MTS-Stega: Linguistic Steganography Based on Multi-Time-Step

被引:6
作者
Yu, Long [1 ,2 ]
Lu, Yuliang [1 ,2 ]
Yan, Xuehu [1 ,2 ]
Yu, Yongqiang [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awaren, Hefei 230037, Peoples R China
基金
中国国家自然科学基金;
关键词
linguistic steganography; text generation; multi-time-step; fixed-length coding; imperceptibility; decoding efficiency;
D O I
10.3390/e24050585
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Generative linguistic steganography encodes candidate words with conditional probability when generating text by language model, and then, it selects the corresponding candidate words to output according to the confidential message to be embedded, thereby generating steganographic text. The encoding techniques currently used in generative text steganography fall into two categories: fixed-length coding and variable-length coding. Because of the simplicity of coding and decoding and the small computational overhead, fixed-length coding is more suitable for resource-constrained environments. However, the conventional text steganography mode selects and outputs a word at one time step, which is highly susceptible to the influence of confidential information and thus may select words that do not match the statistical distribution of the training text, reducing the quality and concealment of the generated text. In this paper, we inherit the decoding advantages of fixed-length coding, focus on solving the problems of existing steganography methods, and propose a multi-time-step-based steganography method, which integrates multiple time steps to select words that can carry secret information and fit the statistical distribution, thus effectively improving the text quality. In the experimental part, we choose the GPT-2 language model to generate the text, and both theoretical analysis and experiments prove the effectiveness of the proposed scheme.
引用
收藏
页数:16
相关论文
共 31 条
[1]  
[Anonymous], 2018, Speech and Language Processing
[2]  
[Anonymous], 2011, P 49 ANN M ASS COMP
[3]  
Bennett K., 2004, CERIAS Tech Report 2004-13
[4]   Adaptive Video Data Hiding through Cost Assignment and STCs [J].
Chen, Yanli ;
Wang, Hongxia ;
Wu, Han-Zhou ;
Wu, Zhiqiang ;
Li, Tao ;
Malik, Asad .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1320-1335
[5]   The first 50 years of electronic watermarking [J].
Cox, IJ ;
Miller, ML .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (02) :126-132
[6]  
Dai FZ, 2019, 57TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2019), P4303
[7]  
Fang T., 2017, P ACL STUD RES WORKS, P100
[8]   Image steganography in spatial domain: A survey [J].
Hussain, Mehdi ;
Wahab, Ainuddin Wahid Abdul ;
Bin Idris, Yamani Idna ;
Ho, Anthony T. S. ;
Jung, Ki-Hyun .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 65 :46-66
[9]   Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things [J].
Kaur, Manjit ;
Singh, Dilbag ;
Kumar, Vijay ;
Gupta, B. B. ;
Abd El-Latif, Ahmed A. .
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2021, 5 (03) :1223-1231
[10]  
Krishnan RB, 2017, 2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN)