4.7 Article

Novel Linguistic Steganography Based on Character-Level Text Generation

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Coverless real-time image information hiding based on image block matching and dense convolutional network

Yuanjing Luo et al.

JOURNAL OF REAL-TIME IMAGE PROCESSING (2020)

Article Computer Science, Information Systems

Payload location for JPEG image steganography based on co-frequency sub-image filtering

Jie Wang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2020)

Article Computer Science, Information Systems

Saliency Detection via the Improved Hierarchical Principal Component Analysis Method

Yuantao Chen et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Article Computer Science, Information Systems

Deep hierarchical encoding model for sentence semantic matching

Wenpeng Lu et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2020)

Article Computer Science, Information Systems

A novel haze image steganography method via cover-source switching

Baojun Qi et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2020)

Article Mathematical & Computational Biology

A convolutional neural network-based linguistic steganalysis for synonym substitution steganography

Lingyun Xiang et al.

MATHEMATICAL BIOSCIENCES AND ENGINEERING (2020)

Article Computer Science, Theory & Methods

RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks

Zhong-Liang Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

Convolutional Neural Network Based Text Steganalysis

Juan Wen et al.

IEEE SIGNAL PROCESSING LETTERS (2019)

Article Engineering, Electrical & Electronic

Generating steganographic image description by dynamic synonym substitution

Mengdi Li et al.

SIGNAL PROCESSING (2019)

Article Mathematical & Computational Biology

CAPTCHA recognition based on deep convolutional neural network

Jing Wang et al.

MATHEMATICAL BIOSCIENCES AND ENGINEERING (2019)

Article Mathematical & Computational Biology

Text steganography on RNN-Generated lyrics

Yongju Tong et al.

MATHEMATICAL BIOSCIENCES AND ENGINEERING (2019)

Article Computer Science, Information Systems

Air Quality Forecasting Based on Gated Recurrent Long Short Term Memory Model in Internet of Things

Baowei Wang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding

Yun Tan et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A linguistic steganography based on word indexing compression and candidate selection

Lingyun Xiang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

A Word-Embedding-Based Steganalysis Method for Linguistic Steganography via Synonym Substitution

Lingyun Xiang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding

Lingyun Xiang et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)

Article Computer Science, Information Systems

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding

Lingyun Xiang et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)

Article Automation & Control Systems

A Text Steganography Method Based on Markov Chains

A. N. Shniperov et al.

AUTOMATIC CONTROL AND COMPUTER SCIENCES (2016)

Proceedings Paper Computer Science, Theory & Methods

Coverless Text Information Hiding Method Based on the Word Rank Map

Jianjun Zhang et al.

CLOUD COMPUTING AND SECURITY, ICCCS 2016, PT I (2016)

Review Computer Science, Information Systems

Video steganography: a comprehensive review

Mennatallah M. Sadek et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Theory & Methods

Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec

Yong Feng Huang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Artificial Intelligence

Natural language watermarking via morphosyntactic alterations

Hasan Mesut Meral et al.

COMPUTER SPEECH AND LANGUAGE (2009)