{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T03:06:37Z","timestamp":1775790397210,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819980727","type":"print"},{"value":"9789819980734","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8073-4_4","type":"book-chapter","created":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T08:02:54Z","timestamp":1699948974000},"page":"41-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Hi-Stega: A Hierarchical Linguistic Steganography Framework Combining Retrieval and\u00a0Generation"],"prefix":"10.1007","author":[{"given":"Huili","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhongliang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jinshuai","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,15]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100316","volume":"38","author":"AA AlSabhany","year":"2020","unstructured":"AlSabhany, A.A., Ali, A.H., Ridzuan, F., Azni, A., Mokhtar, M.R.: Digital audio steganography: systematic review, classification, and analysis of the current state of the art. Comput. Sci. Rev. 38, 100316 (2020)","journal-title":"Comput. Sci. Rev."},{"issue":"4","key":"4_CR2","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4), 474\u2013481 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1162\/COLI_a_00176","volume":"40","author":"CY Chang","year":"2014","unstructured":"Chang, C.Y., Clark, S.: Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method. Comput. Linguist. 40(2), 403\u2013448 (2014)","journal-title":"Comput. Linguist."},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-27051-7_12","volume-title":"Cloud Computing and Security","author":"X Chen","year":"2015","unstructured":"Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the Chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133\u2013143. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27051-7_12"},{"key":"4_CR5","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Gao, T., Yao, X., Chen, D.: SimCSE: simple contrastive learning of sentence embeddings. In: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, pp. 6894\u20136910 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.552"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Jiang, T., et al.: PromptBERT: improving BERT sentence embeddings with prompts. arXiv preprint arXiv:2201.04337 (2022)","DOI":"10.18653\/v1\/2022.emnlp-main.603"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim, I.J., Premaratne, P., Vial, P.J., Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 299\u2013326 (2019)","journal-title":"Neurocomputing"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Kang, H., Wu, H., Zhang, X.: Generative text steganography based on LSTM network and attention mechanism with keywords. Electron. Imaging 2020(4), 291-1 (2020)","DOI":"10.2352\/ISSN.2470-1173.2020.4.MWSF-291"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Kaptchuk, G., Jois, T.M., Green, M., Rubin, A.D.: Meteor: cryptographically secure steganography for realistic distributions. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1529\u20131548 (2021)","DOI":"10.1145\/3460120.3484550"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Krishnan, R.B., Thandra, P.K., Baba, M.S.: An overview of text steganography. In: 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICSCN.2017.8085643"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.neucom.2018.09.091","volume":"335","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Liu, S., Wang, Y., Zhao, H., Liu, S.: Video steganography: a review. Neurocomputing 335, 238\u2013250 (2019)","journal-title":"Neurocomputing"},{"key":"4_CR13","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101 (2017)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Mikolov, T., Zweig, G.: Context dependent recurrent neural network language model. In: 2012 IEEE Spoken Language Technology Workshop (SLT), pp. 234\u2013239. IEEE (2012)","DOI":"10.1109\/SLT.2012.6424228"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Pascual, D., Egressy, B., Meister, C., Cotterell, R., Wattenhofer, R.: A plug-and-play method for controlled text generation. In: Findings of the Association for Computational Linguistics: EMNLP 2021, pp. 3973\u20133997 (2021)","DOI":"10.18653\/v1\/2021.findings-emnlp.334"},{"key":"4_CR16","unstructured":"Pillutla, K., et al.: MAUVE: measuring the gap between neural text and human text using divergence frontiers. In: Advances in Neural Information Processing Systems, vol. 34, pp. 4816\u20134828 (2021)"},{"issue":"8","key":"4_CR17","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford, A., et al.: Language models are unsupervised multitask learners. OpenAI Blog 1(8), 9 (2019)","journal-title":"OpenAI Blog"},{"key":"4_CR18","unstructured":"Reinsel, D., Gantz, J., Rydning, J.: Data age 2025: the evolution of data to life-critical. Don\u2019t Focus on Big Data 2 (2017)"},{"issue":"5","key":"4_CR19","first-page":"410","volume":"1","author":"ENC Wai","year":"2011","unstructured":"Wai, E.N.C., Khine, M.A.: Modified linguistic steganography approach by using syntax bank and digital signature. Int. J. Inf. Educ. Technol. 