2017
DOI: 10.1587/transinf.2016edp7358
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding

Abstract: SUMMARY In order to prevent the synonym substitution breaking the balance among frequencies of synonyms and improve the statistical undetectability, this paper proposed a novel linguistic steganography based on synonym run-length encoding. Firstly, taking the relative word frequency into account, the synonyms appeared in the text are digitized into binary values and expressed in the form of runs. Then, message are embedded into the parities of runs' lengths by self-adaptively making a positive or negative syno… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(10 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…This is done to reduce the number of incorrect detection made by the proposed scheme as the weight assigned to different input sources of detection will be eliminating the outliers. This phase considered two cases: (1) video (human pose analysis [24], person and visual identification [25][26][27], action recognition [28]) and (2) audio data collected from sensors (linguistic analysis [29,30]). The output of this phase is obtained on the basis of the following function:…”
Section: Phase 2: Ensemble Approach For Abnormality Trackingmentioning
confidence: 99%
“…This is done to reduce the number of incorrect detection made by the proposed scheme as the weight assigned to different input sources of detection will be eliminating the outliers. This phase considered two cases: (1) video (human pose analysis [24], person and visual identification [25][26][27], action recognition [28]) and (2) audio data collected from sensors (linguistic analysis [29,30]). The output of this phase is obtained on the basis of the following function:…”
Section: Phase 2: Ensemble Approach For Abnormality Trackingmentioning
confidence: 99%
“…There is no doubt that the data collected by the underlying IoT is the basis of the upper-layer decision and the foundation for all applications, which requires efficient energy protocols [49]. In addition, the data protection and application become an unrealistic target if the data collected is wrong and untrustworthy, further leading to unnecessary energy costs [50,51]. However, traditional methods cannot solve this problem effectively and reliably.…”
Section: State Of the Art Of Mobile Edge-based Sensor-cloudsmentioning
confidence: 99%
“…Linguistic steganography based on text modification takes advantage of equivalent linguistic transformations to slightly modify the text content to hide the secret message while preserving the meaning of the original text. The linguistic transformations include syntactic transformations [10,13], synonym substitutions [14][15][16][17], misspelled word substitutions [18] and so on. This type of linguistic steganography has high imperceptibility, but limited embedding capacity, as the alternative transformations in a text are always very rare.…”
Section: Introductionmentioning
confidence: 99%