{"id":"https://openalex.org/W4411159924","doi":"https://doi.org/10.32604/cmc.2025.065804","title":"Linguistic Steganography Based on Sentence Attribute Encoding","display_name":"Linguistic Steganography Based on Sentence Attribute Encoding","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411159924","doi":"https://doi.org/10.32604/cmc.2025.065804"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065804","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065804","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065804","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105972578","display_name":"Lingyun Xiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lingyun Xiang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019497769","display_name":"He Xu","orcid":"https://orcid.org/0000-0003-2809-2237"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xu He","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100430858","display_name":"Xi Zhang","orcid":"https://orcid.org/0000-0002-8994-8185"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xi Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5004533734","display_name":"Chengfu Ou","orcid":"https://orcid.org/0009-0005-2590-1168"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chengfu Ou","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5105972578"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14117618,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"2","first_page":"2375","last_page":"2389"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.7535718679428101},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6985927820205688},{"id":"https://openalex.org/keywords/sentence","display_name":"Sentence","score":0.6754976511001587},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6219885349273682},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.6195614337921143},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.561129093170166},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43363314867019653},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.1774383783340454},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.08181267976760864}],"concepts":[{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.7535718679428101},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6985927820205688},{"id":"https://openalex.org/C2777530160","wikidata":"https://www.wikidata.org/wiki/Q41796","display_name":"Sentence","level":2,"score":0.6754976511001587},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6219885349273682},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.6195614337921143},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.561129093170166},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43363314867019653},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.1774383783340454},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.08181267976760864}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065804","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065804","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065804","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065804","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1505629914","https://openalex.org/W1511987983","https://openalex.org/W1975586457","https://openalex.org/W2068475736","https://openalex.org/W2157823837","https://openalex.org/W2577138561","https://openalex.org/W2583194464","https://openalex.org/W2751447118","https://openalex.org/W2799743758","https://openalex.org/W2893556909","https://openalex.org/W2911759304","https://openalex.org/W2947752314","https://openalex.org/W2950729339","https://openalex.org/W3085519426","https://openalex.org/W3129832193","https://openalex.org/W3162945253","https://openalex.org/W3214106073","https://openalex.org/W4321484124","https://openalex.org/W4371806274","https://openalex.org/W4387586604","https://openalex.org/W4399661803","https://openalex.org/W4399953011","https://openalex.org/W4402350268","https://openalex.org/W4407175789","https://openalex.org/W4407304478"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W2153696906","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W1760333999","https://openalex.org/W2265739152","https://openalex.org/W2094307307"],"abstract_inverted_index":{"Linguistic":[0],"steganography":[1],"(LS)":[2],"aims":[3],"to":[4,78,99,111],"embed":[5],"secret":[6,84,97,131],"information":[7,98,132],"into":[8],"normal":[9],"natural":[10],"text":[11,43,180,202],"for":[12,82],"covert":[13],"communication.":[14],"It":[15],"includes":[16],"modification-based":[17],"(MLS)":[18],"and":[19,189,194],"generation-based":[20],"(GLS)":[21],"methods.":[22],"MLS":[23,59],"often":[24],"relies":[25],"on":[26,107,147,191],"limited":[27],"manual":[28,126],"rules,":[29],"resulting":[30],"in":[31],"low":[32],"embedding":[33,39,83],"capacity,":[34],"while":[35,65],"GLS":[36],"achieves":[37,158],"higher":[38],"capacity":[40],"through":[41],"automatic":[42],"generation":[44,150],"but":[45],"typically":[46],"ignores":[47],"extraction":[48,63,160,175],"efficiency.":[49],"To":[50],"address":[51],"this,":[52],"we":[53],"propose":[54],"a":[55,73,102],"sentence":[56,80,93],"attribute":[57,76,88,104,141],"encoding-based":[58],"method":[60,71,157,184],"that":[61,155],"enhances":[62],"efficiency":[64],"maintaining":[66],"strong":[67],"performance.":[68],"The":[69],"proposed":[70],"designs":[72],"lightweight":[74],"semantic":[75,103,140],"analyzer":[77],"encode":[79],"attributes":[81],"information.":[85],"When":[86],"the":[87,91,96,117,122,129,139,145,148,167,178,198,201],"values":[89],"of":[90,116,124,162],"cover":[92],"differ":[94],"from":[95],"be":[100,134],"embedded,":[101],"adjuster":[105],"based":[106],"paraphrasing":[108,149],"is":[109,204],"used":[110],"automatically":[112],"generate":[113],"paraphrase":[114],"sentences":[115],"target":[118],"attribute,":[119],"thereby":[120,143],"improving":[121],"problem":[123],"insufficient":[125],"rules.":[127],"During":[128],"extraction,":[130],"can":[133],"extracted":[135],"solely":[136],"by":[137,182],"employing":[138],"analyzer,":[142],"eliminating":[144],"dependence":[146],"model.":[151],"Experimental":[152],"results":[153],"show":[154],"this":[156,183],"an":[159],"speed":[161],"1141.54":[163],"bits/sec,":[164],"compared":[165],"with":[166,197],"existing":[168,199],"methods,":[169,200],"it":[170],"has":[171],"remarkable":[172],"advantages":[173],"regarding":[174],"speed.":[176],"Meanwhile,":[177],"stego":[179],"generated":[181],"respectively":[185],"reaches":[186],"68.53,":[187],"39.88,":[188],"80.77":[190],"BLEU,":[192],"PPL,":[193],"BERTScore.":[195],"Compared":[196],"quality":[203],"effectively":[205],"improved.":[206]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
