2019
DOI: 10.48550/arxiv.1909.01496
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Neural Linguistic Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(21 citation statements)
references
References 0 publications
0
21
0
Order By: Relevance
“…On each symbol recursion, an interval [l i , u i ) (which is initially set to [0, 1)) is successively partioned according to the cumulative distribution of the symbol, and narrowed down by taking the sub-interval containing the symbol value as the new interval [l i+1 , u i+1 ). Following Zigler et al [43], we adopted a fixed-precision implementation of arithmetic coding [44].…”
Section: B Stegosampling Based On Arithmetic Codingmentioning
confidence: 99%
See 1 more Smart Citation
“…On each symbol recursion, an interval [l i , u i ) (which is initially set to [0, 1)) is successively partioned according to the cumulative distribution of the symbol, and narrowed down by taking the sub-interval containing the symbol value as the new interval [l i+1 , u i+1 ). Following Zigler et al [43], we adopted a fixed-precision implementation of arithmetic coding [44].…”
Section: B Stegosampling Based On Arithmetic Codingmentioning
confidence: 99%
“…If the impact of truncation, quantization and blocking of secret message is ignored (prc tends to infinity and the secret message m has infinite length), q(x i |x <i ) is actually identical to p(x i |x <i ) and it is able to achieve the optimal imperceptibility. Arithmetic coding is widely applied in generative linguistic and audio steganography due to its advantage in embedding capacity and imperceptibility [34], [43], [46]. But as far as we know, there hasn't been any research about generative image steganography with arithmetic-coding-based stegosampling.…”
Section: Imperceptibilitymentioning
confidence: 99%
“…However, text is one of the most commonly used communication carriers in people's daily life [11]. Therefore, studying how to effectively embed hidden information in texts has attracted a lot of researchers' interest [9], [12]- [20]. Some early text steganography techniques were mainly implemented by making minor modifications to the text, such as adjusting word spacing [21], or by synonymizing specific words and phrases [22].…”
mentioning
confidence: 99%
“…These technologies are good attempts, but usually they can only have a very low embedding rate, so it is difficult for them to be practical [9]. Therefore, later researchers began to try to use the text automatic generation model to achieve information embedding [9], [16]- [20].…”
mentioning
confidence: 99%
See 1 more Smart Citation