{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:10Z","timestamp":1773511090526,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":43,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819981472","type":"print"},{"value":"9789819981489","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8148-9_44","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T10:02:23Z","timestamp":1700906543000},"page":"571-584","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Minimizing Distortion in\u00a0Steganography via\u00a0Adaptive Language Model Tuning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1354-6933","authenticated-orcid":false,"given":"Cheng","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6293-1981","authenticated-orcid":false,"given":"Jinshuai","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8404-6003","authenticated-orcid":false,"given":"Yue","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3884-882X","authenticated-orcid":false,"given":"Huili","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3825-2230","authenticated-orcid":false,"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"issue":"2","key":"44_CR1","first-page":"197","volume":"54","author":"Y Cao","year":"2018","unstructured":"Cao, Y., Zhou, Z., Sun, X., Gao, C.: Coverless information hiding based on the molecular structure images of material. Comput. Mater. Continua 54(2), 197\u2013207 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"44_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-020-00524-4","volume":"2020","author":"Y Cao","year":"2020","unstructured":"Cao, Y., Zhou, Z., Wu, Q.M.J., Yuan, C., Sun, X.: Coverless information hiding based on the generation of anime characters. EURASIP J. Image Video Process. 2020(1), 1\u201315 (2020). https:\/\/doi.org\/10.1186\/s13640-020-00524-4","journal-title":"EURASIP J. Image Video Process."},{"key":"44_CR3","unstructured":"Christian, Sokota, S., J, Foerster, J., Strohmeier, M.: Perfectly secure steganography using minimum entropy coupling. arXiv pre-print server (2023). https:\/\/doi.org\/Nonearxiv:2210.14889, https:\/\/arxiv.org\/abs\/2210.14889"},{"key":"44_CR4","unstructured":"Dathathri, S., et al.: Plug and play language models: a simple approach to controlled text generation. arXiv preprint arXiv:1912.02164 (2019)"},{"key":"44_CR5","unstructured":"Go, A., Bhayani, R., Huang, L.: Twitter sentiment classification using distant supervision. CS224N Project Report, Stanford 1(12), 2009 (2009)"},{"issue":"8","key":"44_CR6","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"issue":"12","key":"44_CR7","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/76.974678","volume":"11","author":"D Huang","year":"2001","unstructured":"Huang, D., Yan, H.: Interword distance changes represented by sine waves for watermarking text images. IEEE Trans. Circ. Syst. Video Technol. 11(12), 1237\u20131245 (2001)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"44_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain, M., Wahab, A.W.A., Idris, Y.I.B., Ho, A.T., Jung, K.H.: Image steganography in spatial domain: a survey. Signal Process. Image Commun. 65, 46\u201366 (2018)","journal-title":"Signal Process. Image Commun."},{"key":"44_CR9","unstructured":"Inui, K., Jiang, J., Ng, V., Wan, X.: Proceedings of the 2019 conference on empirical methods in natural language processing and the 9th international joint conference on natural language processing (EMNLP-IJCNLP). In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP) (2019)"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Kaur, S., Singh, S., Kaur, M., Lee, H.N.: A systematic review of computational image steganography approaches. Arch. Comput. Meth. Eng. 29, 4775\u20134797 (2022)","DOI":"10.1007\/s11831-022-09749-0"},{"key":"44_CR11","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Krishnan, R.B., Thandra, P.K., Baba, M.S.: An overview of text steganography. In: 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICSCN.2017.8085643"},{"key":"44_CR13","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: International Conference on Machine Learning, pp. 1188\u20131196. PMLR (2014)"},{"key":"44_CR14","unstructured":"LeBrun, B., Sordoni, A., O\u2019Donnell, T.J.: Evaluating distributional distortion in neural language modeling. arXiv preprint arXiv:2203.12788 (2022)"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Lewis, M., et al.: BART: denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. arXiv preprint arXiv:1910.13461 (2019)","DOI":"10.18653\/v1\/2020.acl-main.703"},{"key":"44_CR16","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TDSC.2022.3156972","volume":"20","author":"S Li","year":"2022","unstructured":"Li, S., Wang, J., Liu, P.: Detection of generative linguistic steganography based on explicit and latent text word relation mining using deep learning. IEEE Trans. Dependable Secure Comput. 