{"id":"https://openalex.org/W4416355790","doi":"https://doi.org/10.48550/arxiv.2511.12565","title":"A Content-Preserving Secure Linguistic Steganography","display_name":"A Content-Preserving Secure Linguistic Steganography","publication_year":2025,"publication_date":"2025-11-16","ids":{"openalex":"https://openalex.org/W4416355790","doi":"https://doi.org/10.48550/arxiv.2511.12565"},"language":null,"primary_location":{"id":"pmh:oai:arXiv.org:2511.12565","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.12565","pdf_url":"https://arxiv.org/pdf/2511.12565","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2511.12565","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069543374","display_name":"Lingyun Xiang","orcid":"https://orcid.org/0000-0001-7396-0908"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiang, Lingyun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004533734","display_name":"Chengfu Ou","orcid":"https://orcid.org/0009-0005-2590-1168"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ou, Chengfu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019497769","display_name":"He Xu","orcid":"https://orcid.org/0000-0003-2809-2237"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"He, Xu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020864189","display_name":"Zhongliang Yang","orcid":"https://orcid.org/0000-0002-8027-9560"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Zhongliang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5031905258","display_name":"Yuling Liu","orcid":"https://orcid.org/0000-0002-2740-9362"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Yuling","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5069543374"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9725000262260437,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9725000262260437,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.00419999985024333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.002199999988079071,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8931000232696533},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.6633999943733215},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6492999792098999},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.5755000114440918},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5633999705314636},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5238999724388123},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5206000208854675},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4724000096321106},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.4352000057697296}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8931000232696533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.734499990940094},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.6633999943733215},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6492999792098999},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.5755000114440918},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5633999705314636},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5238999724388123},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5206000208854675},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4724000096321106},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.4352000057697296},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41280001401901245},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40860000252723694},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.40209999680519104},{"id":"https://openalex.org/C2777530160","wikidata":"https://www.wikidata.org/wiki/Q41796","display_name":"Sentence","level":2,"score":0.39719998836517334},{"id":"https://openalex.org/C149441793","wikidata":"https://www.wikidata.org/wiki/Q200726","display_name":"Probability distribution","level":2,"score":0.37770000100135803},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3537999987602234},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3467999994754791},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.3156999945640564},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2840999960899353},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.27880001068115234},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.2782999873161316},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.273499995470047},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.2732999920845032},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.25450000166893005},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.25369998812675476},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.25270000100135803}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2511.12565","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.12565","pdf_url":"https://arxiv.org/pdf/2511.12565","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2511.12565","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.12565","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2511.12565","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.12565","pdf_url":"https://arxiv.org/pdf/2511.12565","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1477544716","display_name":null,"funder_award_id":"Guangdong","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1585665932","display_name":null,"funder_award_id":"2023B1515020064","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G1833469118","display_name":null,"funder_award_id":"51502006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G228428193","display_name":null,"funder_award_id":"62472199","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G359924504","display_name":null,"funder_award_id":"20064","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4019661527","display_name":null,"funder_award_id":"62302059","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G472678898","display_name":null,"funder_award_id":"2025A","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5957623925","display_name":null,"funder_award_id":"2023B151","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6138551615","display_name":null,"funder_award_id":"5150200","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6975084977","display_name":null,"funder_award_id":"21206003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7263650625","display_name":null,"funder_award_id":"U23B2023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7491941676","display_name":null,"funder_award_id":"61972057","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7692009513","display_name":null,"funder_award_id":"51501109","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Existing":[0],"linguistic":[1,41],"steganography":[2,42],"methods":[3,196],"primarily":[4],"rely":[5],"on":[6,55],"content":[7],"transformations":[8],"to":[9,82,108,135,144],"conceal":[10],"secret":[11,69,110,157,169],"messages.":[12],"However,":[13],"they":[14],"often":[15],"cause":[16],"subtle":[17],"yet":[18],"looking-innocent":[19],"deviations":[20],"between":[21],"normal":[22],"and":[23,84,193,203],"stego":[24],"texts,":[25],"posing":[26],"potential":[27],"security":[28,167],"risks":[29],"in":[30,197],"real-world":[31],"applications.":[32],"To":[33,121],"address":[34],"this":[35,56,123],"challenge,":[36],"we":[37,58],"propose":[38],"a":[39,64,100,137,150,188],"content-preserving":[40],"paradigm":[43],"for":[44,97,130],"perfectly":[45],"secure":[46],"covert":[47],"communication":[48],"without":[49],"modifying":[50],"the":[51,117,146,160,174,177],"cover":[52,161,179],"text.":[53,162,180],"Based":[54],"paradigm,":[57],"introduce":[59],"CLstega":[60,75,125,185],"(\\textit{C}ontent-preserving":[61],"\\textit{L}inguistic":[62],"\\textit{stega}nography),":[63],"novel":[65],"method":[66],"that":[67,184],"embeds":[68],"messages":[70,111,158,170],"through":[71],"controllable":[72],"distribution":[73,102],"transformation.":[74,98],"first":[76],"applies":[77],"an":[78],"augmented":[79],"masking":[80],"strategy":[81,105],"locate":[83],"mask":[85],"embedding":[86,131,201],"positions,":[87],"where":[88],"MLM(masked":[89],"language":[90],"model)-predicted":[91],"probability":[92,119],"distributions":[93,115],"are":[94],"easily":[95],"adjustable":[96],"Subsequently,":[99],"dynamic":[101],"steganographic":[103],"coding":[104],"is":[106,142],"designed":[107],"encode":[109],"by":[112],"deriving":[113],"target":[114,128,151],"from":[116,159],"original":[118,147,178],"distributions.":[120],"achieve":[122,187],"transformation,":[124],"elaborately":[126],"selects":[127],"words":[129],"positions":[132],"as":[133],"labels":[134],"construct":[136],"masked":[138],"sentence":[139],"dataset,":[140],"which":[141],"used":[143],"fine-tune":[145],"MLM,":[148],"producing":[149],"MLM":[152],"capable":[153],"of":[154,168,176],"directly":[155],"extracting":[156],"This":[163],"approach":[164],"ensures":[165],"perfect":[166],"while":[171],"fully":[172],"preserving":[173],"integrity":[175],"Experimental":[181],"results":[182],"show":[183],"can":[186],"100\\%":[189],"extraction":[190],"success":[191],"rate,":[192],"outperforms":[194],"existing":[195],"security,":[198],"effectively":[199],"balancing":[200],"capacity":[202],"security.":[204]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-11-19T00:00:00"}
