{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:31:58Z","timestamp":1773793918363,"version":"3.50.1"},"reference-count":37,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T00:00:00Z","timestamp":1745884800000},"content-version":"vor","delay-in-days":118,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Orthogonal frequency division multiplexing (OFDM) is a widely used modern communications technology due to its resistance to selective frequency fading and efficient use of spectrum. However, the security of OFDM signals remains a source of serious concern, especially in the face of network encryption that aims to disrupt communications or extract sensitive information. Hiding information is considered one of the important applications that has recently become the focus of researchers\u2019 attention, especially important media such as images. In this work, a robust model is proposed to combine OFDM during information hiding. Secret message is contained within the OFDM signal symbols, which are reinforce with a cyclic prefix as an effective additional solution in the security of the OFDM signal against communication channels. Accordingly, the work will contribute to developing an innovative approach to enhancing the security of communication channels and data security in OFDM systems and preventing malicious attacks aimed at disrupting communication or extracting important information. The proposed system uses advanced algorithms to modify the size and phase of the OFDM subcarriers and hide secret information within the transmitted signal by segmenting the image hierarchically into small segments, arranging them randomly, and embedding secret message in a random order to the image pixels to increase data security. By analyzing theoretical simulations that demonstrate the performance and effectiveness of the OFDM steganography system using CIR and SINR parameters, the results demonstrate the effectiveness of cyclic prefix inclusion as a viable solution to enhance the security of OFDM signals in digital communications networks. The improvement was 1.9 and 8\u2009dB in CIR and SINRL, respectively, for the proposed system compared to the traditional system, and the results obtained proved the merit of the system through steganography by reducing imperceptibility by increasing PSNR. In conclusion, the integration of steganography technology with OFDM contributes to the development of secure communication protocols, paving the way for the development of more flexible and confidential communication systems in modern digital networks.<\/jats:p>","DOI":"10.1155\/jece\/2468585","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T21:19:02Z","timestamp":1745961542000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Securing Communication Channels: An Advanced Steganography Approach With Orthogonal Frequency Division Multiplexing (OFDM)"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0006-1657","authenticated-orcid":false,"given":"Ammar Mohammedali","family":"Fadhil","sequence":"first","affiliation":[]},{"given":"Ali Y.","family":"Jaber","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,4,29]]},"reference":[{"key":"e_1_2_8_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.07.120"},{"key":"e_1_2_8_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpel.2024.3377260"},{"key":"e_1_2_8_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14844-w"},{"key":"e_1_2_8_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09464-w"},{"key":"e_1_2_8_5_2","doi-asserted-by":"publisher","DOI":"10.15622\/ia.22.5.6"},{"key":"e_1_2_8_6_2","doi-asserted-by":"publisher","DOI":"10.1515\/joc-2021-0029"},{"key":"e_1_2_8_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100460"},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-10077-6"},{"key":"e_1_2_8_9_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218126622500931"},{"key":"e_1_2_8_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-07818-5"},{"key":"e_1_2_8_11_2","first-page":"1","volume-title":"OCEANS 2022-Chennai","author":"Francis