{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T09:47:52Z","timestamp":1768729672290,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":98,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"vor","delay-in-days":7,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF Convergence Accelerator","award":["49100422C0024"],"award-info":[{"award-number":["49100422C0024"]}]},{"name":"DARPA","award":["HR00112020021,HR001120C0084"],"award-info":[{"award-number":["HR00112020021,HR001120C0084"]}]},{"name":"NSF","award":["1955172,2030859"],"award-info":[{"award-number":["1955172,2030859"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690218","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4703-4717","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Pulsar: Secure Steganography for Diffusion Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2740-8407","authenticated-orcid":false,"given":"Tushar M.","family":"Jois","sequence":"first","affiliation":[{"name":"City College of New York, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0026-5094","authenticated-orcid":false,"given":"Gabrielle","family":"Beck","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8886-4748","authenticated-orcid":false,"given":"Gabriel","family":"Kaptchuk","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_46"},{"key":"e_1_3_2_1_3_1","volume-title":"Telecommunications and Other Legislation Amendment (Assistance and Access) Act","author":"Government Australian","year":"2018","unstructured":"Australian Government. [n.,d.]. Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018. https:\/\/www.legislation.gov.au\/Details\/C2018A00148."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--540--30576--7_12"},{"key":"e_1_3_2_1_5_1","unstructured":"Shumeet Baluja. 2017. Hiding Images in Plain Sight: Deep Steganography. In Neural Information Processing Systems. http:\/\/www.esprockets.com\/papers\/nips2017.pdf"},{"key":"e_1_3_2_1_6_1","volume-title":"Hiding images within images","author":"Baluja Shumeet","year":"2019","unstructured":"Shumeet Baluja. 2019. Hiding images within images. IEEE transactions on pattern analysis and machine intelligence, Vol. 42, 7 (2019), 1685--1697."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Elaine Barker and John Kelsey. 2015. NIST Special Publication 800--90A Revision 1 Recommendation for Random Number Generation Using Deterministic Random Bit Generators.","DOI":"10.6028\/NIST.SP.800-90Ar1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.72"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"e_1_3_2_1_10_1","volume-title":"A guide to simulation","author":"Bratley Paul","unstructured":"Paul Bratley, Bennet L Fox, and Linus E Schrage. 2011. A guide to simulation. Springer Science & Business Media."},{"key":"e_1_3_2_1_11_1","unstructured":"Christian Cachin. 2000. An Information-Theoretic Model for Steganography. Cryptology ePrint Archive Report 2000\/028. https:\/\/eprint.iacr.org\/2000\/028."},{"key":"e_1_3_2_1_12_1","volume-title":"Human Language Technologies: The 2010 Annual Conference of the North American","author":"Chang Ching-Yun","year":"1857","unstructured":"Ching-Yun Chang and Stephen Clark. 2010. Linguistic Steganography Using Automatically Generated Paraphrases. In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics (Los Angeles, California) (HLT '10). Association for Computational Linguistics, Stroudsburg, PA, USA, 591--599. http:\/\/dl.acm.org\/citation.cfm?id=1857999.1858083"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1162\/coli_a_00176"},{"key":"e_1_3_2_1_14_1","volume-title":"Deep Learning in steganography and steganalysis from 2015 to","author":"Chaumont Marc","year":"2018","unstructured":"Marc Chaumont. 2019. Deep Learning in steganography and steganalysis from 2015 to 2018. arxiv: 1904.01444 [cs.CR]"},{"key":"e_1_3_2_1_15_1","unstructured":"Civitai. [n. d.]. The Home of Open-Source Generative AI. https:\/\/civitai.com\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1422"},{"key":"e_1_3_2_1_17_1","volume-title":"Diffusion models beat gans on image synthesis. Advances in neural information processing systems","author":"Dhariwal Prafulla","year":"2021","unstructured":"Prafulla Dhariwal and Alexander Nichol. 2021. Diffusion models beat gans on image synthesis. Advances in neural information processing systems, Vol. 34 (2021), 8780--8794."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.00155"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516657"},{"key":"e_1_3_2_1_21_1","volume-title":"Marionette: A Programmable Network Traffic Obfuscation System. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Dyer Kevin P.","year":"2015","unstructured":"Kevin P. Dyer, Scott E. Coull, and Thomas Shrimpton. 