StegAbb: A cover-generating text steganographic tool using GPT-3 language modeling for covert communication across SDRs

MV Namitha, GR Manjula, MC Belavagi - IEEE Access, 2024 - ieeexplore.ieee.org
The textual data unlike images, videos, and audio will not get much distorted while
transmitting across the network. Steganography is the process of hiding secret data inside …

ALiSa: Acrostic linguistic steganography based on BERT and Gibbs sampling

B Yi, H Wu, G Feng, X Zhang - IEEE Signal Processing Letters, 2022 - ieeexplore.ieee.org
In this letter, we propose a novel linguistic steganographic method that directly conceals a
token-level secret message in a seemingly-natural steganographic text generated by the off …

[PDF][PDF] Automated Cover Text-based Linguistic Steganographic Model Using LSTM and Huffman Coding

JJ Tom, BA Onyekwelu, A Wilfred, FM Aliu, GN Odachi - Memory, 2023 - researchgate.net
One of the methods used in text steganography is linguistic method. Carrier modification-
based linguistic steganography is vulnerable to various attacks. Recent works in deep …

Generative steganography based on long readable text generation

Y Cao, Z Zhou, C Chakraborty, M Wang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Text steganography has received a lot of attention in the application of covert
communication. How to ensure desirable capacity and imperceptibility has become a key …

An analysis of alphabet-based techniques in text steganography

B Osman, A Yasin, MN Omar - Journal of Telecommunication …, 2016 - jtec.utem.edu.my
Steganography and cryptography are methods in information hiding. Cryptography
scrambles the secret message, whereas steganography conceals a secret message in a …

CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks

MT Ahvanooey, MX Zhu, W Mazurczyk, Q Li… - Journal of Information …, 2022 - Elsevier
While encryption can prevent unauthorized access to a secret message, it does not provide
undetectability of covert communications over the public network. Implementing a highly …

A multi-layer hybrid text steganography for secret communication using word tagging and RGB color coding

AF Al-Azzawi - International Journal of Network Security & Its …, 2018 - papers.ssrn.com
This paper introduces a multi-layer hybrid text steganography approach by utilizing word
tagging and recoloring. Existing approaches are planned to be either progressive in getting …

A character based steganography using masked language modeling

E Öztürk, AŞ Mesut, ÖA Fıdan - IEEE Access, 2024 - ieeexplore.ieee.org
In this study, a steganography method based on BERT transformer model is proposed for
hiding text data in cover text. The aim is to hide information by replacing specific words …

CPG-LS: Causal Perception Guided Linguistic Steganography

L Xiang, J Xia, Y Liu, Y Gui - IEEE Signal Processing Letters, 2023 - ieeexplore.ieee.org
The current lexical substitution-based linguistic steganography primarily determines the
substitutions by their linguistic suitability, overlooking the disparity in their capability against …

Encrypted information transmission by enhanced steganography and image transformation

BK Pandey, D Pandey, A Agarwal - International Journal of …, 2022 - igi-global.com
A deep neural network is used to develop a covert communication and textual data
extraction strategy based on steganography and picture compression in such work. The …