[1] |
PETITCOLAS F A P , ANDERSON R J , KUHN M G . Information hiding-a survey[J]. Proceedings of the IEEE, 1999,87(7): 1062-1078.
|
[2] |
吴国华, 龚礼春, 袁理锋 ,等. 中文文本信息隐藏研究进展[J]. 通信学报, 2019,40(9): 145-156.
|
|
WU G H , GONG L C , YUAN L F ,et al. Review of information hiding on Chinese text[J]. Journal on Communications, 2019,40(9): 145-156.
|
[3] |
张祯, 倪嘉铭, 姚晔 ,等. 基于同义词扩展和标签传递机制的文本无载体信息隐藏方法[J]. 通信学报, 2021,42(9): 173-183.
|
|
ZHANG Z , NI J M , YAO Y ,et al. Text coverless information hiding method based on synonyms expansion and label delivery mechanism[J]. Journal on Communications, 2021,42(9): 173-183.
|
[4] |
WANG C L , LIU Y L , TONG Y J ,et al. GAN-GLS:generative lyric steganography based on generative adversarial networks[J]. Computers,Materials & Continua, 2021,69(1): 1375-1390.
|
[5] |
WAYNER P . Mimic functions[J]. Cryptologia, 1992,16(3): 193-214.
|
[6] |
CHAPMAN M , DAVIDA G I , RENNHARD M . A practical and effective approach to large-scale automated linguistic steganography[C]// Proceedings of the 4th International Conference on Information Security. New York:ACM Press, 2001: 156-165.
|
[7] |
DESOKY A . Nostega:a novel noiseless steganography paradigm[J]. Journal of Digital Forensic Practice, 2008,2(3): 132-139.
|
[8] |
LUO Y B , HUANG Y F , LI F F ,et al. Text steganography based on ci-poetry generation using Markov chain model[J]. KSII Transactions on Internet and Information Systems, 2016,10(9): 4568-4584.
|
[9] |
YI X Y , LI R Y , SUN M S . Generating Chinese classical poems with RNN encoder-decoder[C]// International Symposium on Natural Language Processing Based on Naturally Annotated Big Data,China National Conference on Chinese Computational Linguistics. Berlin:Springer, 2017: 211-223.
|
[10] |
YANG Z L , GUO X Q , CHEN Z M ,et al. RNN-Stega:linguistic steganography based on recurrent neural networks[J]. IEEE Transactions on Information Forensics and Security, 2019,14(5): 1280-1295.
|
[11] |
ZIEGLER Z , DENG Y T , RUSH A . Neural linguistic steganography[C]// Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Stroudsburg:Association for Computational Linguistics, 2019: 1210-1215.
|
[12] |
XIANG L Y , YANG S H , LIU Y H ,et al. Novel linguistic steganography based on character-level text generation[J]. Mathematics, 2020,8(9): 1558.
|
[13] |
NAKAJIMA T V , KER A D . The syndrome-trellis sampler for generative steganography[C]// Proceedings of 2020 IEEE International Workshop on Information Forensics and Security (WIFS). Piscataway:IEEE Press, 2021: 1-6.
|
[14] |
ZHOU X J , PENG W L , YANG B Y ,et al. Linguistic steganography based on adaptive probability distribution[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(5): 2982-2997.
|
[15] |
石凤贵 . 基于 jieba 中文分词的中文文本语料预处理模块实现[J]. 电脑知识与技术, 2020,16(14): 248-251,257.
|
|
SHI F G . Realization of Chinese text corpus preprocessing module based on jieba Chinese word segmentation[J]. Computer Knowledge and Technology, 2020,16(14): 248-251,257.
|
[16] |
卢奇, 陈文亮 . 大规模中文实体情感知识的自动获取[J]. 中文信息学报, 2018,32(8): 32-41.
|
|
LU Q , CHEN W L . Automatically building a large scale dictionary of Chinese entity sentiment expressions[J]. Journal of Chinese Information Processing, 2018,32(8): 32-41.
|
[17] |
MIKOLOV T , CHEN K , CORRADO G ,et al. Efficient estimation of word representations in vector space[J]. arXiv Preprint,arXiv:1301.3781, 2013.
|
[18] |
YANG Z L , GONG B T , LI Y M ,et al. Graph-Stega:semantic controllable steganographic text generation guided by knowledge graph[J]. arXiv Preprint,arXiv:2006.08339, 2020.
|
[19] |
ZHANG S Y , YANG Z L , YANG J S ,et al. Provably secure generative linguistic steganography[C]// Proceedings of Findings of the Association for Computational Linguistics:ACL-IJCNLP 2021. Stroudsburg:Association for Computational Linguistics, 2021: 3046-3055.
|
[20] |
YANG Z L , ZHANG S Y , HU Y T ,et al. VAE-Stega:linguistic steganography based on variational auto-encoder[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 880-895.
|
[21] |
JELINEK F , MERCER R L , BAHL L R ,et al. Perplexity—a measure of the difficulty of speech recognition tasks[J]. The Journal of the Acoustical Society of America, 1977,62(S1): S63.
|
[22] |
FANG T N , JAGGI M , ARGYRAKI K . Generating steganographic text with LSTMs[C]// Proceedings of ACL 2017,Student Research Workshop. Stroudsburg:Association for Computational Linguistics, 2017: 100-106.
|
[23] |
MAAS A L , DALY R E , PHAM P T ,et al. Learning word vectors for sentiment analysis[C]// Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics:Human Language Technologies. New York:ACM Press, 2011: 142-150.
|
[24] |
ZHANG S Y , YANG Z L , YANG J S ,et al. Linguistic steganography:from symbolic space to semantic space[J]. IEEE Signal Processing Letters, 2021,28: 11-15.
|
[25] |
ZHOU H Y , WANG F , TAO P . T-distributed stochastic neighbor embedding method with the least information loss for macromolecular simulations[J]. Journal of Chemical Theory and Computation, 2018,14(11): 5499-5510.
|
[26] |
PAPINENI K , ROUKOS S , WARD T ,et al. BLEU:a method for automatic evaluation of machine translation[C]// Proceedings of the 40th Annual Meeting on Association for Computational Linguistics. New York:ACM Press, 2002: 311-318.
|