2015. Marionette: A Programmable Network Traffic Obfuscation System. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 367--382. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/dyer"},{"key":"e_1_3_2_1_22_1","unstructured":"European Commission. [n. d.]. Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL laying down rules to prevent and combat child sexual abuse. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=COM:2022:209:FIN."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-3017"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0009"},{"key":"e_1_3_2_1_25_1","unstructured":"G David Forney. 1965. Concatenated codes. (1965)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288872"},{"key":"e_1_3_2_1_28_1","unstructured":"Google. 2022. ddpm-bedroom-256. https:\/\/huggingface.co\/google\/ddpm-bedroom-256."},{"key":"e_1_3_2_1_29_1","unstructured":"Google. 2022. ddpm-cat-256. https:\/\/huggingface.co\/google\/ddpm-cat-256."},{"key":"e_1_3_2_1_30_1","unstructured":"Google. 2022. ddpm-celebahq-256. https:\/\/huggingface.co\/google\/ddpm-celebahq-256."},{"key":"e_1_3_2_1_31_1","unstructured":"Google. 2022 d. ddpm-church-256. https:\/\/huggingface.co\/google\/ddpm-church-256."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_17"},{"key":"e_1_3_2_1_33_1","volume-title":"Essential coding theory. Draft","author":"Guruswami Venkatesan","year":"2012","unstructured":"Venkatesan Guruswami, Atri Rudra, and Madhu Sudan. 2012. Essential coding theory. Draft available at http:\/\/www. cse. buffalo. edu\/atri\/courses\/coding-theory\/book, Vol. 2, 1 (2012)."},{"key":"e_1_3_2_1_34_1","unstructured":"Harveyslash. 2018. harveyslash\/Deep-Steganography. https:\/\/github.com\/harveyslash\/Deep-Steganography."},{"key":"e_1_3_2_1_35_1","volume-title":"Denoising diffusion probabilistic models. Advances in neural information processing systems","author":"Ho Jonathan","year":"2020","unstructured":"Jonathan Ho, Ajay Jain, and Pieter Abbeel. 2020. Denoising diffusion probabilistic models. Advances in neural information processing systems, Vol. 33 (2020), 6840--6851."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--45708--9_6"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITCS.2019.42"},{"key":"e_1_3_2_1_38_1","volume-title":"NDSS","author":"Houmansadr Amir","year":"2013","unstructured":"Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, and Andrew C. Singer. 2013. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. In NDSS 2013. The Internet Society."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852771"},{"key":"e_1_3_2_1_40_1","article-title":"A Homophone-based Chinese Text Steganography Scheme for Chatting Applications","volume":"35","author":"Ping-Sheng Huang SHIH-YU","year":"2019","unstructured":"SHIH-YU HUANG and Ping-Sheng Huang. 2019. A Homophone-based Chinese Text Steganography Scheme for Chatting Applications. Journal of Information Science & Engineering, Vol. 35, 4 (2019).","journal-title":"Journal of Information Science & Engineering"},{"key":"e_1_3_2_1_41_1","unstructured":"Hugging Face. [n. d.]. diffusers. https:\/\/github.com\/huggingface\/diffusers."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"e_1_3_2_1_43_1","volume-title":"Pulsar: Secure Steganography for Diffusion Models. Cryptology ePrint Archive, Paper 2023\/1758. https:\/\/eprint.iacr.org\/2023\/1758","author":"Jois Tushar M.","year":"2023","unstructured":"Tushar M. Jois, Gabrielle Beck, and Gabriel Kaptchuk. 2023. Pulsar: Secure Steganography for Diffusion Models. Cryptology ePrint Archive, Paper 2023\/1758. https:\/\/eprint.iacr.org\/2023\/1758"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484550"},{"key":"e_1_3_2_1_45_1","volume-title":"Diffusion-stego: Training-free diffusion generative steganography via message projection. arXiv preprint arXiv:2305.18726","author":"Kim Daegyu","year":"2023","unstructured":"Daegyu Kim, Chaehun Shin, Jooyoung Choi, Dahuin Jung, and Sungroh Yoon. 2023. Diffusion-stego: Training-free diffusion generative steganography via message projection. arXiv preprint arXiv:2305.18726 (2023)."},{"key":"e_1_3_2_1_46_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma Diederik P","year":"2013","unstructured":"Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_3_2_1_47_1","unstructured":"Jennifer Korn. 2023. Microsoft Outlook will soon write emails for you. CNN."},{"key":"e_1_3_2_1_48_1","unstructured":"Chris L. [n. d.]. Steganography online. https:\/\/stylesuxx.github.io\/steganography\/."},{"key":"e_1_3_2_1_49_1","unstructured":"Tri Van Le. 2003. Efficient Provably Secure Public Key Steganography. Cryptology ePrint Archive Report 2003\/156. https:\/\/eprint.iacr.org\/2003\/156."