{"id":"https://openalex.org/W4413895500","doi":"https://doi.org/10.3390/sym17091416","title":"Research on Making Two Models Based on the Generative Linguistic Steganography for Securing Linguistic Steganographic Texts from Active Attacks","display_name":"Research on Making Two Models Based on the Generative Linguistic Steganography for Securing Linguistic Steganographic Texts from Active Attacks","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4413895500","doi":"https://doi.org/10.3390/sym17091416"},"language":"en","primary_location":{"id":"doi:10.3390/sym17091416","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym17091416","pdf_url":"https://www.mdpi.com/2073-8994/17/9/1416/pdf?version=1756706712","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/17/9/1416/pdf?version=1756706712","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064212370","display_name":"Yingquan Chen","orcid":"https://orcid.org/0009-0009-5862-1671"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingquan Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090335612","display_name":"Qianmu Li","orcid":"https://orcid.org/0000-0002-0998-1517"},"institutions":[{"id":"https://openalex.org/I3129293551","display_name":"Tarim University","ror":"https://ror.org/05202v862","country_code":"CN","type":"education","lineage":["https://openalex.org/I3129293551"]},{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qianmu Li","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China","School of Cybersecurity, Tarim University, Alar City 843300, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China","institution_ids":["https://openalex.org/I36399199"]},{"raw_affiliation_string":"School of Cybersecurity, Tarim University, Alar City 843300, China","institution_ids":["https://openalex.org/I3129293551"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109478214","display_name":"Xiaocong Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaocong Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, Wuxi 214443, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Wuxi 214443, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080000940","display_name":"Zijian Ying","orcid":"https://orcid.org/0000-0003-1881-585X"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zijian Ying","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, Wuxi 214443, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Wuxi 214443, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5090335612"],"corresponding_institution_ids":["https://openalex.org/I3129293551","https://openalex.org/I36399199"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2331764,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"9","first_page":"1416","last_page":"1416"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.7639298439025879},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.6027155518531799},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5852481126785278},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5310787558555603},{"id":"https://openalex.org/keywords/rule-based-machine-translation","display_name":"Rule-based machine translation","score":0.41879650950431824},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39191585779190063},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.3686147630214691},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.17203742265701294},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.11677572131156921}],"concepts":[{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.7639298439025879},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.6027155518531799},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5852481126785278},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5310787558555603},{"id":"https://openalex.org/C53893814","wikidata":"https://www.wikidata.org/wiki/Q7378909","display_name":"Rule-based machine translation","level":2,"score":0.41879650950431824},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39191585779190063},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3686147630214691},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.17203742265701294},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.11677572131156921}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3390/sym17091416","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym17091416","pdf_url":"https://www.mdpi.com/2073-8994/17/9/1416/pdf?version=1756706712","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3390/sym17091416","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym17091416","pdf_url":"https://www.mdpi.com/2073-8994/17/9/1416/pdf?version=1756706712","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7622452733","display_name":null,"funder_award_id":"BF2024071","funder_id":"https://openalex.org/F4320321605","funder_display_name":"Government of Jiangsu Province"}],"funders":[{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413895500.pdf","grobid_xml":"https://content.openalex.org/works/W4413895500.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W1527181506","https://openalex.org/W1835586838","https://openalex.org/W2618218947","https://openalex.org/W2735673012","https://openalex.org/W2735711430","https://openalex.org/W2765811365","https://openalex.org/W2891260291","https://openalex.org/W2893556909","https://openalex.org/W2911489875","https://openalex.org/W2920628035","https://openalex.org/W2947752314","https://openalex.org/W2951438437","https://openalex.org/W2952265495","https://openalex.org/W2957062012","https://openalex.org/W2963035797","https://openalex.org/W2963444877","https://openalex.org/W2971140743","https://openalex.org/W3084404385","https://openalex.org/W3085519426","https://openalex.org/W3109254234","https://openalex.org/W3125720895","https://openalex.org/W3162945253","https://openalex.org/W3171238801","https://openalex.org/W3175755605","https://openalex.org/W3189112062","https://openalex.org/W3212755558","https://openalex.org/W4200357152","https://openalex.org/W4213325746","https://openalex.org/W4285164657","https://openalex.org/W4285213468","https://openalex.org/W4292291386","https://openalex.org/W4292794813","https://openalex.org/W4313575480","https://openalex.org/W4321484124","https://openalex.org/W4378779717","https://openalex.org/W4384948607","https://openalex.org/W4385482676","https://openalex.org/W4385756656","https://openalex.org/W4387272267","https://openalex.org/W4389747924","https://openalex.org/W4392902863","https://openalex.org/W4392910597","https://openalex.org/W4395111269","https://openalex.org/W4401043219","https://openalex.org/W4402350268","https://openalex.org/W4407551885"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W2153696906","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W1760333999","https://openalex.org/W2265739152","https://openalex.org/W2024526779"],"abstract_inverted_index":{"Generative":[0],"steganographic":[1],"text":[2,9,24,39,119],"covertly":[3],"transmits":[4],"hidden":[5,56,140],"information":[6],"through":[7],"readable":[8],"that":[10,124],"is":[11,148],"unrelated":[12],"to":[13,26],"the":[14,43,67,74,116,135,149],"message.":[15],"Existing":[16],"AI-based":[17],"linguistic":[18],"steganography":[19],"primarily":[20],"focuses":[21],"on":[22,112,162],"improving":[23,163],"quality":[25],"evade":[27],"detection":[28],"and":[29,47,73,87,105,115,132,137,165],"therefore":[30],"only":[31],"addresses":[32],"passive":[33],"attacks.":[34],"Active":[35],"attacks,":[36],"such":[37],"as":[38],"tampering,":[40],"can":[41],"disrupt":[42],"symmetry":[44],"between":[45],"encoding":[46],"decoding,":[48],"which":[49],"in":[50],"turn":[51],"prevents":[52],"accurate":[53],"extraction":[54],"of":[55,118,139,145,154],"information.":[57,141],"To":[58,91],"investigate":[59],"these":[60,125],"threats,":[61],"we":[62,94],"construct":[63],"two":[64],"attack":[65,71,78,130],"models:":[66],"in-domain":[68],"synonym":[69],"substitution":[70],"(ISSA)":[72],"out-of-domain":[75],"random":[76],"tampering":[77],"(ODRTA),":[79],"with":[80],"ODRTA":[81],"further":[82],"divided":[83],"into":[84],"continuous":[85],"(CODRTA)":[86],"discontinuous":[88],"(DODRTA)":[89],"types.":[90],"enhance":[92],"robustness,":[93],"propose":[95],"a":[96,107],"proactive":[97],"adaptive-clustering":[98],"defense":[99],"against":[100,156],"ISSA,":[101],"and,":[102],"for":[103],"CODRTA":[104],"DODRTA,":[106],"post-hoc":[108],"repair":[109],"mechanism":[110],"based":[111],"context-oriented":[113],"search":[114],"determinism":[117],"generation.":[120],"Experimental":[121],"results":[122],"demonstrate":[123],"mechanisms":[126],"effectively":[127],"counter":[128],"all":[129],"types":[131],"significantly":[133],"improve":[134],"integrity":[136],"usability":[138],"The":[142],"main":[143],"limitation":[144],"our":[146],"approach":[147],"relatively":[150],"high":[151],"computational":[152],"cost":[153],"defending":[155],"ISSA.":[157],"Future":[158],"work":[159],"will":[160],"focus":[161],"efficiency":[164],"expanding":[166],"practical":[167],"applicability.":[168]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