1(5), 410 (2011)","journal-title":"Int. J. Inf. Educ. Technol."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Wang, F., Huang, L., Chen, Z., Yang, W., Miao, H.: A novel text steganography by context-based equivalent substitution. In: 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/ICSPCC.2013.6663950"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"95665","DOI":"10.1109\/ACCESS.2019.2929123","volume":"7","author":"K Wang","year":"2019","unstructured":"Wang, K., Gao, Q.: A coverless plain text steganography based on character features. IEEE Access 7, 95665\u201395676 (2019)","journal-title":"IEEE Access"},{"issue":"21","key":"4_CR22","doi-asserted-by":"publisher","first-page":"28969","DOI":"10.1007\/s11042-018-6072-8","volume":"77","author":"L Xiang","year":"2018","unstructured":"Xiang, L., Wu, W., Li, X., Yang, C.: A linguistic steganography based on word indexing compression and candidate selection. Multimedia Tools Appl. 77(21), 28969\u201328989 (2018). https:\/\/doi.org\/10.1007\/s11042-018-6072-8","journal-title":"Multimedia Tools Appl."},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/LSP.2021.3122901","volume":"29","author":"J Yang","year":"2021","unstructured":"Yang, J., Yang, Z., Zhang, S., Tu, H., Huang, Y.: SeSy: linguistic steganalysis framework integrating semantic and syntactic features. IEEE Sig. Process. Lett. 29, 31\u201335 (2021)","journal-title":"IEEE Sig. Process. Lett."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Yang, T., Wu, H., Yi, B., Feng, G., Zhang, X.: Semantic-preserving linguistic steganography by pivot translation and semantic-aware bins coding. IEEE Trans. Dependable Secure Comput. (2023)","DOI":"10.1109\/TDSC.2023.3247493"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Yang, Z., Xu, C., Wu, W., Li, Z.: Read, attend and comment: a deep architecture for automatic news comment generation. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), pp. 5077\u20135089 (2019)","DOI":"10.18653\/v1\/D19-1512"},{"issue":"5","key":"4_CR26","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2018.2871746","volume":"14","author":"ZL Yang","year":"2018","unstructured":"Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-Stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280\u20131295 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR27","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TIFS.2020.3023279","volume":"16","author":"ZL Yang","year":"2020","unstructured":"Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880\u2013895 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR28","unstructured":"Yang, Z., Wei, N., Sheng, J., Huang, Y., Zhang, Y.J.: TS-CNN: text steganalysis from semantic space based on convolutional neural network. arXiv preprint arXiv:1810.08136 (2018)"},{"key":"4_CR29","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/LSP.2021.3058889","volume":"28","author":"Z Yang","year":"2021","unstructured":"Yang, Z., Xiang, L., Zhang, S., Sun, X., Huang, Y.: Linguistic generative steganography with enhanced cognitive-imperceptibility. IEEE Sig. Process. Lett. 28, 409\u2013413 (2021)","journal-title":"IEEE Sig. Process. Lett."},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-319-68505-2_11","volume-title":"Cloud Computing and Security","author":"J Zhang","year":"2017","unstructured":"Zhang, J., Xie, Y., Wang, L., Lin, H.: Coverless text information hiding method using the frequent words distance. In: Sun, X., Chao, H.-C., You, X., Bertino, E. (eds.) ICCCS 2017. LNCS, vol. 10602, pp. 121\u2013132. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68505-2_11"},{"key":"4_CR31","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/LSP.2020.3042413","volume":"28","author":"S Zhang","year":"2020","unstructured":"Zhang, S., Yang, Z., Yang, J., Huang, Y.: Linguistic steganography: from symbolic space to semantic space. IEEE Sig. Process. Lett. 28, 11\u201315 (2020)","journal-title":"IEEE Sig. Process. Lett."},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, S., Yang, Z., Yang, J., Huang, Y.: Provably secure generative linguistic steganography. In: Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021, pp. 3046\u20133055 (2021)","DOI":"10.18653\/v1\/2021.findings-acl.268"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Ziegler, Z., Deng, Y., Rush, A.M.: Neural linguistic steganography. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), pp. 1210\u20131215 (2019)","DOI":"10.18653\/v1\/D19-1115"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8073-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:35:55Z","timestamp":1710354955000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8073-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"ISBN":["9789819980727","9789819980734"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8073-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"15 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changsha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1274","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"650","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.46","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}