},{"key":"e_1_3_2_1_50_1","unstructured":"Tri Van Le and Kaoru Kurosawa. 2003. Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks. Cryptology ePrint Archive Report 2003\/244. https:\/\/eprint.iacr.org\/2003\/244."},{"key":"e_1_3_2_1_51_1","volume-title":"Deniable Diffusion Generative Steganography. In 2023 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 67--71","author":"Liu Tengjun","year":"2023","unstructured":"Tengjun Liu, Ying Chen, and Wanxuan Gu. 2023. Deniable Diffusion Generative Steganography. In 2023 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 67--71."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"e_1_3_2_1_53_1","volume-title":"Format-Abiding Encryption Schemes. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Luchaup Daniel","year":"2014","unstructured":"Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, and Thomas Shrimpton. 2014. LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 877--891. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/luchaup"},{"key":"e_1_3_2_1_54_1","volume-title":"International Workshop on Information Hiding. Springer, 1--16","author":"Mittelholzer Thomas","year":"1999","unstructured":"Thomas Mittelholzer. 1999. An information-theoretic approach to steganography and watermarking. In International Workshop on Information Hiding. Springer, 1--16."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101777"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612514"},{"key":"e_1_3_2_1_58_1","unstructured":"Trevor Perrin and Moxie Marlinspike. [n. d.]. he Double Ratchet Algorithm. Available at https:\/\/whispersystems.org\/docs\/specifications\/doubleratchet\/."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07085-3_2"},{"key":"e_1_3_2_1_60_1","unstructured":"Reddit. [n. d.]. \/r\/aiArt. https:\/\/old.reddit.com\/r\/aiArt."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2018. RFC 8446 - The Transport Layer Security (TLS) Protocol Version 1.3. https:\/\/datatracker.ietf.org\/doc\/html\/rfc8446#page-160.","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_63_1","unstructured":"Leonid Reyzin and Scott Russell. 2003. Simple Stateless Steganography. Cryptology ePrint Archive Report 2003\/093. https:\/\/eprint.iacr.org\/2003\/093."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.13154\/tosc.v2017.i1.506--544"},{"key":"e_1_3_2_1_66_1","volume-title":"Burcu Karagol Ayan, S. Sara Mahdavi, Rapha Gontijo Lopes, Tim Salimans, Jonathan Ho, David J Fleet, and Mohammad Norouzi.","author":"Saharia Chitwan","year":"2022","unstructured":"Chitwan Saharia, William Chan, Saurabh Saxena, Lala Li, Jay Whang, Emily Denton, Seyed Kamyar Seyed Ghasemipour, Burcu Karagol Ayan, S. Sara Mahdavi, Rapha Gontijo Lopes, Tim Salimans, Jonathan Ho, David J Fleet, and Mohammad Norouzi. 2022. Photorealistic Text-to-Image Diffusion Models with Deep Language Understanding. arxiv: 2205.11487 [cs.CV]"},{"key":"e_1_3_2_1_67_1","volume-title":"IEEE International Conference on Image Processing (ICIP)","author":"Sarkar A.","unstructured":"A. Sarkar, K. Solanki, and B. S. Manjunath. 2007. Secure Steganography: Statistical Restoration in the Transform Domain with Best Integer Perturbations to Pixel Values. In IEEE International Conference on Image Processing (ICIP) (San Antonio, Texas). https:\/\/vision.ece.ucsb.edu\/sites\/default\/files\/publications\/sarkar_icip07_fractional_binwidth.pdf"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030-01554--1_4"},{"key":"e_1_3_2_1_69_1","volume-title":"Information Hiding: 8th International Workshop, IH","author":"Shi Yun Q","year":"2006","unstructured":"Yun Q Shi, Chunhua Chen, and Wen Chen. 2007. A Markov process based approach to effective attacking JPEG steganography. In Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10--12, 2006. Revised Selcted Papers 8. Springer, 249--264."},{"key":"e_1_3_2_1_70_1","volume-title":"Text Steganography in SMS. 2007 International Conference on Convergence Information Technology (ICCIT 2007)","author":"Shirali-Shahreza Mohammad","year":"2007","unstructured":"Mohammad Shirali-Shahreza and M. H. Shirali-Shahreza. 2007. Text Steganography in SMS. 2007 International Conference on Convergence Information Technology (ICCIT 2007) (2007), 2260--2265."},{"key":"e_1_3_2_1_71_1","volume-title":"CRYPTO'83,","author":"Simmons Gustavus J.","unstructured":"Gustavus J. Simmons. 1983. The Prisoners' Problem and the Subliminal Channel. In CRYPTO'83,, David Chaum (Ed.). Plenum Press, New York, USA, 51--67."},{"key":"e_1_3_2_1_72_1","volume-title":"International conference on machine learning. PMLR, 2256--2265","author":"Sohl-Dickstein Jascha","year":"2015","unstructured":"Jascha Sohl-Dickstein, Eric Weiss, Niru Maheswaranathan, and Surya Ganguli. 