{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T09:47:14Z","timestamp":1750672034934,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031446955"},{"type":"electronic","value":"9783031446962"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44696-2_62","type":"book-chapter","created":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T09:03:59Z","timestamp":1696669439000},"page":"799-812","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Semantic Consistency in\u00a0Linguistic Steganography via\u00a0Denosing Auto-Encoder and\u00a0Semantic-Constrained Huffman Coding"],"prefix":"10.1007","author":[{"given":"Shuoxin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fanxiao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Haosen","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Sixing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,8]]},"reference":[{"key":"62_CR1","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ic.2004.02.003","volume":"192","author":"C Cachin","year":"2004","unstructured":"Cachin, C.: An information-theoretic model for steganography. Inf. Comput. 192, 41\u201356 (2004)","journal-title":"Inf. Comput."},{"key":"62_CR2","doi-asserted-by":"crossref","unstructured":"Dai, F., Cai, Z.: Towards near-imperceptible steganographic text. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics (2019)","DOI":"10.18653\/v1\/P19-1422"},{"key":"62_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-4722-2012-1","volume":"2012","author":"F Djebbar","year":"2012","unstructured":"Djebbar, F., Ayad, B., Meraim, K.A., Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J AUDIO SPEE 2012, 1\u201316 (2012)","journal-title":"EURASIP J AUDIO SPEE"},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"Fang, T., Jaggi, M., Argyraki, K.: Generating steganographic text with LSTMs. In: ACL (2017)","DOI":"10.18653\/v1\/P17-3017"},{"key":"62_CR5","doi-asserted-by":"crossref","unstructured":"Lewis, M., et al.: BART: denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. In: ACL (2020)","DOI":"10.18653\/v1\/2020.acl-main.703"},{"key":"62_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30637-2_41","volume-title":"Database Systems for Advanced Applications","author":"F Li","year":"2023","unstructured":"Li, F., et al.: Rewriting-Stego: generating natural and controllable steganographic text with pre-trained language model. In: Wang, X., et al. (eds.) DASFAA 2023. Lecture Notes in Computer Science, vol. 13943. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30637-2_41"},{"key":"62_CR7","first-page":"1","volume":"2","author":"Y Li","year":"2021","unstructured":"Li, Y., Zhang, J., Yang, Z., Zhang, R.: Topic-aware neural linguistic steganography based on knowledge graphs. ACM\/IMS Trans. Data Sci. 2, 1\u201313 (2021)","journal-title":"ACM\/IMS Trans. Data Sci."},{"key":"62_CR8","first-page":"158","volume":"42","author":"Z Minzhi","year":"2006","unstructured":"Minzhi, Z., Xingming, S., Huazheng, X.: Research on the Chinese text steganography based on the modification of the empty word. Comput. Eng. Appl. 42, 158\u2013160 (2006)","journal-title":"Comput. Eng. Appl."},{"key":"62_CR9","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1109\/LSP.2019.2953953","volume":"26","author":"Y Niu","year":"2019","unstructured":"Niu, Y., Wen, J., Zhong, P., Xue, Y.: A hybrid R-BILSTM-C neural network based text steganalysis. IEEE Signal Process. Lett. 26, 1907\u20131911 (2019)","journal-title":"IEEE Signal Process. Lett."},{"key":"62_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1, 32\u201344 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"62_CR11","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford, A., Wu, J., Child, R., Luan, D., Amodei, D., Sutskever, I.: Language models are unsupervised multitask learners. OpenAI Blog 1, 9 (2019)","journal-title":"OpenAI Blog"},{"key":"62_CR12","doi-asserted-by":"crossref","unstructured":"Shen, J., Ji, H., Han, J.: Near-imperceptible neural linguistic steganography via self-adjusting arithmetic coding. In: EMNLP (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.22"},{"key":"62_CR13","doi-asserted-by":"crossref","unstructured":"Tang, X., Chen, M.: Design and implementation of information hiding system based on RGB. In: CECNet (2013)","DOI":"10.1109\/CECNet.2013.6703310"},{"key":"62_CR14","doi-asserted-by":"crossref","unstructured":"Ueoka, H., Murawaki, Y., Kurohashi, S.: Frustratingly easy edit-based linguistic steganography with a masked language model (2021)","DOI":"10.18653\/v1\/2021.naacl-main.433"},{"key":"62_CR15","unstructured":"Volkhonskiy, D., Borisenko, B., Burnaev, E.: Generative adversarial networks for image steganography (2016)"},{"key":"62_CR16","first-page":"741","volume":"9","author":"K Wang","year":"2014","unstructured":"Wang, K., Zhao, H., Wang, H.: Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. TIFS 9, 741\u2013751 (2014)","journal-title":"TIFS"},{"key":"62_CR17","unstructured":"Xu, M.: Text2vec: text to vector toolkit. https:\/\/github.com\/shibing624\/text2vec (2022)"},{"key":"62_CR18","doi-asserted-by":"crossref","unstructured":"Yang, H., Bao, Y., Yang, Z., Liu, S., Huang, Y., Jiao, S.: Linguistic steganalysis via densely connected LSTM with feature pyramid. In: ACM Workshop on Information Hiding and Multimedia Security (2020)","DOI":"10.1145\/3369412.3395067"},{"key":"62_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/LSP.2021.3122901","volume":"29","author":"J Yang","year":"2021","unstructured":"Yang, J., Yang, Z., Zhang, S., Tu, H., Huang, Y.: SeSy: linguistic steganalysis framework integrating semantic and syntactic features. IEEE Signal Process. Lett. 29, 31\u201335 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"62_CR20","first-page":"859","volume":"18","author":"J Yang","year":"2023","unstructured":"Yang, J., Yang, Z., Zou, J., Tu, H., Huang, Y.: Linguistic steganalysis toward social network. TDSC 18, 859\u2013871 (2023)","journal-title":"TDSC"},{"key":"62_CR21","doi-asserted-by":"crossref","unstructured":"Yang, T., Wu, H., Yi, B., Feng, G., Zhang, X.: Semantic-preserving linguistic steganography by pivot translation and semantic-aware bins coding. TDSC (2023)","DOI":"10.1109\/TDSC.2023.3247493"},{"key":"62_CR22","first-page":"1296","volume":"36","author":"X Yang","year":"2015","unstructured":"Yang, X., Li, F., Xiang, L.: Synonym substitution-based steganographic algorithm with matrix coding. Chin. Comput. Syst. 36, 1296\u20131300 (2015)","journal-title":"Chin. Comput. Syst."},{"key":"62_CR23","first-page":"1280","volume":"14","author":"ZL Yang","year":"2018","unstructured":"Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. TIFS 14, 1280\u20131295 (2018)","journal-title":"TIFS"},{"key":"62_CR24","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/LSP.2019.2920452","volume":"26","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Wang, K., Li, J., Huang, Y., Zhang, Y.J.: TS-RNN: text steganalysis based on recurrent neural networks. IEEE Signal Process. Lett. 26, 1743\u20131747 (2019)","journal-title":"IEEE Signal Process. Lett."},{"key":"62_CR25","unstructured":"Yang, Z., Wei, N., Sheng, J., Huang, Y., Zhang, Y.J.: TS-CNN: text steganalysis from semantic space based on convolutional neural network. arXiv preprint: arXiv:1810.08136 (2018)"},{"key":"62_CR26","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1109\/LSP.2022.3152126","volume":"29","author":"B Yi","year":"2022","unstructured":"Yi, B., Wu, H., Feng, G., Zhang, X.: ALiSa: acrostic linguistic steganography based on BERT and Gibbs sampling. IEEE Signal Process. Lett. 29, 687\u2013691 (2022)","journal-title":"IEEE Signal Process. Lett."},{"key":"62_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, S., Yang, Z., Yang, J., Huang, Y.: Provably secure generative linguistic steganography. In: Findings of the Association for Computational Linguistics: ACL-IJCNLP (2021)","DOI":"10.18653\/v1\/2021.findings-acl.268"},{"key":"62_CR28","unstructured":"Zhang, T., Kishore, V., Wu, F., Weinberger, K.Q., Artzi, Y.: BERTScore: evaluating text generation with BERT. arXiv preprint: arXiv:1904.09675 (2019)"},{"key":"62_CR29","doi-asserted-by":"crossref","unstructured":"Zhao, Z., et al.: UER: an open-source toolkit for pre-training models. EMNLP-IJCNLP (2019)","DOI":"10.18653\/v1\/D19-3041"},{"key":"62_CR30","doi-asserted-by":"crossref","unstructured":"Ziegler, Z., Deng, Y., Rush, A.: Neural linguistic steganography. In: EMNLP-IJCNLP (2019)","DOI":"10.18653\/v1\/D19-1115"}],"container-title":["Lecture Notes in Computer Science","Natural Language Processing and Chinese Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44696-2_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T09:13:31Z","timestamp":1696670011000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44696-2_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031446955","9783031446962"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44696-2_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NLPCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF International Conference on Natural Language Processing and Chinese Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Foshan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nlpcc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tcci.ccf.org.cn\/conference\/2023\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Softconf","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}