Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (25)

Search Parameters:
Keywords = text steganography

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
38 pages, 23830 KB  
Article
Improving Audio Steganography Transmission over Various Wireless Channels
by Azhar A. Hamdi, Asmaa A. Eyssa, Mahmoud I. Abdalla, Mohammed ElAffendi, Ali Abdullah S. AlQahtani, Abdelhamied A. Ateya and Rania A. Elsayed
J. Sens. Actuator Netw. 2025, 14(6), 106; https://doi.org/10.3390/jsan14060106 - 30 Oct 2025
Viewed by 1495
Abstract
Ensuring the security and privacy of confidential data during transmission is a critical challenge, necessitating advanced techniques to protect against unwarranted disclosures. Steganography, a concealment technique, enables secret information to be embedded in seemingly harmless carriers such as images, audio, and video. This [...] Read more.
Ensuring the security and privacy of confidential data during transmission is a critical challenge, necessitating advanced techniques to protect against unwarranted disclosures. Steganography, a concealment technique, enables secret information to be embedded in seemingly harmless carriers such as images, audio, and video. This work proposes two secure audio steganography models based on the least significant bit (LSB) and discrete wavelet transform (DWT) techniques for concealing different types of multimedia data (i.e., text, image, and audio) in audio files, representing an enhancement of current research that tends to focus on embedding a single type of multimedia data. The first model (secured model (1)) focuses on high embedding capacity, while the second model (secured model (2)) focuses on improved security. The performance of the two proposed secure models was tested under various conditions. The models’ robustness was greatly enhanced using convolutional encoding with binary phase shift keying (BPSK). Experimental results indicated that the correlation coefficient (Cr) of the extracted secret audio in secured model (1) increased by 18.88% and by 16.18% in secured model (2) compared to existing methods. In addition, the Cr of the extracted secret image in secured model (1) was improved by 0.1% compared to existing methods. The peak signal-to-noise ratio (PSNR) of the steganography audio of secured model (1) was improved by 49.95% and 14.44% compared to secured model (2) and previous work, respectively. Furthermore, both models were evaluated in an orthogonal frequency division multiplexing (OFDM) system over various wireless channels, i.e., Additive White Gaussian Noise (AWGN), fading, and SUI-6 channels. In order to enhance the system performance, OFDM was combined with differential phase shift keying (DPSK) modulation and convolutional coding. The results demonstrate that secured model (1) is highly immune to noise generated by wireless channels and is the optimum technique for secure audio steganography on noisy communication channels. Full article
Show Figures

Figure 1

27 pages, 2528 KB  
Article
Enhancement of the Generation Quality of Generative Linguistic Steganographic Texts by a Character-Based Diffusion Embedding Algorithm (CDEA)
by Yingquan Chen, Qianmu Li, Aniruddha Bhattacharjya, Xiaocong Wu, Huifeng Li, Qing Chang, Le Zhu and Yan Xiao
Appl. Sci. 2025, 15(17), 9663; https://doi.org/10.3390/app15179663 - 2 Sep 2025
Viewed by 889
Abstract
Generative linguistic steganography aims to produce texts that remain both perceptually and statistically imperceptible. The existing embedding algorithms often suffer from imbalanced candidate selection, where high-probability words are overlooked and low-probability words dominate, leading to reduced coherence and fluency. We introduce a character-based [...] Read more.
Generative linguistic steganography aims to produce texts that remain both perceptually and statistically imperceptible. The existing embedding algorithms often suffer from imbalanced candidate selection, where high-probability words are overlooked and low-probability words dominate, leading to reduced coherence and fluency. We introduce a character-based diffusion embedding algorithm (CDEA) that uniquely leverages character-level statistics and a power-law-inspired grouping strategy to better balance candidate word selection. Unlike prior methods, the proposed CDEA explicitly prioritizes high-probability candidates, thereby improving both semantic consistency and text naturalness. When combined with XLNet, it effectively generates longer sensitive sequences while preserving quality. The experimental results showed that CDEA not only produces steganographic texts with higher imperceptibility and fluency but also achieves stronger resistance to steganalysis compared with the existing approaches. Future work will be to enhance statistical imperceptibility, integrate CDEA with larger language models such as GPT-5, and extend applications to cross-lingual, multimodal, and practical IoT or blockchain communication scenarios. Full article
(This article belongs to the Special Issue Cyber Security and Software Engineering)
Show Figures

