{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:18:59Z","timestamp":1740158339009,"version":"3.37.3"},"reference-count":22,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,4,17]],"date-time":"2021-04-17T00:00:00Z","timestamp":1618617600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61861015","ZDYF2020017"],"award-info":[{"award-number":["61861015","ZDYF2020017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013142","name":"Key Research and Development Project of Hainan Province","doi-asserted-by":"publisher","award":["61861015","ZDYF2020017"],"award-info":[{"award-number":["61861015","ZDYF2020017"]}],"id":[{"id":"10.13039\/501100013142","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2021,4,17]]},"abstract":"<jats:p>Linguistic steganalysis can indicate the existence of steganographic content in suspicious text carriers. Precise linguistic steganalysis on suspicious carrier is critical for multimedia security. In this paper, we introduced a neural linguistic steganalysis approach based on multi-head self-attention. In the proposed steganalysis approach, words in text are firstly mapped into semantic space with a hidden representation for better modeling the semantic features. Then, we utilize multi-head self-attention to model the interactions between words in carrier. Finally, a softmax layer is utilized to categorize the input text as cover or stego. Extensive experiments validate the effectiveness of our approach.<\/jats:p>","DOI":"10.1155\/2021\/6668369","type":"journal-article","created":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T21:36:19Z","timestamp":1618868179000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Neural Linguistic Steganalysis via Multi-Head Self-Attention"],"prefix":"10.1155","volume":"2021","author":[{"given":"Sai-Mei","family":"Jiao","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Hainan Tropical Ocean University, Sanya, Hainan 572022, China"}]},{"given":"Hai-feng","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Hainan Tropical Ocean University, Sanya, Hainan 572022, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9195-8000","authenticated-orcid":true,"given":"Kun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Education Center of MTA, Hainan Tropical Ocean University, Sanya, Hainan 572022, China"}]},{"given":"Ya-qi","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Hainan Tropical Ocean University, Sanya, Hainan 572022, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media","author":"J. Fridrich","year":"2009"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871746"},{"first-page":"204","article-title":"Steganalysis of VOIP streams with CNN-LSTM network","author":"H. Yang","key":"3"},{"article-title":"Attacks on lexical natural language steganography systems","author":"C. Taskiran","key":"4","doi-asserted-by":"crossref","DOI":"10.1117\/12.649551"},{"key":"5","article-title":"Blind linguistic steganalysis against translation based steganography","volume-title":"Lecture Notes in Computer Science","author":"Z. Chen","year":"2011"},{"issue":"4","key":"6","first-page":"661","article-title":"Linguistic steganalysis based on meta features and immune mechanism","volume":"19","author":"H. Yang","year":"2010","journal-title":"Chinese Journal of Electronics"},{"author":"X. Zuo","key":"7","article-title":"Text semantic steganalysis based on word embedding"},{"article-title":"Text steganalysis with attentional LSTM-CNN","year":"2019","author":"Y. J. Bao","key":"8"},{"first-page":"5998","article-title":"Attention is all you need","author":"A. Vaswani","key":"9"},{"author":"H. Yang","key":"10","article-title":"Fcem: a novel fast correlation extract model for real time steganalysis of VOIP stream via multi-head attention"},{"author":"K. He","key":"11","article-title":"Deep residual learning for image recognition"},{"first-page":"448","article-title":"Batch normalization: accelerating deep network training by reducing internal covariate shift","author":"S. Szegedy C Ioffe","key":"12"},{"issue":"1","key":"13","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"N. Srivastava","year":"2014","journal-title":"Journal of Machine Learning Research"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/P17-3017","article-title":"Generating steganographic text with LSTMs","author":"T. Fang","year":"2017"},{"article-title":"Sentiment classification using distant supervision","year":"2009","author":"A. Go","key":"15"},{"author":"A. L. Maas","key":"16","article-title":"Learning word vectors for sentiment analysis"},{"author":"P. Diederik","key":"17","article-title":"Kingma and jimmy lei Ba. Adam: amethod for stochastic optimization"},{"first-page":"540","article-title":"Linguistic steganography detection algorithm using statistical language model","author":"P. Meng","key":"18"},{"first-page":"264","article-title":"A real time text steganalysis by using statistical method","author":"S. Samanta","key":"19"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.11591\/eecsi.v2i1.772"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2019.2902095"},{"issue":"1","key":"22","article-title":"TS-RNN: text steganalysis based on recurrent neural networks","volume":"99","author":"Z. Yang","year":"2019","journal-title":"IEEE Signal Processing Letters"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2021\/6668369.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2021\/6668369.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2021\/6668369.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T21:36:26Z","timestamp":1618868186000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/jece\/2021\/6668369\/"}},"subtitle":[],"editor":[{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,4,17]]},"references-count":22,"alternative-id":["6668369","6668369"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6668369","relation":{},"ISSN":["2090-0155","2090-0147"],"issn-type":[{"type":"electronic","value":"2090-0155"},{"type":"print","value":"2090-0147"}],"subject":[],"published":{"date-parts":[[2021,4,17]]}}}