{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:31:28Z","timestamp":1776889888716,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1145\/3658664.3659657","type":"proceedings-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T15:09:27Z","timestamp":1718204967000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Co-Stega: Collaborative Linguistic Steganography for the Low Capacity Challenge in Social Media"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2812-0185","authenticated-orcid":false,"given":"Guorui","family":"Liao","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6293-1981","authenticated-orcid":false,"given":"Jinshuai","family":"Yang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0248-171X","authenticated-orcid":false,"given":"Kaiyi","family":"Pang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3825-2230","authenticated-orcid":false,"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[{"name":"Tsinghua University &amp; Zhongguancun Laboratory, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1435731.1437872"},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Neural Information Processing","author":"Wang Huili","year":"2023","unstructured":"Huili Wang, Zhongliang Yang, Jinshuai Yang, Yue Gao, and Yong Huang. Histega: A hierarchical linguistic steganography framework combining retrieval and generation. In International Conference on Neural Information Processing, 2023."},{"key":"e_1_3_2_1_3_1","volume-title":"Sam A Markelon, Vincent Bindschaedler, and Thomas Shrimpton. Covert message passing over public internet platforms using model-based format-transforming encryption. arXiv preprint arXiv:2110.07009","author":"Bauer Luke A","year":"2021","unstructured":"Luke A Bauer, James K Howes IV, Sam A Markelon, Vincent Bindschaedler, and Thomas Shrimpton. Covert message passing over public internet platforms using model-based format-transforming encryption. arXiv preprint arXiv:2110.07009, 2021."},{"key":"e_1_3_2_1_4_1","article-title":"Joint linguistic steganography with bert masked language model and graph attention network","author":"Ding Changhao","year":"2023","unstructured":"Changhao Ding, Zhangjie Fu, Qi Yu, FanWang, and Xianyi Chen. Joint linguistic steganography with bert masked language model and graph attention network. IEEE Transactions on Cognitive and Developmental Systems, 2023.","journal-title":"IEEE Transactions on Cognitive and Developmental Systems"},{"key":"e_1_3_2_1_5_1","first-page":"5486","volume-title":"Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","author":"Ueoka Honai","year":"2021","unstructured":"Honai Ueoka, Yugo Murawaki, and Sadao Kurohashi. Frustratingly easy editbased linguistic steganography with a masked language model. In Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pages 5486--5492, 2021."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3152126"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871746"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1115"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.268"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484550"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179287"},{"key":"e_1_3_2_1_12_1","first-page":"18","article-title":"Linguistic Steganalysis Toward Social Network","author":"Yang Jinshuai","year":"2023","unstructured":"Jinshuai Yang, Zhongliang Yang, Jiajun Zou, Haoqin Tu, and Yongfeng Huang. Linguistic Steganalysis Toward Social Network. IEEE Transactions on Information Forensics And Security, 18, 2023.","journal-title":"IEEE Transactions on Information Forensics And Security"},{"key":"e_1_3_2_1_13_1","volume-title":"Llama 2: Open foundation and fine-tuned chat models. arXiv preprint arXiv:2307.09288","author":"Touvron Hugo","year":"2023","unstructured":"Hugo Touvron, Louis Martin, Kevin Stone, Peter Albert, Amjad Almahairi, Yasmine Babaei, Nikolay Bashlykov, Soumya Batra, Prajjwal Bhargava, Shruti Bhosale, et al. Llama 2: Open foundation and fine-tuned chat models. arXiv preprint arXiv:2307.09288, 2023."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_21"},{"key":"e_1_3_2_1_15_1","first-page":"154","volume-title":"International workshop on digital watermarking","author":"Sallee Phil","year":"2003","unstructured":"Phil Sallee. Model-based steganography. In International workshop on digital watermarking, pages 154--167. Springer, 2003."},{"issue":"8","key":"e_1_3_2_1_16_1","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford Alec","year":"2019","unstructured":"Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. Language models are unsupervised multitask learners. OpenAI blog, 1(8):9, 2019.","journal-title":"OpenAI blog"},{"key":"e_1_3_2_1_17_1","volume-title":"Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101","author":"Loshchilov Ilya","year":"2017","unstructured":"Ilya Loshchilov and Frank Hutter. Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101, 2017."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.552"}],"event":{"name":"IH&MMSEC '24: ACM Workshop on Information Hiding and Multimedia Security","location":"Baiona Spain","acronym":"IH&MMSEC '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658664.3659657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658664.3659657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:43:28Z","timestamp":1755906208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658664.3659657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":18,"alternative-id":["10.1145\/3658664.3659657","10.1145\/3658664"],"URL":"https:\/\/doi.org\/10.1145\/3658664.3659657","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]},"assertion":[{"value":"2024-06-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}