2020
DOI: 10.3934/mbe.2020055
|View full text |Cite
|
Sign up to set email alerts
|

A convolutional neural network-based linguistic steganalysis for synonym substitution steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
37
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(37 citation statements)
references
References 2 publications
0
37
0
Order By: Relevance
“…Our future work will focus on the development of a more robust BCI transfer learning algorithm that still has good performance and can be used online. We aim to mix our algorithm with some other algorithms [37][38][39] in future work. We believe that the transfer learning algorithm related to Riemannian Geometry has a promising future.…”
Section: Discussionmentioning
confidence: 99%
“…Our future work will focus on the development of a more robust BCI transfer learning algorithm that still has good performance and can be used online. We aim to mix our algorithm with some other algorithms [37][38][39] in future work. We believe that the transfer learning algorithm related to Riemannian Geometry has a promising future.…”
Section: Discussionmentioning
confidence: 99%
“…With the development of communication technology and the coming of information age, people are more and more aware of the important role of information security [71][72][73][74][75][76], and the research of various security protection has become the current research hotspot [77][78][79][80][81][82]. As an important part of information security transmission, random number generator (RNG) has been paid more and more attention.…”
Section: Introductionmentioning
confidence: 99%
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%