Author:
Yang Zhongliang,He Jin,Zhang Siyu,Yang Jinshuai,Huang Yongfeng
Publisher
Springer International Publishing
Reference27 articles.
1. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
2. Theohary, C.A.: Terrorist Use of the Internet: Information Operations in Cyberspace. DIANE Publishing (2011)
3. LNCS;Z Yang,2020
4. Yang, Z., Peng, X., Huang, Y.: A sudoku matrix-based method of pitch period steganography in low-rate speech coding. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) Security and Privacy in Communication Networks, vol. 238, pp. 752–762. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78813-5_40
5. Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism;IEEE/ACM Transactions on Audio, Speech, and Language Processing;2023
2. Linguistic Steganalysis Toward Social Network;IEEE Transactions on Information Forensics and Security;2023