{"id":"https://openalex.org/W4385756656","doi":"https://doi.org/10.1109/lsp.2023.3302749","title":"A Secure and Disambiguating Approach for Generative Linguistic Steganography","display_name":"A Secure and Disambiguating Approach for Generative Linguistic Steganography","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385756656","doi":"https://doi.org/10.1109/lsp.2023.3302749"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2023.3302749","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2023.3302749","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017568845","display_name":"Ruiyi Yan","orcid":"https://orcid.org/0009-0000-4127-6212"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruiyi Yan","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014198279","display_name":"Yating Yang","orcid":"https://orcid.org/0000-0002-2303-3740"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yating Yang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089646653","display_name":"Tian Song","orcid":"https://orcid.org/0000-0003-3275-6593"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Song","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5017568845"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":1.7067,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.86637739,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"30","issue":null,"first_page":"1047","last_page":"1051"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7732504606246948},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.7401869893074036},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.6390090584754944},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6280331611633301},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5550562739372253},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5428663492202759},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5246130228042603},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35839012265205383},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.17277386784553528},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1709776222705841}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7732504606246948},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.7401869893074036},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.6390090584754944},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6280331611633301},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5550562739372253},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5428663492202759},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5246130228042603},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35839012265205383},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.17277386784553528},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1709776222705841},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2023.3302749","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2023.3302749","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1527181506","https://openalex.org/W1878907771","https://openalex.org/W1966136723","https://openalex.org/W2019096529","https://openalex.org/W2032950184","https://openalex.org/W2045652876","https://openalex.org/W2082603400","https://openalex.org/W2320990637","https://openalex.org/W2568310503","https://openalex.org/W2618218947","https://openalex.org/W2898323380","https://openalex.org/W2963444877","https://openalex.org/W2971140743","https://openalex.org/W3085519426","https://openalex.org/W3162945253","https://openalex.org/W3172226021","https://openalex.org/W3175755605","https://openalex.org/W3187018546","https://openalex.org/W3210326237","https://openalex.org/W4404783293","https://openalex.org/W6846596284"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2930153478","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W3154843532","https://openalex.org/W2068740952","https://openalex.org/W2182496537","https://openalex.org/W2792878404"],"abstract_inverted_index":{"Segmentation":[0],"ambiguity":[1,129],"in":[2,26,122,140],"generative":[3],"linguistic":[4,56],"steganography":[5],"could":[6],"induce":[7],"decoding":[8],"errors.":[9],"One":[10],"existing":[11,138],"dis-ambiguating":[12],"way":[13],"is":[14,93,113],"removing":[15],"the":[16,22,87,137],"tokens":[17,75],"whose":[18],"mapping":[19],"words":[20],"are":[21],"prefixes":[23],"of":[24,35,89],"others":[25],"each":[27],"candidate":[28,68,124],"pool.":[29],"However,":[30],"it":[31],"neglects":[32],"probability":[33],"distribution":[34],"candidates":[36],"and":[37,52,103,148],"degrades":[38],"imperceptibility.":[39,98],"To":[40,99],"enhance":[41],"steganographic":[42],"security,":[43,105],"meanwhile":[44],"addressing":[45],"segmentation":[46],"ambiguity,":[47],"we":[48,61,80,106],"propose":[49,81],"a":[50,82,108,116],"secure":[51,83],"disambiguating":[53,110],"approach":[54,111,135],"for":[55],"steganography.":[57],"In":[58],"this":[59],"letter,":[60],"focus":[62],"on":[63],"two":[64],"questions:":[65],"(1)":[66],"Which":[67,74],"pools":[69],"should":[70,76],"be":[71,77],"modified?":[72],"(2)":[73],"retained?":[78],"Firstly,":[79],"token-selection":[84],"principle":[85],"that":[86,112,133],"sum":[88],"selected":[90],"tokens'":[91],"probabilities":[92],"positively":[94],"correlated":[95],"to":[96],"statisti-cal":[97],"meet":[100],"both":[101],"disambiguation":[102],"optimal":[104],"present":[107],"lightweight":[109],"finding":[114],"out":[115],"maximum":[117],"weight":[118],"independent":[119],"set":[120],"(MWIS)":[121],"one":[123],"graph":[125],"only":[126],"when":[127],"candidate-level":[128],"occurs.":[130],"Experiments":[131],"show":[132],"our":[134],"outperforms":[136],"method":[139],"various":[141],"security":[142],"metrics,":[143],"improving":[144],"25.7%":[145],"statistical":[146],"imperceptibility":[147],"11.2%":[149],"anti-steganalysis":[150],"capacity":[151],"averagely.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