Figure 1

26 pages, 2814 KB  
Article
Research on Making Two Models Based on the Generative Linguistic Steganography for Securing Linguistic Steganographic Texts from Active Attacks
by Yingquan Chen, Qianmu Li, Xiaocong Wu and Zijian Ying
Symmetry 2025, 17(9), 1416; https://doi.org/10.3390/sym17091416 - 1 Sep 2025
Viewed by 1333
Abstract
Generative steganographic text covertly transmits hidden information through readable text that is unrelated to the message. Existing AI-based linguistic steganography primarily focuses on improving text quality to evade detection and therefore only addresses passive attacks. Active attacks, such as text tampering, can disrupt [...] Read more.
Generative steganographic text covertly transmits hidden information through readable text that is unrelated to the message. Existing AI-based linguistic steganography primarily focuses on improving text quality to evade detection and therefore only addresses passive attacks. Active attacks, such as text tampering, can disrupt the symmetry between encoding and decoding, which in turn prevents accurate extraction of hidden information. To investigate these threats, we construct two attack models: the in-domain synonym substitution attack (ISSA) and the out-of-domain random tampering attack (ODRTA), with ODRTA further divided into continuous (CODRTA) and discontinuous (DODRTA) types. To enhance robustness, we propose a proactive adaptive-clustering defense against ISSA, and, for CODRTA and DODRTA, a post-hoc repair mechanism based on context-oriented search and the determinism of text generation. Experimental results demonstrate that these mechanisms effectively counter all attack types and significantly improve the integrity and usability of hidden information. The main limitation of our approach is the relatively high computational cost of defending against ISSA. Future work will focus on improving efficiency and expanding practical applicability. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

20 pages, 2026 KB  
Article
Synonym Substitution Steganalysis Based on Heterogeneous Feature Extraction and Hard Sample Mining Re-Perception
by Jingang Wang, Hui Du and Peng Liu
Big Data Cogn. Comput. 2025, 9(8), 192; https://doi.org/10.3390/bdcc9080192 - 22 Jul 2025
Viewed by 1110
Abstract
Linguistic steganography can be utilized to establish covert communication channels on social media platforms, thus facilitating the dissemination of illegal messages, seriously compromising cyberspace security. Synonym substitution-based linguistic steganography methods have garnered considerable attention due to their simplicity and strong imperceptibility. Existing linguistic [...] Read more.
Linguistic steganography can be utilized to establish covert communication channels on social media platforms, thus facilitating the dissemination of illegal messages, seriously compromising cyberspace security. Synonym substitution-based linguistic steganography methods have garnered considerable attention due to their simplicity and strong imperceptibility. Existing linguistic steganalysis methods have not achieved excellent detection performance for the aforementioned type of linguistic steganography. In this paper, based on the idea of focusing on accumulated differences, we propose a two-stage synonym substitution-based linguistic steganalysis method that does not require a synonym database and can effectively detect texts with very low embedding rates. Experimental results demonstrate that this method achieves an average detection accuracy 2.4% higher than the comparative method. Full article
Show Figures

Figure 1

21 pages, 1658 KB  
Article
Emotionally Controllable Text Steganography Based on Large Language Model and Named Entity
by Hao Shi, Wenpu Guo and Shaoyuan Gao
Technologies 2025, 13(7), 264; https://doi.org/10.3390/technologies13070264 - 21 Jun 2025
Viewed by 2375
Abstract
For the process of covert transmission of text information, in addition to the need to ensure the quality of the text at the same time, it is also necessary to make the text content match the current context. However, the existing text steganography [...] Read more.
For the process of covert transmission of text information, in addition to the need to ensure the quality of the text at the same time, it is also necessary to make the text content match the current context. However, the existing text steganography methods excessively pursue the quality of the text, and lack constraints on the content and emotional expression of the generated steganographic text (stegotext). In order to solve this problem, this paper proposes an emotionally controllable text steganography based on large language model and named entity. The large language model is used for text generation to improve the quality of the generated stegotext. The named entity recognition is used to construct an entity extraction module to obtain the current context-centered text and constrain the text generation content. The sentiment analysis method is used to mine the sentiment tendency so that the stegotext contains rich sentiment information and improves its concealment. Through experimental validation on the generic domain movie reviews dataset IMDB, the results prove that the proposed method has significantly improved hiding capacity, perplexity, and security compared with the existing mainstream methods, and the stegotext has a strong connection with the current context. Full article
(This article belongs to the Special Issue Research on Security and Privacy of Data and Networks)
Show Figures

