J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
ZL Yang, SY Zhang, YT Hu, ZW Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In recent years, linguistic steganography based on text auto-generation technology has been greatly developed, which is considered to be a very promising but also a very …
Recent years have witnessed a proliferation of valuable original natural language contents found in subscription-based media outlets, web novel platforms, and outputs of large …
Watermarking generative models consists of planting a statistical signal (watermark) in a model's output so that it can be later verified that the output was generated by the given …
W Cai, B Liu, Z Wei, M Li, J Kan - Multimedia Tools and Applications, 2021 - Springer
Each sample in the hyperspectral remote sensing image has high-dimensional features and contains rich spatial and spectral information, which greatly increases the difficulty of feature …
Edge computing (EC) has greatly facilitated the deployment of networked services with fast responses and low bandwidth, by deploying computing and storage at the network edge …
Whereas traditional cryptography encrypts a secret message into an unintelligible form, steganography conceals that communication is taking place by encoding a secret message …
L Xiang, S Yang, Y Liu, Q Li, C Zhu - Mathematics, 2020 - mdpi.com
With the development of natural language processing, linguistic steganography has become a research hotspot in the field of information security. However, most existing linguistic …
S Zhang, Z Yang, J Yang, Y Huang - arXiv preprint arXiv:2106.02011, 2021 - arxiv.org
Generative linguistic steganography mainly utilized language models and applied steganographic sampling (stegosampling) to generate high-security steganographic text …