{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:56:04Z","timestamp":1763344564857,"version":"3.45.0"},"reference-count":47,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065804","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T03:15:10Z","timestamp":1749438910000},"page":"2375-2389","source":"Crossref","is-referenced-by-count":0,"title":["Linguistic Steganography Based on Sentence Attribute Encoding"],"prefix":"10.32604","volume":"84","author":[{"given":"Lingyun","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Xu","family":"He","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chengfu","family":"Ou","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Advances in cryptology","first-page":"51","article-title":"The prisoners\u2019 problem and the subliminal channel","volume":"1984","author":"Simmons"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"18115","DOI":"10.1109\/JIOT.2025.3540097","article-title":"A parallel color image encryption algorithm based on a 2D logistic-rulkov neuron map","volume":"12","author":"Gao","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1016\/j.apm.2024.06.016","article-title":"Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks","volume":"134","author":"Gao","year":"2024","journal-title":"Appl Math Model"},{"key":"ref4","series-title":"ICASSP 2024\u20132024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"4560","article-title":"Controllable semantic linguistic steganography via summarization generation","author":"Zhang","year":"2024 Apr 14\u201319"},{"key":"ref5","first-page":"1375","article-title":"GAN-GLS: generative lyric steganography based on generative adversarial networks","volume":"69","author":"Wang","year":"2021","journal-title":"Comput Mater Contin"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1504\/IJAACS.2023.134095","article-title":"A survey on neural network-based image data hiding for secure communication","volume":"16","author":"Wu","year":"2023","journal-title":"Int J Auton Adapt Commun Syst"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1504\/IJAACS.2025.144265","article-title":"Reversible data hiding in encrypted images based on histogram shifting and prediction error block coding","volume":"18","author":"Chen","year":"2025","journal-title":"Int J Auton Adapt Commun Syst"},{"key":"ref8","first-page":"101756","article-title":"Robust data hiding method based on frequency coefficient variance in repetitive compression","volume":"56","author":"Solak","year":"2024","journal-title":"Eng Sci Technol Int J"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"6559","DOI":"10.1109\/TIFS.2024.3417268","article-title":"Efficient audio steganography using generalized audio intrinsic energy with micro-amplitude modification suppression","volume":"19","author":"Su","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref10","first-page":"4893","article-title":"Cover enhancement method for audio steganography based on universal adversarial perturbations with sample diversification","volume":"75","author":"Li","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref11","series-title":"Proceedings of the 32nd ACM International Conference on Multimedia. MM \u201924","first-page":"2757","article-title":"From covert hiding to visual editing: robust generative video steganography","author":"Mao","year":"2024 Oct 28\u2013Nov 1"},{"key":"ref12","first-page":"1571","article-title":"Coverless video steganography based on frame sequence perceptual distance mapping","volume":"73","author":"Li","year":"2022","journal-title":"Comput Mater Contin"},{"key":"ref13","series-title":"Proceedings of the 32nd ACM International Conference on Multimedia","first-page":"10345","article-title":"Generative text steganography with large language model","author":"Wu","year":"2024 Oct 28\u2013Nov 1"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2829","DOI":"10.3390\/math9212829","article-title":"A review on text steganography techniques","volume":"9","author":"Majeed","year":"2021","journal-title":"Mathematics"},{"key":"ref15","series-title":"Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing","first-page":"1194","article-title":"Practical linguistic steganography using contextual synonym substitution and vertex colour coding","author":"Chang","year":"2010 Oct 9\u201311"},{"key":"ref16","series-title":"2014 11th International ISC Conference on Information Security and Cryptology","first-page":"155","article-title":"A new linguistic steganography scheme based on lexical substitution","author":"Yajam","year":"2014 Sep 3\u20134"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.sigpro.2019.06.014","article-title":"Generating steganographic image description by dynamic synonym substitution","volume":"164","author":"Li","year":"2019","journal-title":"Signal Processing"},{"key":"ref18","series-title":"Proceedings of the 4th ACM International Workshop on Contents Protection and Security. MCPS\u201906","first-page":"37","article-title":"Words are not enough: sentence level natural language watermarking","author":"Topkara","year":"2006 Oct 28"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.csl.2008.04.001","article-title":"Natural language watermarking via morphosyntactic alterations","volume":"23","author":"Meral","year":"2009","journal-title":"Comput Speech Lang"},{"key":"ref20","first-page":"351","author":"Murphy","year":"2007","journal-title":"Security, steganography, and watermarking of multimedia contents IX"},{"key":"ref21","series-title":"Human Language Technologies: the 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, HLT \u201910","first-page":"591","article-title":"Linguistic steganography using automatically generated paraphrases","author":"Chang","year":"2010"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-074","article-title":"Avoiding detection on twitter: embedding strategies for linguistic steganography","volume":"28","author":"Wilson","year":"2016","journal-title":"Electron Imaging"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TIFS.2018.2871746","article-title":"RNN-stega: linguistic steganography based on recurrent neural networks","volume":"14","author":"Yang","year":"2018","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"ref24","series-title":"Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP)","first-page":"1210","article-title":"Neural linguistic steganography","author":"Ziegler","year":"2019 Nov 3\u20137"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1109\/TIFS.2020.3023279","article-title":"VAE-stega: linguistic steganography based on variational auto-encoder","volume":"16","author":"Yang","year":"2020","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2982","DOI":"10.1109\/TDSC.2021.3079957","article-title":"Linguistic steganography based on adaptive probability distribution","volume":"19","author":"Zhou","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1109\/LSP.2023.3272798","article-title":"PNG-stega: progressive non-autoregressive generative linguistic steganography","volume":"30","author":"Wang","year":"2023","journal-title":"IEEE Signal Process Lett"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1109\/LSP.2021.3058889","article-title":"Linguistic generative steganography with enhanced cognitive-imperceptibility","volume":"28","author":"Yang","year":"2021","journal-title":"IEEE Signal Process Lett"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2610","DOI":"10.1109\/LSP.2024.3456636","article-title":"A semantic controllable long text steganography framework based on LLM prompt engineering and knowledge graph","volume":"31","author":"Li","year":"2024","journal-title":"IEEE Signal Process Lett"},{"key":"ref30","series-title":"ICASSP 2025\u20132025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"1","article-title":"SCF-stega: controllable linguistic steganography based on semantic communications framework","author":"Long","year":"2025 Apr 6\u201311"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/978-3-540-27779-8_27","author":"Bolshakov","year":"2004","journal-title":"Natural language processing and information systems"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1587\/transinf.2016EDP7358","article-title":"A novel linguistic steganography based on synonym run-length encoding","volume":"100","author":"Xiang","year":"2017","journal-title":"IEICE Trans Inf Syst"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"28969","DOI":"10.1007\/s11042-018-6072-8","article-title":"A linguistic steganography based on word indexing compression and candidate selection","volume":"77","author":"Xiang","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.jksuci.2017.08.004","article-title":"A modified approach to data hiding in Microsoft Word documents by change-tracking technique","volume":"32","author":"Mahato","year":"2020","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref35","series-title":"Proceedings of COLING 2012","first-page":"511","article-title":"The secret\u2019s in the word order: Text-to-text generation for linguistic steganography","author":"Chang","year":"2012 Dec 8\u201315"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"95","DOI":"10.5755\/j01.eee.18.9.2817","article-title":"A hybrid natural language information hiding system","volume":"18","author":"He","year":"2012","journal-title":"Elektron Elektrotech"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1002\/sec.336","article-title":"Adaptive-capacity and robust natural language watermarking for agglutinative languages","volume":"5","author":"Kim","year":"2012","journal-title":"Secur Commun Netw"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1145\/1141277.1141358","author":"Stutsman","year":"2006","journal-title":"SAC \u201906: Proceedings of the 2006 ACM Symposium on Applied Computing"},{"key":"ref39","series-title":"Information Hiding: 13th International Conference","first-page":"329","article-title":"LinL: Lost in n-best list","author":"Meng","year":"2011"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/TDSC.2023.3247493","article-title":"Semantic-preserving linguistic steganography by pivot translation and semantic-aware bins coding","volume":"21","author":"Yang","year":"2023","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref41","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"1026","article-title":"Delving deep into rectifiers: surpassing human-level performance on imagenet classification","author":"He","year":"2015 Dec 7\u201313"},{"unstructured":"Chen X, Fang H, Lin TY, Vedantam R, Gupta S, Doll\u00e1r P, et al. Microsoft coco captions: data collection and evaluation server. arXiv:1504.00325. 2015.","key":"ref42"},{"unstructured":"Mikolov T, Chen K, Corrado G, Dean J. Efficient estimation of word representations in vector space. arXiv:1301.3781. 2013.","key":"ref43"},{"key":"ref44","series-title":"Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics","first-page":"311","article-title":"BLEU: a method for automatic evaluation of machine translation","author":"Papineni","year":"2002 Jul 7\u201312"},{"key":"ref45","series-title":"8th International Conference on Learning Representations, ICLR 2020","first-page":"1","article-title":"BERTScore: evaluating text generation with BERT","author":"Zhang","year":"2020 Apr 26\u201330"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"1743","DOI":"10.1109\/LSP.2019.2920452","article-title":"TS-RNN: text steganalysis based on recurrent neural networks","volume":"26","author":"Yang","year":"2019","journal-title":"IEEE Signal Process Lett"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/LSP.2019.2895286","article-title":"Convolutional neural network based text steganalysis","volume":"26","author":"Wen","year":"2019","journal-title":"IEEE Signal Process Lett"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_65804\/TSP_CMC_65804.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:52:30Z","timestamp":1763344350000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":47,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065804","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}