Graphical abstract

27 pages, 1843 KB  
Article
Multi-Layered Security Framework Combining Steganography and DNA Coding
by Bhavya Kallapu, Avinash Nanda Janardhan, Rama Moorthy Hejamadi, Krishnaraj Rao Nandikoor Shrinivas, Saritha, Raghunandan Kemmannu Ramesh and Lubna A. Gabralla
Systems 2025, 13(5), 341; https://doi.org/10.3390/systems13050341 - 1 May 2025
Cited by 3 | Viewed by 3036
Abstract
With the rapid expansion of digital communication and data sharing, ensuring robust security for sensitive information has become increasingly critical, particularly when data are transmitted over public networks. Traditional encryption techniques are increasingly vulnerable to evolving cyber threats, making single-layer security mechanisms less [...] Read more.
With the rapid expansion of digital communication and data sharing, ensuring robust security for sensitive information has become increasingly critical, particularly when data are transmitted over public networks. Traditional encryption techniques are increasingly vulnerable to evolving cyber threats, making single-layer security mechanisms less effective. This study proposes a multi-layered security approach that integrates cryptographic and steganographic techniques to enhance data protection. The framework leverages advanced methods such as encrypted data embedding in images, DNA sequence coding, QR codes, and least significant bit (LSB) steganography. To evaluate its effectiveness, experiments were conducted using text messages, text files, and images, with security assessments based on PSNR, MSE, SNR, and encryption–decryption times for text data. Image security was analyzed through visual inspection, correlation, entropy, standard deviation, key space analysis, randomness, and differential analysis. The proposed method demonstrated strong resilience against differential cryptanalysis, achieving high NPCR values (99.5784%, 99.4292%, and 99.5784%) and UACI values (33.5873%, 33.5149%, and 33.3745%), indicating robust diffusion and confusion properties. These results highlight the reliability and effectiveness of the proposed framework in safeguarding data integrity and confidentiality, providing a promising direction for future cryptographic research. Full article
Show Figures

Figure 1

19 pages, 2033 KB  
Article
DeepStego: Privacy-Preserving Natural Language Steganography Using Large Language Models and Advanced Neural Architectures
by Oleksandr Kuznetsov, Kyrylo Chernov, Aigul Shaikhanova, Kainizhamal Iklassova and Dinara Kozhakhmetova
Computers 2025, 14(5), 165; https://doi.org/10.3390/computers14050165 - 29 Apr 2025
Cited by 2 | Viewed by 2172
Abstract
Modern linguistic steganography faces the fundamental challenge of balancing embedding capacity with detection resistance, particularly against advanced AI-based steganalysis. This paper presents DeepStego, a novel steganographic system leveraging GPT-4-omni’s language modeling capabilities for secure information hiding in text. Our approach combines dynamic synonym [...] Read more.
Modern linguistic steganography faces the fundamental challenge of balancing embedding capacity with detection resistance, particularly against advanced AI-based steganalysis. This paper presents DeepStego, a novel steganographic system leveraging GPT-4-omni’s language modeling capabilities for secure information hiding in text. Our approach combines dynamic synonym generation with semantic-aware embedding to achieve superior detection resistance while maintaining text naturalness. Through comprehensive experimentation, DeepStego demonstrates significantly lower detection rates compared to existing methods across multiple state-of-the-art steganalysis techniques. DeepStego supports higher embedding capacities while maintaining strong detection resistance and semantic coherence. The system shows superior scalability compared to existing methods. Our evaluation demonstrates perfect message recovery accuracy and significant improvements in text quality preservation compared to competing approaches. These results establish DeepStego as a significant advancement in practical steganographic applications, particularly suitable for scenarios requiring secure covert communication with high embedding capacity. Full article
(This article belongs to the Special Issue Natural Language Processing (NLP) and Large Language Modelling)
Show Figures

