{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:42:07Z","timestamp":1760060527420,"version":"build-2065373602"},"reference-count":57,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002949","name":"2024 Jiangsu Province Frontier Technology R&amp;D Project \u201cResearch on Cross-Domain Multi-Dimensional Security Technology of Intelligent Systems for AI Computing Networks\u201d","doi-asserted-by":"publisher","award":["BF2024071"],"award-info":[{"award-number":["BF2024071"]}],"id":[{"id":"10.13039\/501100002949","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Generative steganographic text covertly transmits hidden information through readable text that is unrelated to the message. Existing AI-based linguistic steganography primarily focuses on improving text quality to evade detection and therefore only addresses passive attacks. Active attacks, such as text tampering, can disrupt the symmetry between encoding and decoding, which in turn prevents accurate extraction of hidden information. To investigate these threats, we construct two attack models: the in-domain synonym substitution attack (ISSA) and the out-of-domain random tampering attack (ODRTA), with ODRTA further divided into continuous (CODRTA) and discontinuous (DODRTA) types. To enhance robustness, we propose a proactive adaptive-clustering defense against ISSA, and, for CODRTA and DODRTA, a post-hoc repair mechanism based on context-oriented search and the determinism of text generation. Experimental results demonstrate that these mechanisms effectively counter all attack types and significantly improve the integrity and usability of hidden information. The main limitation of our approach is the relatively high computational cost of defending against ISSA. Future work will focus on improving efficiency and expanding practical applicability.<\/jats:p>","DOI":"10.3390\/sym17091416","type":"journal-article","created":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T08:28:15Z","timestamp":1756715295000},"page":"1416","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Making Two Models Based on the Generative Linguistic Steganography for Securing Linguistic Steganographic Texts from Active Attacks"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5862-1671","authenticated-orcid":false,"given":"Yingquan","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0998-1517","authenticated-orcid":false,"given":"Qianmu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China"},{"name":"School of Cybersecurity, Tarim University, Alar City 843300, China"}]},{"given":"Xiaocong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Wuxi 214443, China"}]},{"given":"Zijian","family":"Ying","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Wuxi 214443, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cachin, C. (1998, January 14\u201317). An information-theoretic model for steganography. Proceedings of the International Workshop on Information Hiding, Portland, OR, USA.","DOI":"10.1007\/3-540-49380-8_21"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1109\/TIFS.2020.3023279","article-title":"Vae-stega: Linguistic steganography based on variational auto-encoder","volume":"16","author":"Yang","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"022077","DOI":"10.1088\/1742-6596\/1237\/2\/022077","article-title":"Research on coverless text steganography based on single bit rules","volume":"1237","author":"Wu","year":"2019","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_4","first-page":"4568","article-title":"Text steganography based on ci-poetry generation using markov chain model","volume":"10","author":"Luo","year":"2016","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Luo, Y., and Huang, Y. (2017, January 20\u201322). Text steganography with high embedding rate: Using recurrent neural networks to generate chinese classic poetry. Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, USA.","DOI":"10.1145\/3082031.3083240"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"5451","DOI":"10.3934\/mbe.2019271","article-title":"Text steganography on rnn-generated lyrics","volume":"16","author":"Tong","year":"2019","journal-title":"Math. Biosci. Eng."},{"key":"ref_7","unstructured":"Kingma, D.P., and Welling, M. (2013). Auto-encoding variational bayes. arXiv."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","article-title":"Generative adversarial networks: An overview","volume":"35","author":"Creswell","year":"2018","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_9","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., and Polosukhin, I. (2017, January 4\u20139). Attention is all you need. Proceedings of the International Conference on Neural Information Processing Systems, Long Beach, CA, USA."},{"key":"ref_10","unstructured":"Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K. (2019, January 2\u20137). Bert: Pre-training of deep bidirectional transformers for language understanding. Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Minneapolis, MN, USA."},{"key":"ref_11","unstructured":"Radford, A., Narasimhan, K., Salimans, T., and Sutskever, I. (OpenAI, 2018). Improving language understanding by generative pre-training, OpenAI, preprint."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ziegler, Z.M., Deng, Y., and Rush, A.M. (2019). Neural linguistic steganography. arXiv.","DOI":"10.18653\/v1\/D19-1115"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TIFS.2018.2871746","article-title":"Rnn-stega: Linguistic steganography based on recurrent neural networks","volume":"14","author":"Yang","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Dai, F.Z., and Cai, Z. (2019). Towards near-imperceptible steganographic text. arXiv.","DOI":"10.18653\/v1\/P19-1422"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Fang, T., Jaggi, M., and Argyraki, K. (2017). Generating steganographic text with lstms. arXiv.","DOI":"10.18653\/v1\/P17-3017"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2982","DOI":"10.1109\/TDSC.2021.3079957","article-title":"Linguistic steganography based on adaptive probability distribution","volume":"19","author":"Zhou","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_17","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2014, January 8\u201313). Generative adversarial nets. Proceedings of the International Conference on Neural Information Processing Systems, Montreal, QC, Canada."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1109\/LSP.2022.3152126","article-title":"Alisa: Acrostic linguistic steganography based on bert and gibbs sampling","volume":"29","author":"Yi","year":"2022","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"4584","DOI":"10.1109\/TCSS.2022.3174013","article-title":"Generative steganography based on long readable text generation","volume":"11","author":"Cao","year":"2022","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1109\/LSP.2023.3302749","article-title":"A secure and disambiguating approach for generative linguistic steganography","volume":"30","author":"Yan","year":"2023","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TASLP.2023.3340601","article-title":"Context-aware linguistic steganography model based on neural machine translation","volume":"32","author":"Ding","year":"2023","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2610","DOI":"10.1109\/LSP.2024.3456636","article-title":"A semantic controllable long text steganography framework based on llm prompt engineering and knowledge graph","volume":"31","author":"Li","year":"2024","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/TDSC.2023.3247493","article-title":"Semantic-preserving linguistic steganography by pivot translation and semantic-aware bins coding","volume":"21","author":"Yang","year":"2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhang, R., Liu, J., and Zhang, R. (2024, January 14\u201319). Controllable semantic linguistic steganography via summarization generation. Proceedings of the ICASSP 2024\u20142024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seoul, Republic of Korea.","DOI":"10.1109\/ICASSP48485.2024.10447545"},{"key":"ref_25","unstructured":"Bai, M., Yang, J., Pang, K., Huang, Y., and Gao, Y. (2024). Semantic steganography: A framework for robust and high-capacity information hiding using large language models. arXiv."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Zhang, S., Yang, Z., Yang, J., and Huang, Y. (2021). Provably secure generative linguistic steganography. arXiv.","DOI":"10.18653\/v1\/2021.findings-acl.268"},{"key":"ref_27","unstructured":"de Witt, C.S., Sokota, S., Kolter, J.Z., Foerster, J., and Strohmeier, M. (2022). Perfectly secure steganography using minimum entropy coupling. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/LSP.2020.3042413","article-title":"Linguistic steganography: From symbolic space to semantic space","volume":"28","author":"Zhang","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Pang, K., Bai, M., Yang, J., Wang, H., Jiang, M., and Huang, Y. (2024, January 14\u201319). Fremax: A simple method towards truly secure generative linguistic steganography. Proceedings of the ICASSP 2024\u20142024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seoul, Republic of Korea.","DOI":"10.1109\/ICASSP48485.2024.10446027"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Ding, J., Chen, K., Wang, Y., Zhao, N., Zhang, W., and Yu, N. (2023, January 21\u201325). Discop: Provably secure steganography in practice based on \u201cdistribution copies\u201d. Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP46215.2023.10179287"},{"key":"ref_31","unstructured":"Wu, J., Wu, Z., Xue, Y., Wen, J., and Peng, W. (November, January 28). Generative text steganography with large language model. Proceedings of the 32nd ACM International Conference on Multimedia, Melbourne, VIC, Australia."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Lin, K., Luo, Y., Zhang, Z., and Luo, P. (2024). Zero-shot generative linguistic steganography. arXiv.","DOI":"10.18653\/v1\/2024.naacl-long.289"},{"key":"ref_33","first-page":"157","article-title":"Topic controlled steganography via graph-to-text generation","volume":"136","author":"Sun","year":"2023","journal-title":"CMES-Comput. Model. Eng. Sci."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Xiang, L., Yang, S., Liu, Y., Li, Q., and Zhu, C. (2020). Novel linguistic steganography based on character-level text generation. Mathematics, 8.","DOI":"10.3390\/math8091558"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"94403","DOI":"10.1109\/ACCESS.2022.3201019","article-title":"Arabic text steganography based on deep learning methods","volume":"10","author":"Adeeb","year":"2022","journal-title":"IEEE Access"},{"key":"ref_36","unstructured":"Von Ahn, L., and Hopper, N.J. (2004, January 2\u20136). Public-key steganography. