protection concerns. Scholars have so been interested in privacy protection techniques based on information hiding [21]. This paper focuses on the con dentiality and privacy in transmitting information over the sixth generation wireless communications network.…”
Section: Availabilitymentioning
confidence: 99%
“…Multimodal data in 6G networks will be heavily reliant on network and information security as a result of this trend, which creates signi cant privacy protection concerns. Scholars have so been interested in privacy protection techniques based on information hiding [21]. This paper focuses on the con dentiality and privacy in transmitting information over the sixth generation wireless communications network.…”
Section: Availabilitymentioning
confidence: 99%
“…Unless otherwise specified, all images are resized to 128×128. Specifically, we download the 2017 training images from the official COCO website 1 . The we randomly choose 10000 images from it as the training set, 1000 images as the test set.…”
Section: A Experiments Setup Metrics and Baseline 1) Experiments Setupmentioning
confidence: 99%
“…With the development of communication technology, large amounts of images are spread over the networks, which makes the copyright protection become an increasingly important problem [1], [2], [3]. Digital watermarking [4] is a technique that embeds a marked message into multimedia files while maintaining the visual quality of the original file and providing robustness against various noise attacks, including random cropping, blurring, and JPEG (Joint Photographic Experts Group) compression.…”
mentioning
confidence: 99%
“…In [64], the authors proposed a technique for data hiding relies on multi-dimensional featuresfusion to protect privacy in 6G networks.The authors implemented preprocessing on the private data to encrypt it for enhanced security. Then, they implemented multi-dimensional feature extraction on the carrier and merged these features to get the final feature area.…”
Section: Related Workmentioning
confidence: 99%