Figure 1

21 pages, 6346 KB  
Article
Novel Steganographic Method Based on Hermitian Positive Definite Matrix and Weighted Moore–Penrose Inverses
by Selver Pepić, Muzafer Saračević, Aybeyan Selim, Darjan Karabašević, Marija Mojsilović, Amor Hasić and Pavle Brzaković
Appl. Sci. 2024, 14(22), 10174; https://doi.org/10.3390/app142210174 - 6 Nov 2024
Cited by 2 | Viewed by 1372
Abstract
In this paper, we describe the concept of a new data-hiding technique for steganography in RGB images where a secret message is embedded in the blue layer of specific bytes. For increasing security, bytes are chosen randomly using a random square Hermitian positive [...] Read more.
In this paper, we describe the concept of a new data-hiding technique for steganography in RGB images where a secret message is embedded in the blue layer of specific bytes. For increasing security, bytes are chosen randomly using a random square Hermitian positive definite matrix, which is a stego-key. The proposed solution represents a very strong key since the number of variants of positive definite matrices of order 8 is huge. Implementing the proposed steganographic method consists of splitting a color image into its R, G, and B channels and implementing two segments, which take place in several phases. The first segment refers to embedding a secret message in the carrier (image or text) based on the unique absolute elements values of the Hermitian positive definite matrix. The second segment refers to extracting a hidden message based on a stego-key generated based on the Hermitian positive definite matrix elements. The objective of the data-hiding technique using a Hermitian positive definite matrix is to embed confidential or sensitive data within cover media (such as images, audio, or video) securely and imperceptibly; by doing so, the hidden data remain confidential and tamper-resistant while the cover media’s visual or auditory quality is maintained. Full article
Show Figures

Figure 1

24 pages, 350 KB  
Article
Evidence Preservation in Digital Forensics: An Approach Using Blockchain and LSTM-Based Steganography
by Mohammad AlKhanafseh and Ola Surakhi
Electronics 2024, 13(18), 3729; https://doi.org/10.3390/electronics13183729 - 20 Sep 2024
Cited by 4 | Viewed by 13033
Abstract
As digital crime continues to rise, the preservation of digital evidence has become a critical phase in digital forensic investigations. This phase focuses on securing and maintaining the integrity of evidence for legal proceedings. Existing solutions for evidence preservation, such as centralized storage [...] Read more.
As digital crime continues to rise, the preservation of digital evidence has become a critical phase in digital forensic investigations. This phase focuses on securing and maintaining the integrity of evidence for legal proceedings. Existing solutions for evidence preservation, such as centralized storage systems and cloud frameworks, present challenges related to security and collaboration. In this paper, we propose a novel framework that addresses these challenges in the preservation phase of forensics. Our framework employs a combination of advanced technologies, including the following: (1) Segmenting evidence into smaller components for improved security and manageability, (2) Utilizing steganography for covert evidence preservation, and (3) Implementing blockchain to ensure the integrity and immutability of evidence. Additionally, we incorporate Long Short-Term Memory (LSTM) networks to enhance steganography in the evidence preservation process. This approach aims to provide a secure, scalable, and reliable solution for preserving digital evidence, contributing to the effectiveness of digital forensic investigations. An experiment using linguistic steganography showed that the LSTM autoencoder effectively generates coherent text from bit streams, with low perplexity and high accuracy. Our solution outperforms existing methods across multiple datasets, providing a secure and scalable approach for digital evidence preservation. Full article
(This article belongs to the Special Issue Network and Mobile Systems Security, Privacy and Forensics)
Show Figures

Figure 1

25 pages, 8686 KB  
Article
A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers
by Saad Said Alqahtany, Ahmad B. Alkhodre, Abdulwahid Al Abdulwahid and Manar Alohaly
Appl. Sci. 2023, 13(12), 7294; https://doi.org/10.3390/app13127294 - 19 Jun 2023
Cited by 5 | Viewed by 3097
Abstract
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhead, making it a promising alternative for protecting sensitive [...] Read more.
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhead, making it a promising alternative for protecting sensitive information. Among languages, Arabic is known for its linguistic richness, making it ideal for text-based steganography. This paper proposes a robust, dynamic, and multi-layered steganography approach that uses text, encryption algorithms, and images. This approach utilizes Arabic diacritic features to hide limited-size and highly classified information. The algorithm uses several scenarios and is extensively tested to ensure the required level of security and user performance. The experimental results on actual data demonstrate the robustness of the proposed algorithm, with no noticeable impact on the carrier message (original text). Furthermore, no known potential attack can break the proposed algorithm, making it a promising solution for text-based steganography. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

