2019
DOI: 10.1109/tifs.2018.2871746
|View full text |Cite
|
Sign up to set email alerts
|

RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
165
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 208 publications
(165 citation statements)
references
References 38 publications
0
165
0
Order By: Relevance
“…These steganographic methods can be divided into different types according to different kinds of carrier, like image steganography [5], text steganography [7], audio steganography [6] and so on. In addition, according to different steganography means, they can also be classified to modification-based steganography [5] and generation-based steganography [6,7]. Figure 1 shows the overall framework of the "Prisoners' Model" and we can model it in the following mathematical form.…”
Section: Steganography and Steganalysis Under The "Prisoners' Model"mentioning
confidence: 99%
See 1 more Smart Citation
“…These steganographic methods can be divided into different types according to different kinds of carrier, like image steganography [5], text steganography [7], audio steganography [6] and so on. In addition, according to different steganography means, they can also be classified to modification-based steganography [5] and generation-based steganography [6,7]. Figure 1 shows the overall framework of the "Prisoners' Model" and we can model it in the following mathematical form.…”
Section: Steganography and Steganalysis Under The "Prisoners' Model"mentioning
confidence: 99%
“…The permutation entropy distribution of sentiment values of Twitter published by normal users within one month and steganographic Twitter generated by model proposed in[7].…”
mentioning
confidence: 99%
“…Instead of using a fixed-length coding (one stegotext token always encodes k bits in Bins), VLC encodes one or more bits per generated token (Yang et al, 2018). VLC constructs a Huffman coding of Σ at each step according to P[·|h; ].…”
Section: Variable-length Coding (Vlc)mentioning
confidence: 99%
“…
We show that the imperceptibility of several existing linguistic steganographic systems (Fang et al, 2017;Yang et al, 2018) relies on implicit assumptions on statistical behaviors of fluent text. We formally analyze them and empirically evaluate these assumptions.
…”
mentioning
confidence: 98%
“…Text is widely used as an important medium but it is difficult to use it as an information-hiding carrier because of its low redundancy. 5,6 For the reason, the research results of text-based information-hiding technology are much less than those of image, video, and other multimedia, so the significance of the research is become more prominent. Previous works on text information hiding could be summarized as follows: a.…”
Section: Introductionmentioning
confidence: 99%