2015. Deep unsupervised learning using nonequilibrium thermodynamics. In International conference on machine learning. PMLR, 2256--2265."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312388"},{"key":"e_1_3_2_1_74_1","volume-title":"Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502","author":"Song Jiaming","year":"2020","unstructured":"Jiaming Song, Chenlin Meng, and Stefano Ermon. 2020. Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502 (2020)."},{"key":"e_1_3_2_1_75_1","volume-title":"Zero Divergence, Steganography","author":"Sullivan Kenneth","unstructured":"Kenneth Sullivan, Kaushal Solanki, B. S. Manjunath, Upamanyu Madhow, and Shivkumar Chandrasekaran. 2006. Determining Achievable Rates for Secure, Zero Divergence, Steganography. In ICIP. IEEE, 121--124."},{"key":"e_1_3_2_1_76_1","unstructured":"Aaron Swartz et al. 2013. SecureDrop. https:\/\/github.com\/freedomofpress\/securedrop."},{"key":"e_1_3_2_1_77_1","unstructured":"The Sage Developers. 2023. SageMath the Sage Mathematics Software System (Version x.y.z). https:\/\/www.sagemath.org."},{"key":"e_1_3_2_1_78_1","unstructured":"Tor Project. [n. d.]. The Tor Project: Privacy and Freedom Online. https:\/\/www.torproject.org\/."},{"key":"e_1_3_2_1_79_1","volume-title":"Online Safety Act","author":"United Kingdom Parliament. [n.,d.].","year":"2023","unstructured":"United Kingdom Parliament. [n.,d.]. Online Safety Act 2023. https:\/\/bills.parliament.uk\/bills\/3137."},{"key":"e_1_3_2_1_80_1","volume-title":"States Congress. [n.,d.]. S.1409 - Kids Online Safety Act. https:\/\/www.congress.gov\/bill\/118th-congress\/senate-bill\/1409","author":"United","unstructured":"United States Congress. [n.,d.]. S.1409 - Kids Online Safety Act. https:\/\/www.congress.gov\/bill\/118th-congress\/senate-bill\/1409."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_2_1_82_1","unstructured":"James Vincent. 2022. AI-generated selfies could be the next Snapchat filters. The Verge."},{"key":"e_1_3_2_1_83_1","unstructured":"Denis Volkhonskiy Ivan Nazarov Boris Borisenko and Evgeny Burnaev. 2017. Steganographic Generative Adversarial Networks. arxiv: 1703.05502 [cs.MM]"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--540--24676--3_20"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382212"},{"key":"e_1_3_2_1_86_1","unstructured":"WhatsApp. 2017. WhatsApp Encryption Overview. Available at https:\/\/scontent.whatsapp.net\/v\/t61\/68135620_760356657751682_6212997528851833559_n.pdf\/WhatsApp-Security-Whitepaper.pdf."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517856"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060054"},{"key":"e_1_3_2_1_89_1","unstructured":"Lingyun Xiang. 2018. Reversible natural language watermarking using synonym substitution and arithmetic coding."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00772"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871746"},{"key":"e_1_3_2_1_92_1","volume-title":"Automatically Generate Steganographic Text Based on Markov Model and Huffman Coding. arxiv","author":"Yang Zhongliang","year":"1811","unstructured":"Zhongliang Yang, Shuyu Jin, Yongfeng Huang, Yujin Zhang, and Hui Li. 2018. Automatically Generate Steganographic Text Based on Markov Model and Huffman Coding. arxiv: 1811.04720 [cs.CR]"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"e_1_3_2_1_94_1","volume-title":"Advances in Neural Information Processing Systems","volume":"36","author":"Yu Jiwen","year":"2024","unstructured":"Jiwen Yu, Xuanyu Zhang, Youmin Xu, and Jian Zhang. 2024. Cross: Diffusion model makes controllable, robust and secure image steganography. Advances in Neural Information Processing Systems, Vol. 36 (2024)."},{"key":"e_1_3_2_1_95_1","unstructured":"Zhenshan Yu Liusheng Huang Zhili Chen Lingjun Li Xinxin Zhao and Youwen Zhu. 2009. Steganalysis of Synonym-Substitution Based Natural Language Watermarking."},{"key":"e_1_3_2_1_96_1","volume-title":"Rush","author":"Ziegler Zachary M.","year":"2019","unstructured":"Zachary M. Ziegler, Yuntian Deng, and Alexander M. Rush. 2019. Neural Linguistic Steganography. arxiv: 1909.01496 [cs.CL]"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0029"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_24"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690218","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690218","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:11:06Z","timestamp":1755843066000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":98,"alternative-id":["10.1145\/3658644.3690218","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690218","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}