25 pages, 6086 KB  
Article
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques
by Iman Qays Abduljaleel, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Mudhafar Jalil Jassim Ghrabat, Junchao Ma and Vincent Omollo Nyangaresi
J. Sens. Actuator Netw. 2022, 11(4), 66; https://doi.org/10.3390/jsan11040066 - 17 Oct 2022
Cited by 12 | Viewed by 3795
Abstract
Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work [...] Read more.
Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work incorporates low-complexity encryption and steganography mechanisms to enhance security during transmission while lowering computational complexity. In message encryption, it is recommended that text file data slicing in binary representation, to achieve different lengths of string, be conducted before text file data masking based on the lightweight Lucas series and mod function to ensure the retrieval of text messages is impossible. The steganography algorithm starts by generating a random key stream using a hybrid of two low-complexity chaotic maps, the Tent map and the Ikeda map. By finding a position vector parallel to the input image vector, these keys are used based on the previously generated position vector to randomly select input image data and create four vectors that can be later used as input for the Lah transform. In this paper, we present an approach for hiding encrypted text files using LSB colour image steganography by applying a low-complexity XOR operation to the most significant bits in 24-bit colour cover images. It is necessary to perform inverse Lah transformation to recover the image pixels and ensure that invisible data cannot be retrieved in a particular sequence. Evaluation of the quality of the resulting stego-images and comparison with other ways of performing encryption and message concealment shows that the stego-image has a higher PSNR, a lower MSE, and an SSIM value close to one, illustrating the suitability of the proposed method. It is also considered lightweight in terms of having lower computational overhead. Full article
(This article belongs to the Special Issue Feature Papers on Computer and Electrical Engineering 2022)
Show Figures

Figure 1

17 pages, 2461 KB  
Article
An Adaptive Enhanced Technique for Locked Target Detection and Data Transmission over Internet of Healthcare Things
by Muhammad Amir Khan, Jawad Khan, Nabila Sehito, Khalid Mahmood, Haider Ali, Inam Bari, Muhammad Arif and Rania M. Ghoniem
Electronics 2022, 11(17), 2726; https://doi.org/10.3390/electronics11172726 - 30 Aug 2022
Cited by 25 | Viewed by 3032 | Correction
Abstract
The incredible advancements in data transmission technology have opened up more potentials for data security than ever before. Numerous methods for data protection have been developed during the previous decades, including steganography and cryptography. The security and integrity of medical data have emerged [...] Read more.
The incredible advancements in data transmission technology have opened up more potentials for data security than ever before. Numerous methods for data protection have been developed during the previous decades, including steganography and cryptography. The security and integrity of medical data have emerged as major barriers for healthcare service systems as the Internet of Things has evolved dramatically in the healthcare business. Communication between two devices securely is a difficult problem. Numerous cryptographic algorithms are already available, including data encryption standard (DES), Rivest–Shamir–Adleman (RSA), and advanced encryption standard (AES). In this paper, we present a hybrid security model for the protection of diagnostic text data contained in medical photographs. The proposed model is built by combining a proposed hybrid encryption system with either a 2D Discrete Wavelet Transform 1 Level (2D-DWT-1L) or a 2D Discrete Wavelet Transform 2 Level (2D-DWT-2L) steganography technique. The suggested model encrypts secret data and hides them using 2D-DWT-3L. As text covers, color and grayscale images are employed. The suggested system’s performance was tested using PSNR, SSIM, MSE, and Correlation. Associated to state-of-the-art approaches, the proposed model masked personal patient data with high capacity, imperceptibility and minimum deterioration in the received stego-image. We use MATLAB to build the proposed mechanism, and measures such as throughput and execution time are used to assess performance. Full article
Show Figures

