2022
DOI: 10.1109/lsp.2022.3152126
|View full text |Cite
|
Sign up to set email alerts
|

ALiSa: Acrostic Linguistic Steganography Based on BERT and Gibbs Sampling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Generative methods aim to perform information hiding on the text they generate, generating text and then embedding data within it [30]. The disadvantage of this approach is that hiding information on the generated text can be statistically detectable [31].…”
Section: Introductionmentioning
confidence: 99%
“…Generative methods aim to perform information hiding on the text they generate, generating text and then embedding data within it [30]. The disadvantage of this approach is that hiding information on the generated text can be statistically detectable [31].…”
Section: Introductionmentioning
confidence: 99%
“…In the field of linguistic steganography, information can be concealed by altering word order, using specific grammar structures, or incorporating unusual vocabulary in the text. The hidden information may include encrypted messages, secret instructions, or any other content that needs to be kept confidential [ 2 ]. The applications of linguistic steganography are diverse and have far-reaching implications in the fields of information security and network security.…”
Section: Introductionmentioning
confidence: 99%
“…The majority of early steganographic algorithms were originally developed for digital images. In recent years, thanks to deep learning, the performance of natural language processing technology has been greatly improved, which promotes utilizing text for steganography to become a hot topic [4,5,6,7,8]. Compared to image steganography, natural language steganography (or say text steganography) overcomes the problem of robustness, i.e., image steganography may be failed due to lossy compression, but texts can survive from noisy channel.…”
Section: Introductionmentioning
confidence: 99%