J.","year":"2022"},{"key":"e_1_2_8_12_2","doi-asserted-by":"publisher","DOI":"10.1364\/ol.460052"},{"key":"e_1_2_8_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph192013071"},{"key":"e_1_2_8_14_2","doi-asserted-by":"publisher","DOI":"10.4316\/aece.2024.01002"},{"key":"e_1_2_8_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/jlt.2022.3153967"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.1364\/oe.455687"},{"key":"e_1_2_8_17_2","doi-asserted-by":"publisher","DOI":"10.1515\/joc-2022-0018"},{"key":"e_1_2_8_18_2","doi-asserted-by":"publisher","DOI":"10.1364\/oe.488208"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.32985\/ijeces.14.1.8"},{"key":"e_1_2_8_20_2","volume-title":"Bit Inverting Map Method for Improved Steganography Scheme","author":"Fadhil A. M.","year":"2016"},{"key":"e_1_2_8_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/math9212829"},{"key":"e_1_2_8_22_2","volume-title":"Radar Sensing With OTFS: Embracing ISI and ICI to Surpass the Ambiguity Barrier","author":"Furkan Keskin M.","year":"2021"},{"key":"e_1_2_8_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/jlt.2020.2994633"},{"key":"e_1_2_8_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2008.919611"},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2968542"},{"key":"e_1_2_8_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-023-01027-z"},{"key":"e_1_2_8_27_2","doi-asserted-by":"publisher","DOI":"10.3390\/rs14194705"},{"key":"e_1_2_8_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/joe.2021.3076274"},{"key":"e_1_2_8_29_2","doi-asserted-by":"publisher","DOI":"10.11113\/mjfas.v15n2.1146"},{"key":"e_1_2_8_30_2","doi-asserted-by":"crossref","unstructured":"FalihM. FadhilA. ShakirM. andAtiyahB. T. Exploring the Potential of Deep Learning in Smart Grid: Addressing Power Load Prediction and System Fault Diagnosis Challenges 3092 AIP Conference Proceedings 2024 AIP Publishing https:\/\/doi.org\/10.1063\/5.0200012.","DOI":"10.1063\/5.0200012"},{"key":"e_1_2_8_31_2","doi-asserted-by":"crossref","unstructured":"AbedN. K. ShahzadA. andMohammedaliA. An Improve Service Quality of Mobile Banking Using Deep Learning Method for Customer Satisfaction AIP Conference Proceedings 2023 AIP Publishing.","DOI":"10.1063\/5.0152335"},{"key":"e_1_2_8_32_2","doi-asserted-by":"crossref","unstructured":"GrabskiS.andSzczypiorskiK. Steganography in OFDM Symbols of Fast IEEE 802.11 N Networks 2013 IEEE Security and Privacy Workshops 2013 AIP Conference Proceedings 158\u2013164.","DOI":"10.1109\/SPW.2013.20"},{"key":"e_1_2_8_33_2","first-page":"160","volume-title":"International Workshop on Information Hiding","author":"Dutta D. S.","year":"2012"},{"key":"e_1_2_8_34_2","doi-asserted-by":"crossref","unstructured":"ClassenJ. SchulzM. andHollickM. Practical Covert Channels for WiFi Systems 2015 IEEE Conference on Communications and Network Security (CNS) 2015 209\u2013217 https:\/\/doi.org\/10.1109\/cns.2015.7346830 2-s2.0-84966354959.","DOI":"10.1109\/CNS.2015.7346830"},{"key":"e_1_2_8_35_2","doi-asserted-by":"crossref","unstructured":"SchulzM. LinkJ. GringoliF. andHollickM. Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi Proceedings of the 16th Annual International Conference on Mobile Systems Applications and Services June 2018 256\u2013268.","DOI":"10.1145\/3210240.3210333"},{"key":"e_1_2_8_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/icnp49622.2020.9259364"},{"key":"e_1_2_8_37_2","doi-asserted-by":"crossref","unstructured":"SankheK. RestucciaF. D\u2019OroS.et al. Impairment Shift Keying: Covert Signaling by Deep Learning of Controlled Radio Imperfections MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM) 2019 598\u2013603 https:\/\/doi.org\/10.1109\/milcom47813.2019.9021079.","DOI":"10.1109\/MILCOM47813.2019.9021079"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/jece\/2468585","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/jece\/2468585","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/jece\/2468585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:38:57Z","timestamp":1773779937000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/jece\/2468585"}},"subtitle":[],"editor":[{"given":"Rajesh","family":"Khanna","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/jece\/2468585"],"URL":"https:\/\/doi.org\/10.1155\/jece\/2468585","archive":["Portico"],"relation":{},"ISSN":["2090-0147","2090-0155"],"issn-type":[{"value":"2090-0147","type":"print"},{"value":"2090-0155","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-11-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2468585"}}