20, 1476\u20131487 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"44_CR17","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.neucom.2018.09.091","volume":"335","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Liu, S., Wang, Y., Zhao, H., Liu, S.: video steganography: a review. Neurocomputing 335, 238\u2013250 (2019)","journal-title":"Neurocomputing"},{"key":"44_CR18","unstructured":"Maas, A., Daly, R.E., Pham, P.T., Huang, D., Ng, A.Y., Potts, C.: Learning word vectors for sentiment analysis. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, pp. 142\u2013150 (2011)"},{"key":"44_CR19","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/978-981-10-3773-3_56","volume-title":"Advances in Computer and Computational Sciences","author":"S Mishra","year":"2018","unstructured":"Mishra, S., Yadav, V.K., Trivedi, M.C., Shrimali, T.: Audio steganography techniques: a survey. In: Bhatia, S.K., Mishra, K.K., Tiwari, S., Singh, V.K. (eds.) Advances in Computer and Computational Sciences. AISC, vol. 554, pp. 581\u2013589. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-3773-3_56"},{"key":"44_CR20","unstructured":"Moraldo, H.H.: An approach for text steganography based on Markov chains. arXiv preprint arXiv:1409.0915 (2014)"},{"key":"44_CR21","doi-asserted-by":"publisher","first-page":"161825","DOI":"10.1109\/ACCESS.2020.3021356","volume":"8","author":"RJ Mstafa","year":"2020","unstructured":"Mstafa, R.J., Younis, Y.M., Hussein, H.I., Atto, M.: A new video steganography scheme based on Shi-Tomasi corner detector. IEEE Access 8, 161825\u2013161837 (2020)","journal-title":"IEEE Access"},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"Murphy, B., Vogel, C.: The syntax of concealment: reliable methods for plain text information hiding. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 351\u2013362. SPIE (2007)","DOI":"10.1117\/12.713357"},{"issue":"12","key":"44_CR23","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1109\/LSP.2019.2953953","volume":"26","author":"Y Niu","year":"2019","unstructured":"Niu, Y., Wen, J., Zhong, P., Xue, Y.: A hybrid R-BILSTM-C neural network based text steganalysis. IEEE Sig. Process. Lett. 26(12), 1907\u20131911 (2019)","journal-title":"IEEE Sig. Process. Lett."},{"key":"44_CR24","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1109\/LSP.2021.3097241","volume":"28","author":"W Peng","year":"2021","unstructured":"Peng, W., Zhang, J., Xue, Y., Yang, Z.: Real-time text steganalysis based on multi-stage transfer learning. IEEE Signal Process. Lett. 28, 1510\u20131514 (2021)","journal-title":"IEEE Signal Process. Lett."},{"issue":"6","key":"44_CR25","first-page":"735","volume":"7","author":"LY Por","year":"2008","unstructured":"Por, L.Y., Ang, T., Delina, B.: WhiteSteg: a new scheme in information hiding using text steganography. WSEAS Trans. Comput. 7(6), 735\u2013745 (2008)","journal-title":"WSEAS Trans. Comput."},{"issue":"8","key":"44_CR26","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford, A., Wu, J., Child, R., Luan, D., Amodei, D., Sutskever, I.: Language models are unsupervised multitask learners. OpenAI Blog 1(8), 9 (2019)","journal-title":"OpenAI Blog"},{"issue":"3","key":"44_CR27","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1007\/s11042-012-1223-9","volume":"70","author":"E Satir","year":"2014","unstructured":"Satir, E., Isik, H.: A Huffman compression based text steganography method. Multimedia Tools Appl. 70(3), 2085\u20132110 (2014)","journal-title":"Multimedia Tools Appl."},{"issue":"8","key":"44_CR28","doi-asserted-by":"publisher","first-page":"802","DOI":"10.3103\/S0146411616080174","volume":"50","author":"AN Shniperov","year":"2016","unstructured":"Shniperov, A.N., Nikitina, K.: A text steganography method based on Markov chains. Autom. Control. Comput. Sci. 50(8), 802\u2013808 (2016)","journal-title":"Autom. Control. Comput. Sci."},{"key":"44_CR29","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, pp. 5998\u20136008 (2017)"},{"key":"44_CR30","unstructured":"Wolf, T., et al.: Transformers: state-of-the-art natural language processing. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, pp. 38\u201345 (2020)"},{"key":"44_CR31","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/LSP.2021.3062233","volume":"28","author":"H Wu","year":"2021","unstructured":"Wu, H., Yi, B., Ding, F., Feng, G., Zhang, X.: Linguistic steganalysis with graph neural networks. IEEE Signal Process. Lett. 28, 558\u2013562 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"44_CR32","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TIFS.2019.2963764","volume":"15","author":"J Wu","year":"2020","unstructured":"Wu, J., Chen, B., Luo, W., Fang, Y.: Audio steganography based on iterative adversarial attacks against convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 15, 2282\u20132294 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"44_CR33","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1109\/LSP.2022.3185946","volume":"29","author":"L Xiang","year":"2022","unstructured":"Xiang, L., Liu, Y., You, H., Ou, C.: Aggregating local and global text features for linguistic steganalysis. IEEE Signal Process. Lett. 29, 1502\u20131506 (2022)","journal-title":"IEEE Signal Process. Lett."},{"issue":"5","key":"44_CR34","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2018.2871746","volume":"14","author":"ZL Yang","year":"2018","unstructured":"Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-Stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280\u20131295 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"44_CR35","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TIFS.2020.3023279","volume":"16","author":"ZL Yang","year":"2020","unstructured":"Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880\u2013895 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"25","key":"44_CR36","doi-asserted-by":"publisher","first-page":"18293","DOI":"10.1007\/s11042-020-08716-w","volume":"79","author":"Z Yang","year":"2020","unstructured":"Yang, Z., Huang, Y., Zhang, Y.J.: TS-CSW: text steganalysis and hidden capacity estimation based on convolutional sliding windows. Multimedia Tools Appl. 79(25), 18293\u201318316 (2020)","journal-title":"Multimedia Tools Appl."},{"key":"44_CR37","unstructured":"Yang, Z., Jin, S., Huang, Y., Zhang, Y., Li, H.: Automatically generate steganographic text based on Markov model and Huffman coding. arXiv preprint arXiv:1811.04720 (2018)"},{"issue":"12","key":"44_CR38","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/LSP.2019.2920452","volume":"26","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Wang, K., Li, J., Huang, Y., Zhang, Y.J.: TS-RNN: text steganalysis based on recurrent neural networks. IEEE Signal Process. Lett. 26(12), 1743\u20131747 (2019)","journal-title":"IEEE Signal Process. Lett."},{"issue":"8","key":"44_CR39","doi-asserted-by":"publisher","first-page":"2217","DOI":"10.1109\/TIFS.2019.2895200","volume":"14","author":"X Yi","year":"2019","unstructured":"Yi, X., Yang, K., Zhao, X., Wang, Y., Yu, H.: AHCM: adaptive Huffman code mapping for audio steganography based on psychoacoustic model. IEEE Trans. Inf. Forensics Secur. 14(8), 2217\u20132231 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"44_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, S., Yang, Z., Yang, J., Huang, Y.: Provably secure generative linguistic steganography. arXiv preprint arXiv:2106.02011 (2021)","DOI":"10.18653\/v1\/2021.findings-acl.268"},{"key":"44_CR41","doi-asserted-by":"publisher","first-page":"179891","DOI":"10.1109\/ACCESS.2019.2955990","volume":"7","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Cao, Y., Wang, M., Fan, E., Wu, Q.J.: Faster-RCNN based robust coverless information hiding system in cloud environment. IEEE Access 7, 179891\u2013179897 (2019)","journal-title":"IEEE Access"},{"key":"44_CR42","doi-asserted-by":"publisher","unstructured":"Ziegler, Z., Deng, Y., Rush, A.: Neural linguistic steganography. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), pp. 1210\u20131215. Association for Computational Linguistics, Hong Kong, China (2019). https:\/\/doi.org\/10.18653\/v1\/D19-1115. https:\/\/aclanthology.org\/D19-1115","DOI":"10.18653\/v1\/D19-1115"},{"key":"44_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-030-69449-4_7","volume-title":"Digital Forensics and Watermarking","author":"J Zou","year":"2021","unstructured":"Zou, J., Yang, Z., Zhang, S., Rehman, S., Huang, Y.: High-performance linguistic steganalysis, capacity estimation and steganographic positioning. In: Zhao, X., Shi, Y.-Q., Piva, A., Kim, H.J. (eds.) IWDW 2020. LNCS, vol. 12617, pp. 80\u201393. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-69449-4_7"}],"container-title":["Communications in Computer and Information Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8148-9_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:42:16Z","timestamp":1710268936000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8148-9_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"ISBN":["9789819981472","9789819981489"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8148-9_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changsha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1274","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"650","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.46","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}