期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
GAN-GLS:Generative Lyric Steganography Based on Generative Adversarial Networks 被引量:1
1
作者 Cuilin Wang Yuling Liu +1 位作者 Yongju Tong Jingwen Wang 《Computers, Materials & Continua》 SCIE EI 2021年第10期1375-1390,共16页
Steganography based on generative adversarial networks(GANs)has become a hot topic among researchers.Due to GANs being unsuitable for text fields with discrete characteristics,researchers have proposed GANbased stegan... Steganography based on generative adversarial networks(GANs)has become a hot topic among researchers.Due to GANs being unsuitable for text fields with discrete characteristics,researchers have proposed GANbased steganography methods that are less dependent on text.In this paper,we propose a new method of generative lyrics steganography based on GANs,called GAN-GLS.The proposed method uses the GAN model and the largescale lyrics corpus to construct and train a lyrics generator.In this method,the GAN uses a previously generated line of a lyric as the input sentence in order to generate the next line of the lyric.Using a strategy based on the penalty mechanism in training,the GAN model generates non-repetitive and diverse lyrics.The secret information is then processed according to the data characteristics of the generated lyrics in order to hide information.Unlike other text generation-based linguistic steganographic methods,our method changes the way that multiple generated candidate items are selected as the candidate groups in order to encode the conditional probability distribution.The experimental results demonstrate that our method can generate highquality lyrics as stego-texts.Moreover,compared with other similar methods,the proposed method achieves good performance in terms of imperceptibility,embedding rate,effectiveness,extraction success rate and security. 展开更多
关键词 text steganography generative adversarial networks text generation generated lyric
下载PDF
Coverless Text Hiding Method Based on Improved Evaluation Index and One-Bit Embedding
2
作者 Ning Wu Yi Yang +4 位作者 Lian Li Zhongliang Yang Poli Shang Weibo Ma Zhenru Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第9期1035-1048,共14页
In the field of information hiding,text is less redundant,which leads to less space to hide information and challenging work for researchers.Based on the Markov chain model,this paper proposes an improved evaluation i... In the field of information hiding,text is less redundant,which leads to less space to hide information and challenging work for researchers.Based on the Markov chain model,this paper proposes an improved evaluation index and onebit embedding coverless text steganography method.In the steganography process,this method did not simply take the transition probability as the optimization basis of the steganography model,but combined it with the sentence length in the corresponding nodes in the model to gauge sentence quality.Based on this,only two optimal conjunctions of the current words are retained in the method to generate sentences of higher quality.Because the size of the training text dataset is generally large,this leads to higher complexity of the steganographic model;hence,fewer repetitions of the generated steganographic sentences occur.Different datasets and methods were selected to test the quality of the model.The results indicate that our method can achieve higher hiding capacity and has better concealment capability. 展开更多
关键词 Coverless text steganography Markov chain evaluation index onebit embedding
下载PDF
Provably Secure Information Hiding via Short Text in Social Networking Tools 被引量:2
3
作者 Wei Ren Yuliang Liu Junge Zhao 《Tsinghua Science and Technology》 EI CAS 2012年第3期225-231,共7页
Utilizing OnLine Short Text (OLST) in social networking tools such as microblogs, instant messag- ing platforms, and short message service via smart phones has become a routine in daily life. OLST is ap- pealing for... Utilizing OnLine Short Text (OLST) in social networking tools such as microblogs, instant messag- ing platforms, and short message service via smart phones has become a routine in daily life. OLST is ap- pealing for personal covert communication because it can hide information in a very short carrier text, and this concealment is hard to detect due to the diversity of normal traffic. However, designing appropriate schemes confronts several challenges: they need to be provably secure, and their performance needs to maintain high efficiency and handy usability due to the short length of OLST messages. In this paper, we propose a family of customized schemes known as HiMix, HiCod, HiOpt, and HiPhs for text steganography in OLST. These schemes are evaluated in terms of their security and their performance with regard to two metrics that address the particular characteristics of OLST: hiding rate and hiding ease. All proposed schemes are proved to be at least computationally secure, and their performance in terms of hiding rate and hiding ease justifies their applicability in social networking tools that utilize OLST. 展开更多
关键词 information hiding provable security text steganography covert communication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部