A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …

[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

VAE-Stega: linguistic steganography based on variational auto-encoder

ZL Yang, SY Zhang, YT Hu, ZW Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In recent years, linguistic steganography based on text auto-generation technology has
been greatly developed, which is considered to be a very promising but also a very …

Robust multi-bit natural language watermarking through invariant features

KY Yoo, W Ahn, J Jang, N Kwak - arXiv preprint arXiv:2305.01904, 2023 - arxiv.org
Recent years have witnessed a proliferation of valuable original natural language contents
found in subscription-based media outlets, web novel platforms, and outputs of large …

Watermarks in the sand: Impossibility of strong watermarking for generative models

H Zhang, BL Edelman, D Francati, D Venturi… - arXiv preprint arXiv …, 2023 - arxiv.org
Watermarking generative models consists of planting a statistical signal (watermark) in a
model's output so that it can be later verified that the output was generated by the given …

TARDB-Net: triple-attention guided residual dense and BiLSTM networks for hyperspectral image classification

W Cai, B Liu, Z Wei, M Li, J Kan - Multimedia Tools and Applications, 2021 - Springer
Each sample in the hyperspectral remote sensing image has high-dimensional features and
contains rich spatial and spectral information, which greatly increases the difficulty of feature …

Collaborative prediction and detection of DDoS attacks in edge computing: A deep learning-based approach with distributed SDN

H Zhou, Y Zheng, X Jia, J Shu - Computer Networks, 2023 - Elsevier
Edge computing (EC) has greatly facilitated the deployment of networked services with fast
responses and low bandwidth, by deploying computing and storage at the network edge …

Neural linguistic steganography

ZM Ziegler, Y Deng, AM Rush - arXiv preprint arXiv:1909.01496, 2019 - arxiv.org
Whereas traditional cryptography encrypts a secret message into an unintelligible form,
steganography conceals that communication is taking place by encoding a secret message …

Novel linguistic steganography based on character-level text generation

L Xiang, S Yang, Y Liu, Q Li, C Zhu - Mathematics, 2020 - mdpi.com
With the development of natural language processing, linguistic steganography has become
a research hotspot in the field of information security. However, most existing linguistic …

Provably secure generative linguistic steganography

S Zhang, Z Yang, J Yang, Y Huang - arXiv preprint arXiv:2106.02011, 2021 - arxiv.org
Generative linguistic steganography mainly utilized language models and applied
steganographic sampling (stegosampling) to generate high-security steganographic text …