Filters








20 Hits in 6.1 sec

Exploiting Language Model for Efficient Linguistic Steganalysis [article]

Biao Yi, Hanzhou Wu, Guorui Feng, Xinpeng Zhang
2022 arXiv   pre-print
Motivated by this insight, we propose two methods for efficient linguistic steganalysis. One is to pre-train a language model based on RNN, and the other is to pre-train a sequence autoencoder.  ...  Recent advances in linguistic steganalysis have successively applied CNN, RNN, GNN and other efficient deep models for detecting secret information in generative texts.  ...  In this paper, we propose two methods for efficient linguistic steganalysis. One is to pre-train a language model based on RNN, and the other is to pre-train a sequence autoencoder.  ... 
arXiv:2107.12168v3 fatcat:2f4na4s6a5dvpcx3kuhunywcgm

Image and Text Steganography Using Convolutional Neural Network

Vijay Kumar, Saloni Laddha, Aniket, Nitin Dogra
2021 TECNICA ITALIANA-Italian Journal of Engineering Science  
Also, other steganography softwares cannot be used to reveal the message since the model is trained using a deep learning algorithm which complicates its steganalysis.  ...  Steganography has been used since centuries for concealment of messages in a cover media where messages were physically hidden.  ...  Also, steganalysis cannot be done simply by using other steganography softwares. Thus, making it more secure and efficient.  ... 
doi:10.18280/ti-ijes.650104 fatcat:g6bgmzsmcncqray5zodmb7ns7e

Steganography Techniques Using Convolutional Neural Networks

Vijay Kumar, Saloni Laddha, Aniket, Nitin Dogra
2020 Review of Computer Engineer Studies  
Also, other steganography softwares cannot be used to reveal the message since the model is trained using a deep learning algorithm which complicates its steganalysis.  ...  Steganography has been used since centuries for concealment of messages in a cover media where messages were physically hidden.  ...  Also, steganalysis cannot be done simply by using other steganography softwares. Thus, making it more secure and efficient.  ... 
doi:10.18280/rces.070304 fatcat:bp2r3j5vuvchjohomji53nwzeu

Prime-based mimic functions for the implementation of covert channels

Wesley Connell, Dan Tamir, Mina Guirguis
2010 2010 IEEE International Conference on Wireless Communications, Networking and Information Security  
A set of experiments shows that prime-based mimic functions provide an efficient method for implementing a covert channel with a competitive secret-to-cover ratio and low perplexities.  ...  A novel method for design and implementation of a covert channel using a prime-based mimic function is presented.  ...  or empirically.  ... 
doi:10.1109/wcins.2010.5541837 dblp:conf/wcnis/ConnellTG10 fatcat:dumw42jfq5dzhp3wzamqphx3oy

Digital image steganography: Survey and analysis of current methods

Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt
2010 Signal Processing  
However, like any other science it can be used for ill intentions.  ...  Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files.  ...  Em is an acronym for embedding and Ex for Extraction. Therefore: We will first discuss briefly some methods which exploit image formats.  ... 
doi:10.1016/j.sigpro.2009.08.010 fatcat:4kn2rpavfrdgrdgtfi7uv7f5ji

Autoregressive Linguistic Steganography Based on BERT and Consistency Coding [article]

Xiaoyan Zheng, Hanzhou Wu
2022 arXiv   pre-print
With the widespread application of deep learning in natural language processing, recent algorithms use a language model (LM) to generate the steganographic text, which provides a higher payload compared  ...  arbitrary-size candidate token set and take advantages of the probability distribution for information hiding.  ...  In this paper, by exploiting a language model for word prediction and making use of the probability distribution for information encoding, the proposed work improves the fluency of the stego text while  ... 
arXiv:2203.13972v1 fatcat:ejwzsnjnmvf35ae5sxaaurltwq

Steganography in Modern Smartphones and Mitigation Techniques [article]

Wojciech Mazurczyk, Luca Caviglione
2014 arXiv   pre-print
Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014.  ...  languages, such as the eXtensible Markup Language (XML), HyperText Markup Language (HTML) or Synchronized Multimedia Integration Language (SMIL).  ...  An important idea is to exploit the structure of specific file formats for video contents. In this vein, Mozo et al.  ... 
arXiv:1410.6796v1 fatcat:2fv2fi6jlrbcpecfnlzqhl4w4q

Practical Linguistic Steganography using Contextual Synonym Substitution and a Novel Vertex Coding Method

Ching-Yun Chang, Stephen Clark
2014 Computational Linguistics  
Linguistic steganography is concerned with hiding information in natural language text. One of the major transformations used in linguistic steganography is synonym substitution.  ...  However, few existing studies have studied the practical application of this approach.  ...  Laura Rimell, the anonymous reviewers, and all the contributing volunteer annotators for useful comments and their effort and time.  ... 
doi:10.1162/coli_a_00176 fatcat:k7bolnrkfjdg5dfzmkiea4qate