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Backes, M., and Cachin, C. (2005, January 10\u201312). Public-key steganography with active attacks. Proceedings of the Theory of Cryptography Conference, Cambridge, MA, USA.","DOI":"10.1007\/978-3-540-30576-7_12"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Lu, T., Liu, G., Zhang, R., and Ju, T. (2023, January 18\u201323). Neural linguistic steganography with controllable security. Proceedings of the 2023 International Joint Conference on Neural Networks (IJCNN), Gold Coast, Australia.","DOI":"10.1109\/IJCNN54540.2023.10191218"},{"key":"ref_39","unstructured":"Celikyilmaz, A., Clark, E., and Gao, J. (2020). Evaluation of text generation: A survey. arXiv."},{"key":"ref_40","unstructured":"Becker, J., Wahle, J.P., Gipp, B., and Ruas, T. (2024). Text generation: A systematic literature review of tasks, evaluation, and challenges. arXiv."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1109\/LSP.2019.2902095","article-title":"A fast and efficient text steganalysis method","volume":"26","author":"Yang","year":"2019","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1743","DOI":"10.1109\/LSP.2019.2920452","article-title":"Ts-rnn: Text steganalysis based on recurrent neural networks","volume":"26","author":"Yang","year":"2019","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"3513","DOI":"10.1109\/TASLP.2023.3319975","article-title":"Text steganalysis based on hierarchical supervised learning and dual attention mechanism","volume":"31","author":"Peng","year":"2023","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"ref_44","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Bhattacharjya, A., Zhong, X., Wang, J., and Li, X. (2020). Present Scenarios of IoT Projects with Security Aspects Focused. Digital Twin Technologies and Smart Cities, Springer International Publishing.","DOI":"10.1007\/978-3-030-18732-3_7"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"403","DOI":"10.34768\/amcs-2022-0029","article-title":"A holistic study on the use of blockchain technology in cps and iot architectures maintaining the cia triad in data communication","volume":"32","author":"Bhattacharjya","year":"2022","journal-title":"Int. J. Appl. Math. Comput. Sci."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Bahashwan, A.A., Anbar, M., Abdullah, N., Al-Hadhrami, T., and Hanshi, S.M. (2021). Review on common iot communication technologies for both long-range network (lpwan) and short-range network. Advances on Smart and Soft Computing, Proceedings of the ICACIn 2020, Casablanca, Morocco, 12\u201313 April 2020, Springer.","DOI":"10.1007\/978-981-15-6048-4_30"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Bhattacharjya, A., Zhong, X., Wang, J., and Li, X. (2019). Security Challenges and Concerns of Internet of Things (IoT). Cyber-Physical Systems: Architecture, Security and Application, Springer International Publishing.","DOI":"10.1007\/978-3-319-92564-6_7"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.1109\/TGCN.2021.3085908","article-title":"Towards understanding and enhancing association and long sleep in low-power wifi iot systems","volume":"5","author":"Ramanna","year":"2021","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/MCOM.001.2000815","article-title":"Wifi halow for long-range and low-power internet of things: System on chip development and performance evaluation","volume":"59","author":"Lee","year":"2021","journal-title":"IEEE Commun. Mag."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"020121","DOI":"10.1063\/5.0074188","article-title":"Bluetooth technology on iot using the architecture of piconet and scatternet","volume":"2393","author":"Kalanandhini","year":"2022","journal-title":"AIP Conf. Proc."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Mohamed, K.S. (2022). Bluetooth 5.0 Modem Design for IoT Devices, Springer.","DOI":"10.1007\/978-3-030-88626-4"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Bhattacharjya, A., Kozdr\u00f3j, K., Bazyd\u0142o, G., and Wisniewski, R. (2022). Trusted and secure blockchain-based architecture for internet-of-medical-things. Electronics, 11.","DOI":"10.3390\/electronics11162560"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"8016525","DOI":"10.1155\/2021\/8016525","article-title":"Secure health monitoring communication systems based on iot and cloud computing for medical emergency applications","volume":"2021","author":"Siam","year":"2021","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"100036","DOI":"10.1016\/j.iot.2019.01.003","article-title":"Secure iot communications for smart healthcare monitoring system","volume":"13","author":"Hosni","year":"2021","journal-title":"Internet Things"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"9984635","DOI":"10.1049\/ise2\/9984635","article-title":"Two-stage botnet detection method based on feature selection for industrial internet of things","volume":"2025","author":"Shu","year":"2025","journal-title":"IET Inf. Secur."},{"key":"ref_57","first-page":"67","article-title":"Enterprise digital intelligent remote control system based on industrial internet of things","volume":"7","author":"Wu","year":"2024","journal-title":"World J. Innov. Mod. Technol."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/9\/1416\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:36:53Z","timestamp":1760035013000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/9\/1416"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":57,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["sym17091416"],"URL":"https:\/\/doi.org\/10.3390\/sym17091416","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2025,9,1]]}}}