Figure 1

18 pages, 1102 KB  
Article
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks
by Kangyi Ding, Teng Hu, Weina Niu, Xiaolei Liu, Junpeng He, Mingyong Yin and Xiaosong Zhang
Sensors 2022, 22(17), 6497; https://doi.org/10.3390/s22176497 - 29 Aug 2022
Cited by 7 | Viewed by 3401
Abstract
The Internet has become the main channel of information communication, which contains a large amount of secret information. Although network communication provides a convenient channel for human communication, there is also a risk of information leakage. Traditional image steganography algorithms use manually crafted [...] Read more.
The Internet has become the main channel of information communication, which contains a large amount of secret information. Although network communication provides a convenient channel for human communication, there is also a risk of information leakage. Traditional image steganography algorithms use manually crafted steganographic algorithms or custom models for steganography, while our approach uses ordinary OCR models for information embedding and extraction. Even if our OCR models for steganography are intercepted, it is difficult to find their relevance to steganography. We propose a novel steganography method for character-level text images based on adversarial attacks. We exploit the complexity and uniqueness of neural network boundaries and use neural networks as a tool for information embedding and extraction. We use an adversarial attack to embed the steganographic information into the character region of the image. To avoid detection by other OCR models, we optimize the generation of the adversarial samples and use a verification model to filter the generated steganographic images, which, in turn, ensures that the embedded information can only be recognized by our local model. The decoupling experiments show that the strategies we adopt to weaken the transferability can reduce the possibility of other OCR models recognizing the embedded information while ensuring the success rate of information embedding. Meanwhile, the perturbations we add to embed the information are acceptable. Finally, we explored the impact of different parameters on the algorithm with the potential of our steganography algorithm through parameter selection experiments. We also verify the effectiveness of our validation model to select the best steganographic images. The experiments show that our algorithm can achieve a 100% information embedding rate and more than 95% steganography success rate under the set condition of 3 samples per group. In addition, our embedded information can be hardly detected by other OCR models. Full article
(This article belongs to the Special Issue Security and Privacy for Machine Learning Applications)
Show Figures

Figure 1

16 pages, 16085 KB  
Article
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression
by Urmila Pilania, Rohit Tanwar, Mazdak Zamani and Azizah Abdul Manaf
Future Internet 2022, 14(9), 254; https://doi.org/10.3390/fi14090254 - 25 Aug 2022
Cited by 13 | Viewed by 2765
Abstract
In today’s world of computers everyone is communicating their personal information through the web. So, the security of personal information is the main concern from the research point of view. Steganography can be used for the security purpose of personal information. Storing and [...] Read more.
In today’s world of computers everyone is communicating their personal information through the web. So, the security of personal information is the main concern from the research point of view. Steganography can be used for the security purpose of personal information. Storing and forwarding of embedded personal information specifically in public places is gaining more attention day by day. In this research work, the Integer Wavelet Transform technique along with JPEG (Joint Photograph Expert Group) compression is proposed to overcome some of the issues associated with steganography techniques. Video cover files and JPEG compression improve concealing capacity because of their intrinsic properties. Integer Wavelet Transform is used to improve the imperceptibility and robustness of the proposed technique. The Imperceptibility of the proposed work is analyzed through evaluation parameters such as PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error), SSIM (Structure Similarity Metric), and CC (Correlation Coefficient). Robustness is validated through some image processing attacks. Complexity is calculated in terms of concealing and retrieval time along with the amount of secret information hidden. Full article
(This article belongs to the Special Issue Distributed Systems and Artificial Intelligence)
Show Figures

Figure 1

16 pages, 2483 KB  
Article
MTS-Stega: Linguistic Steganography Based on Multi-Time-Step
by Long Yu, Yuliang Lu, Xuehu Yan and Yongqiang Yu
Entropy 2022, 24(5), 585; https://doi.org/10.3390/e24050585 - 22 Apr 2022
Cited by 7 | Viewed by 3336
Abstract
Generative linguistic steganography encodes candidate words with conditional probability when generating text by language model, and then, it selects the corresponding candidate words to output according to the confidential message to be embedded, thereby generating steganographic text. The encoding techniques currently used in [...] Read more.
Generative linguistic steganography encodes candidate words with conditional probability when generating text by language model, and then, it selects the corresponding candidate words to output according to the confidential message to be embedded, thereby generating steganographic text. The encoding techniques currently used in generative text steganography fall into two categories: fixed-length coding and variable-length coding. Because of the simplicity of coding and decoding and the small computational overhead, fixed-length coding is more suitable for resource-constrained environments. However, the conventional text steganography mode selects and outputs a word at one time step, which is highly susceptible to the influence of confidential information and thus may select words that do not match the statistical distribution of the training text, reducing the quality and concealment of the generated text. In this paper, we inherit the decoding advantages of fixed-length coding, focus on solving the problems of existing steganography methods, and propose a multi-time-step-based steganography method, which integrates multiple time steps to select words that can carry secret information and fit the statistical distribution, thus effectively improving the text quality. In the experimental part, we choose the GPT-2 language model to generate the text, and both theoretical analysis and experiments prove the effectiveness of the proposed scheme. Full article
Show Figures

Figure 1

Back to TopTop