Steganography in Modern Smartphones and Mitigation Techniques

Wojciech Mazurczyk, Luca Caviglione
2015 IEEE Communications Surveys and Tutorials  
Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014.  ...  languages, such as the eXtensible Markup Language (XML), HyperText Markup Language (HTML) or Synchronized Multimedia Integration Language (SMIL).  ...  An important idea is to exploit the structure of specific file formats for video contents. In this vein, Mozo et al.  ... 
doi:10.1109/comst.2014.2350994 fatcat:o5pidu5fdvg6xet3sorq3jc3va

2021 Index IEEE Transactions on Computational Social Systems Vol. 8

2021 IEEE Transactions on Computational Social Systems  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  ., +, TCSS April 2021 332-344 Complicating the Social Networks for Better Storytelling: An Empirical Study of Chinese Historical Text and Novel.  ...  Zhang, S., +, TCSS Feb. 2021 161-170 CoveR: An Information Diffusion Aware Approach for Efficient Recommendations Under User Coverage Constraints.  ... 
doi:10.1109/tcss.2021.3137918 fatcat:kdc6nwrfbncixnxc5xkjwqvuqq

Applications of neuro fuzzy systems: A brief review and future outline

Samarjit Kar, Sujit Das, Pijush Kanti Ghosh
2014 Applied Soft Computing  
This review study indicates mainly three types of future development directions for NFS methodologies, domains and article types: (1) NFS methodologies are tending to be developed toward expertise orientation  ...  For each of these categories, this paper mentions a brief future outline.  ...  Acknowledgment The authors wish to express sincere gratitude to the anonymous reviewers for their constructive comments and helpful suggestions, which lead to substantial improvements of this paper.  ... 
doi:10.1016/j.asoc.2013.10.014 fatcat:iochb6rlgbhb5dmpmx7jeh54mu

Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

Mahsa Seyyedtaj, Mohammad Ali Jabraeil Jamali
2014 International Journal of Computer Applications Technology and Research  
Many secure routing protocols proposed for secure routing either active or reactive, however, both of these protocols have some limitations.  ...  Proactive routing protocols: In it, all the nodes continuously search for routing information with in a network, so that when a route is needed, the route is already known.  ...  The disciplines that study techniques for deciphering cipher messages and detecting hide messages are called cryptanalysis and steganalysis.  ... 
doi:10.7753/ijcatr0309.1001 fatcat:n7yb26a6zbgwnpvfmvka3cnpoq

SMART CAMPUSES: EXTENSIVE REVIEW OF THE LAST DECADE OF RESEARCH AND CURRENT CHALLENGES

Noemie Chagnon-Lessard, Louis Gosselin, Simon Barnabe, Tunde Bello-Ochende, Sebastian Fendt, Sebastian Goers, Luiz Carlos Pereira Da Silva, Benedikt Schweiger, Richard Simmons, Annelies Vandersickel, Peng Zhang
2021 IEEE Access  
[202] developed a linguistic steganalysis method based on word embedding for detecting the stego texts generated by synonym substitutions.  ...  [209] modeled the registration system of a smart campus using Unified Modeling Language (UML) sequence diagram, Non-Deterministic Finite Automata (NFA) and Vienna Development Method Specification Language  ...  He is currently a Senior Research Engineer and Fellow at Georgia Tech's Strategic Energy Institute where he directs cross-cutting energy projects with an emphasis on clean energy power, vehicle efficiency  ... 
doi:10.1109/access.2021.3109516 fatcat:cwmcxuegnfg3xcxguwzsttzpry

A Comprehensive lossless modified compression in medical application on DICOM CT images

Alka sharm
2013 IOSR Journal of Computer Engineering  
Study of various linguistic Image Compression Techniques. 3. Select an input image from the set of data set. 4.  ...  The aim of this paper is to present an approach for E-evaluation model for the visually challenged students/candidates for the screening tests conducted by the different examination authorities.  ...  This paper proposes an algorithm to find the outliers to improve the efficiency of web search engine.  ... 
doi:10.9790/0661-1530107 fatcat:eoyyyi7vmbculctnfqnohxyhue

Early Detection of Pediatric Heart Disease by Automated Spectral Analysis of Phonocardiogram in Children

Hassan Ghassemian, Azra Kenari
unpublished
Patients without heart disease and either no murmur or an innocent murmur (n = 40) were compared to patients with a variety of cardiac diagnoses and a pathologic systolic murmur present (n = 53).  ...  Acknowledgment This article was extracted from the thesis prepared by Neda Dousttalab to fulfill the requirements for earning the Master's degree. We thank Dr.  ...  Acknowledgments The author would like to thank the anonymous reviewers and editors for the useful and constructive comments which have improved the article.  ... 
fatcat:tegsfntdgzfkvgwohkzohpougq
« Previous Showing results 1 — 15 out of 20 results