[1] |
THONNARD O , BILGE L , KASHYAP A ,et al. Are you at risk? Profiling organizations and individuals subject to targeted attacks[C]// Proceedings of International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2015: 13-31.
|
[2] |
WAN W B , WANG J , ZHANG Y M ,et al. A comprehensive survey on robust image watermarking[J]. Neurocomputing, 2022,488: 226-247.
|
[3] |
LUO X Y , LI Y X , CHANG H W ,et al. DVMark:a deep multiscale framework for video watermarking[J]. IEEE Transactions on Image Processing, 2023,PP(99):1.
|
[4] |
YAMNI M , KARMOUNI H , SAYYOURI M ,et al. Efficient watermarking algorithm for digital audio/speech signal[J]. Digital Signal Processing, 2022,120:103251.
|
[5] |
何路, 桂小林, 田丰 ,等. 自然语言水印鲁棒性分析与评估[J]. 计算机学报, 2012,35(9): 1971-1982.
|
|
HE L , GUI X L , TIAN F ,et al. Analyzing and evaluating the robustness of natural language watermarking[J]. Chinese Journal of Computers, 2012,35(9): 1971-1982.
|
[6] |
XIAO C , ZHANG C , ZHENG C X . FontCode:embedding information in text documents using glyph perturbation[J]. ACM Transactions on Graphics, 2018,37(2): 1-16.
|
[7] |
QI W F , GUO W , ZHANG T ,et al. Robust authentication for paper-based text documents based on text watermarking technology[J]. Mathematical Biosciences and Engineering, 2019,16(4): 2233-2249.
|
[8] |
YANG X , ZHANG W M , FANG H ,et al. Language universal font watermarking with multiple cross-media robustness[J]. Signal Processing, 2023,203:108791.
|
[9] |
NOZAKI J , MURAWAKI Y . Addressing segmentation ambiguity in neural linguistic steganography[J]. arXiv Preprint,arXiv:2211.06662, 2022.
|
[10] |
VAROL A M . LZW-CIE:a high-capacity linguistic steganography based on LZW char index encoding[J]. Neural Computing and Applications, 2022,34(21): 19117-19145.
|
[11] |
MERAL H M , SANKUR B , ?ZSOY A S , ,et al. Natural language watermarking via morphosyntactic alterations[J]. Computer Speech &Language, 2009,23(1): 107-125.
|
[12] |
WANG H , SUN X M , LIU Y L ,et al. Natural language watermarking using Chinese syntactic transformations[J]. Information Technology Journal, 2008,7(6): 904-910.
|
[13] |
YANG T Y , WU H Z , YI B ,et al. Semantic-preserving linguistic steganography by pivot translation and semantic-aware bins coding[J]. arXiv Preprint,arXiv:2203.03795, 2022.
|
[14] |
WINSTEIN K . Lexical steganography through adaptive modulation of the word choice hash[R]. 1999.
|
[15] |
BOLSHAKOV I A . A method of linguistic steganography based on collocationally-verified synonymy[C]// Proceedings of International Workshop on Information Hiding. Berlin:Springer, 2004: 180-191.
|
[16] |
UEOKA H , MURAWAKI Y , KUROHASHI S . Frustratingly easy edit-based linguistic steganography with a masked language model[C]// Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics. Stroudsburg:Association for Computational Linguistics, 2021: 5486-5492.
|
[17] |
YANG X , ZHANG J , CHEN K ,et al. Tracing text provenance via context-aware lexical substitution[C]// Proceedings of the AAAI Conference on Artificial Intelligence. Palo Alto:AAAI Press, 2022: 11613-11621.
|
[18] |
武睿峰, 何路, 房鼎益 . 自然语言水印隐蔽性自动评测方法[J]. 计算机应用, 2013,33(12): 3522-3526,3530.
|
|
WU R F , HE L , FANG D Y . Automatic evaluation scheme for imperceptibility of natural language watermarking[J]. Journal of Computer Applications, 2013,33(12): 3522-3526,3530.
|
[19] |
YANG J L , WANG J M , WANG C K ,et al. A novel scheme for watermarking natural language text[C]// Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway:IEEE Press, 2007: 481-484.
|
[20] |
林建滨, 何路, 李天智 ,等. 一种抗攻击的中文同义词替换文本水印算法[J]. 西北大学学报(自然科学版), 2010,40(3): 433-436.
|
|
LIN J B , HE L , LI T Z ,et al. An anti-attack watermarking based on synonym substitution algorithm for Chinese text[J]. Journal of Northwest University (Natural Science Edition), 2010,40(3): 433-436.
|
[21] |
ZHENG X Y , WU H Z . Autoregressive linguistic steganography based on BERT and consistency coding[J]. Security and Communication Networks, 2022,2022: 1-11.
|
[22] |
ZHENG X Y , FANG Y R , WU H Z . General framework for reversible data hiding in texts based on masked language modeling[J]. arXiv Preprint,arXiv:2206.10112, 2022.
|
[23] |
CHANG C C . Reversible linguistic steganography with Bayesian masked language modeling[J]. IEEE Transactions on Computational Social Systems, 2023,10(2): 714-723.
|
[24] |
杨潇, 李峰, 向凌云 . 基于矩阵编码的同义词替换隐写算法[J]. 小型微型计算机系统, 2015,36(6): 1296-1300.
|
|
YANG X , LI F , XIANG L Y . Synonym substitution-based steganographic algorithm with matrix coding[J]. Journal of Chinese Computer Systems, 2015,36(6): 1296-1300.
|
[25] |
XIANG L Y , WU W S , LI X ,et al. A linguistic steganography based on word indexing compression and candidate selection[J]. Multimedia Tools and Applications, 2018,77(21): 28969-28989.
|
[26] |
YANG Z L , GUO X Q , CHEN Z M ,et al. RNN-stega:linguistic steganography based on recurrent neural networks[J]. IEEE Transactions on Information Forensics and Security, 2019,14(5): 1280-1295.
|
[27] |
YU L , LU Y L , YAN X H ,et al. MTS-Stega:linguistic steganography based on multi-time-step[J]. Entropy, 2022,24(5): 585.
|
[28] |
VASWANI A , SHAZEER N , PARMAR N ,et al. Attention is all you need[J]. arXiv Preprint,arXiv:1706.03762, 2017.
|
[29] |
HILL J , SIMHA R . Automatic generation of context-based fill-in-theblank exercises using co-occurrence likelihoods and Google n-grams[C]// Proceedings of the 11th Workshop on Innovative Use of NLP for Building Educational Applications. Stroudsburg:Association for Computational Linguistics, 2016: 23-30.
|
[30] |
FEDUS W , GOODFELLOW I , DAI A M . Maskgan:better text generation via filling in the__[J]. arXiv Preprint,arXiv:1801.07736, 2018.
|
[31] |
ZHU W , HU Z , XING E . Text infilling[J]. arXiv Preprint,arXiv:1901.00158, 2019.
|
[32] |
LIU Y H , OTT M , GOYAL N ,et al. RoBERTa:a robustly optimized BERT pretraining approach[J]. arXiv Preprint,arXiv:1907.11692, 2019.
|