相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Linguistic Steganography Based on Adaptive Probability Distribution
Xuejing Zhou et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features
Xin Liao et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
Norah Alanazi et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2021)
The Exact Solutions of Stochastic Fractional-Space Kuramoto-Sivashinsky Equation by Using (G′/G)-Expansion Method
Wael W. Mohammed et al.
MATHEMATICS (2021)
A Comparative Analysis of Arabic Text Steganography
Reema Thabit et al.
APPLIED SCIENCES-BASEL (2021)
Linguistic Generative Steganography With Enhanced Cognitive-Imperceptibility
Zhongliang Yang et al.
IEEE SIGNAL PROCESSING LETTERS (2021)
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder
Zhong-Liang Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Bidirectional Molecule Generation with Recurrent Neural Networks
Francesca Grisoni et al.
JOURNAL OF CHEMICAL INFORMATION AND MODELING (2020)
STBS-Stega: Coverless text steganography based on state transition-binary sequence
Ning Wu et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2020)
Novel Linguistic Steganography Based on Character-Level Text Generation
Lingyun Xiang et al.
MATHEMATICS (2020)
Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization
Jagan Raj Jayapandiyan et al.
IEEE ACCESS (2020)
A high capacity algorithm for information hiding in Arabic text
Ahmed Taha et al.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2020)
A modified approach to data hiding in Microsoft Word documents by change-tracking technique
Susmita Mahato et al.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2020)
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks
Zhong-Liang Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Convolutional Neural Network Based Text Steganalysis
Juan Wen et al.
IEEE SIGNAL PROCESSING LETTERS (2019)
A Fast and Efficient Text Steganalysis Method
Zhongliang Yang et al.
IEEE SIGNAL PROCESSING LETTERS (2019)
Generating steganographic image description by dynamic synonym substitution
Mengdi Li et al.
SIGNAL PROCESSING (2019)
Invisible steganography via generative adversarial networks
Ru Zhang et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2019)
Capacity Investigation of Markov Chain-Based Statistical Text Steganography: Arabic Language Case
Nujud Alghamdi et al.
2019 ASIA PACIFIC INFORMATION TECHNOLOGY CONFERENCE (APIT 2019) (2019)
Text steganography on RNN-Generated lyrics
Yongju Tong et al.
MATHEMATICAL BIOSCIENCES AND ENGINEERING (2019)
Generative Steganography by Sampling
Zhuo Zhang et al.
IEEE ACCESS (2019)
A Coverless Plain Text Steganography Based on Character Features
Kaixi Wang et al.
IEEE ACCESS (2019)
A linguistic steganography based on word indexing compression and candidate selection
Lingyun Xiang et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2018)
Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach
Nuzhat Naqvi et al.
WIRELESS PERSONAL COMMUNICATIONS (2018)
A Novel Linguistic Steganography Based on Synonym Run-Length Encoding
Lingyun Xiang et al.
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)
A Novel Linguistic Steganography Based on Synonym Run-Length Encoding
Lingyun Xiang et al.
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)
A high capacity text steganography scheme based on LZW compression and color coding
Aruna Malik et al.
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH (2017)
Text Steganography Based on Ci-poetry Generation Using Markov Chain Model
Yubo Luo et al.
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS (2016)
A Text Steganography Method Based on Markov Chains
A. N. Shniperov et al.
AUTOMATIC CONTROL AND COMPUTER SCIENCES (2016)
Investigation on Cost Assignment in Spatial Image Steganography
Bin Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
Natural language watermarking via morphosyntactic alterations
Hasan Mesut Meral et al.
COMPUTER SPEECH AND LANGUAGE (2009)
A reversible information hiding scheme using left-right and up-down chinese character representation
Zhi-Hui Wang et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2009)