4.6 Article

LZW-CIE: a high-capacity linguistic steganography based on LZW char index encoding

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Linguistic Steganography Based on Adaptive Probability Distribution

Xuejing Zhou et al.

Summary: This article proposes a novel linguistic steganographic model based on adaptive probability distribution and generative adversarial network, which can hide secret messages in the generated text and improve the security performance of steganography.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features

Xin Liao et al.

Summary: This article introduces the application of multiple image steganography in the era of cloud storage, discusses payload distribution strategies for enhancing security performance, and provides supporting evidence through experiments.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding

Norah Alanazi et al.

Summary: This paper presents a novel approach for hiding secret bits within Arabic text using Unicode standard, utilizing contextual form of Arabic characters and additional characters to enhance capacity and security. Testing results show the superiority of these techniques and their potential wide adoption in improving Arabic text steganography quality.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Mathematics

The Exact Solutions of Stochastic Fractional-Space Kuramoto-Sivashinsky Equation by Using (G′/G)-Expansion Method

Wael W. Mohammed et al.

Summary: This paper considers the exact solutions of the stochastic fractional-space Kuramoto-Sivashinsky equation forced by multiplicative noise. The G'/G-expansion method is applied to obtain these solutions. The influence of the stochastic term on the exact solutions is also demonstrated.

MATHEMATICS (2021)

Review Chemistry, Multidisciplinary

A Comparative Analysis of Arabic Text Steganography

Reema Thabit et al.

Summary: Text steganography is an effective means of protecting sensitive information, and further research on Arabic text steganography is needed for more comprehensive understanding and development in this field.

APPLIED SCIENCES-BASEL (2021)

Article Engineering, Electrical & Electronic

Linguistic Generative Steganography With Enhanced Cognitive-Imperceptibility

Zhongliang Yang et al.

Summary: Linguistic generative steganography has seen significant developments in recent years, with an emphasis on optimizing the imperceptibility of generated steganographic text. However, a new challenge of cognitive-imperceptibility has been identified, highlighting the need to control semantic expression in order to mitigate potential security risks. Preliminary attempts have shown promising results in enhancing the cognitive-imperceptibility of generated steganographic text.

IEEE SIGNAL PROCESSING LETTERS (2021)

Article Computer Science, Theory & Methods

VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder

Zhong-Liang Yang et al.

Summary: In recent years, linguistic steganography based on text auto-generation technology has developed significantly, but the quality of generated steganographic text cannot fully ensure steganographic security. This paper proposes a new linguistic steganography based on VAE, which can greatly improve the imperceptibility of generated steganographic sentences according to experimental results.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Chemistry, Medicinal

Bidirectional Molecule Generation with Recurrent Neural Networks

Francesca Grisoni et al.

JOURNAL OF CHEMICAL INFORMATION AND MODELING (2020)

Article Computer Science, Information Systems

STBS-Stega: Coverless text steganography based on state transition-binary sequence

Ning Wu et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2020)

Article Mathematics

Novel Linguistic Steganography Based on Character-Level Text Generation

Lingyun Xiang et al.

MATHEMATICS (2020)

Article Computer Science, Information Systems

Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization

Jagan Raj Jayapandiyan et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A high capacity algorithm for information hiding in Arabic text

Ahmed Taha et al.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

A modified approach to data hiding in Microsoft Word documents by change-tracking technique

Susmita Mahato et al.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2020)

Article Computer Science, Theory & Methods

RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks

Zhong-Liang Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

Convolutional Neural Network Based Text Steganalysis

Juan Wen et al.

IEEE SIGNAL PROCESSING LETTERS (2019)

Article Engineering, Electrical & Electronic

A Fast and Efficient Text Steganalysis Method

Zhongliang Yang et al.

IEEE SIGNAL PROCESSING LETTERS (2019)

Article Engineering, Electrical & Electronic

Generating steganographic image description by dynamic synonym substitution

Mengdi Li et al.

SIGNAL PROCESSING (2019)

Article Computer Science, Information Systems

Invisible steganography via generative adversarial networks

Ru Zhang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Proceedings Paper Computer Science, Theory & Methods

Capacity Investigation of Markov Chain-Based Statistical Text Steganography: Arabic Language Case

Nujud Alghamdi et al.

2019 ASIA PACIFIC INFORMATION TECHNOLOGY CONFERENCE (APIT 2019) (2019)

Article Mathematical & Computational Biology

Text steganography on RNN-Generated lyrics

Yongju Tong et al.

MATHEMATICAL BIOSCIENCES AND ENGINEERING (2019)

Article Computer Science, Information Systems

Generative Steganography by Sampling

Zhuo Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Coverless Plain Text Steganography Based on Character Features

Kaixi Wang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A linguistic steganography based on word indexing compression and candidate selection

Lingyun Xiang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Telecommunications

Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach

Nuzhat Naqvi et al.

WIRELESS PERSONAL COMMUNICATIONS (2018)

Article Computer Science, Information Systems

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding

Lingyun Xiang et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)

Article Computer Science, Information Systems

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding

Lingyun Xiang et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)

Article Engineering, Multidisciplinary

A high capacity text steganography scheme based on LZW compression and color coding

Aruna Malik et al.

ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH (2017)

Article Computer Science, Information Systems

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model

Yubo Luo et al.

KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS (2016)

Article Automation & Control Systems

A Text Steganography Method Based on Markov Chains

A. N. Shniperov et al.

AUTOMATIC CONTROL AND COMPUTER SCIENCES (2016)

Article Computer Science, Theory & Methods

Investigation on Cost Assignment in Spatial Image Steganography

Bin Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Artificial Intelligence

Natural language watermarking via morphosyntactic alterations

Hasan Mesut Meral et al.

COMPUTER SPEECH AND LANGUAGE (2009)

Article Computer Science, Software Engineering

A reversible information hiding scheme using left-right and up-down chinese character representation

Zhi-Hui Wang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2009)