{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T01:46:27Z","timestamp":1726191987483},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031268755"},{"type":"electronic","value":"9783031268762"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-26876-2_61","type":"book-chapter","created":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T08:03:29Z","timestamp":1679385809000},"page":"651-660","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Comprehensive Review on Deep Learning-Based Generative Linguistic Steganography"],"prefix":"10.1007","author":[{"given":"Israa Lotfy","family":"Badawy","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Nagaty","sequence":"additional","affiliation":[]},{"given":"Abeer","family":"Hamdy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,22]]},"reference":[{"key":"61_CR1","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TIFS.2020.3023279","volume":"16","author":"Z-L Yang","year":"2021","unstructured":"Yang, Z.-L., Zhang, S.-Y., Hu, Y.-T., Hu, Z.-W., Huang, Y.-F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880\u2013895 (2021). https:\/\/doi.org\/10.1109\/TIFS.2020.3023279","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Zhou, X., Peng, W., Yang, B., Wen, J., Xue, Y., Zhong, P.: Linguistic steganography based on adaptive probability distribution.\u00a0IEEE Trans. Dependable Secure Comput. 19, 2982\u20132997 (2021)","key":"61_CR2","DOI":"10.1109\/TDSC.2021.3079957"},{"issue":"1","key":"61_CR3","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1007\/s11042-020-09667-y","volume":"80","author":"N Alanazi","year":"2020","unstructured":"Alanazi, N., Khan, E., Gutub, A.: Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimedia Tools Appl. 80(1), 1403\u20131431 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09667-y","journal-title":"Multimedia Tools Appl."},{"issue":"9","key":"61_CR4","doi-asserted-by":"publisher","first-page":"1558","DOI":"10.3390\/math8091558","volume":"8","author":"L Xiang","year":"2020","unstructured":"Xiang, L., Yang, S., Liu, Y., Li, Q., Zhu, C.: Novel Linguistic steganography based on character-level text generation. Mathematics 8(9), 1558 (2020). https:\/\/doi.org\/10.3390\/math8091558","journal-title":"Mathematics"},{"doi-asserted-by":"crossref","unstructured":"Kang, H., Wu, H., Zhang, X.: Generative text steganography based on LSTM network and attention mechanism with keywords.\u00a0Electron. Imaging 2020(4), 291-1\u2013291-8 (2020)","key":"61_CR5","DOI":"10.2352\/ISSN.2470-1173.2020.4.MWSF-291"},{"issue":"2","key":"61_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3418598","volume":"2","author":"Y Li","year":"2021","unstructured":"Li, Y., Zhang, J., Yang, Z., Zhang, R.: Topic-aware neural linguistic steganography based on knowledge graphs. ACM\/IMS Trans. Data Sci. 2(2), 1\u201313 (2021)","journal-title":"ACM\/IMS Trans. Data Sci."},{"doi-asserted-by":"crossref","unstructured":"Samanta, S., Dutta, S., Sanyal, G.: A real time text steganalysis by using statistical method.\u00a0In: Proceedings IEEE International Conference on Engineering and Emerging Technologies (ICETECH), pp. 264\u2013268 (2016)","key":"61_CR7","DOI":"10.1109\/ICETECH.2016.7569256"},{"doi-asserted-by":"crossref","unstructured":"Ziegler, Z.M., Deng, Y., Rush, A.M.: Neural linguistic steganography. arXiv:1909.01496 (2019). http:\/\/arxiv.org\/abs\/1909.01496","key":"61_CR8","DOI":"10.18653\/v1\/D19-1115"},{"key":"61_CR9","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/LSP.2021.3058889","volume":"28","author":"Z Yang","year":"2021","unstructured":"Yang, Z., Xiang, L., Zhang, S., Sun, X., Huang, Y.: Linguistic generative steganography with enhanced cognitive-imperceptibility. IEEE Signal Process. Lett. 28, 409\u2013413 (2021). https:\/\/doi.org\/10.1109\/LSP.2021.3058889","journal-title":"IEEE Signal Process. Lett."},{"issue":"5","key":"61_CR10","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2018.2871746","volume":"14","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Guo, X., Chen, Z., Huang, Y., Zhang, Y.: RNN-Stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280\u20131295 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"61_CR11","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1080\/17517575.2020.1720827","volume":"15","author":"F Li","year":"2020","unstructured":"Li, F., Tang, H., Zou, Y., Huang, Y., Feng, Y., Peng, L.: Research on information security in text emotional steganography based on machine learning. Enterp. Inf. Syst. 15(7), 984\u20131001 (2020)","journal-title":"Enterp. Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Shen, J., Ji, H., Han, J.: Near-imperceptible neural linguistic steganography via self-adjusting arithmetic coding.\u00a0In: EMNLP (2020)","key":"61_CR12","DOI":"10.18653\/v1\/2020.emnlp-main.22"},{"key":"61_CR13","doi-asserted-by":"publisher","first-page":"120869","DOI":"10.1109\/ACCESS.2021.3108183","volume":"9","author":"R Gurunath","year":"2021","unstructured":"Gurunath, R., Alahmadi, A., Samanta, D., Khan, M., Alahmadi, A.: A novel approach for linguistic steganography evaluation based on artificial neural networks. IEEE Access 9, 120869\u2013120879 (2021)","journal-title":"IEEE Access"},{"unstructured":"Yang, Z., Jin, S., Huang, Y., Zhang, Y., Li, H.: Automatically generate steganographic text based on Markov model and Huffman coding, November 2018. arXiv:1811.04720. http:\/\/arxiv.org\/abs\/1811.04720","key":"61_CR14"},{"doi-asserted-by":"crossref","unstructured":"Meng, P., Hang, L., Yang, W., Chen, Z., Zheng, H.: Linguistic steganography detection algorithm using statistical language model.\u00a0Proc. Int. Conf. Inf. Technol. Comput. Sci., 540\u2013543 (2009)","key":"61_CR15","DOI":"10.1109\/ITCS.2009.246"},{"doi-asserted-by":"crossref","unstructured":"Chen, Z., et al.: Linguistic steganography detection using statistical characteristics of correlations between words.\u00a0In: Proceedings International Workshop on Information Hiding, pp. 224\u2013235 (2008)","key":"61_CR16","DOI":"10.1007\/978-3-540-88961-8_16"},{"issue":"4","key":"61_CR17","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/LSP.2019.2902095","volume":"26","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Huang, Y., Zhang, Y.-J.: A fast and efficient text steganalysis method. IEEE Signal Process. Lett. 26(4), 627\u2013631 (2019)","journal-title":"IEEE Signal Process. Lett."},{"doi-asserted-by":"crossref","unstructured":"Din, R., et al.: Performance analysis on text steganalysis method using a computational intelligence approach.\u00a0In: Proceedings International Conference of Electrical Engineering, Computer Science and Informatics (EECSI), pp. 19\u201320 (2015)","key":"61_CR18","DOI":"10.11591\/eecsi.v2.772"},{"issue":"3","key":"61_CR19","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/LSP.2019.2895286","volume":"26","author":"J Wen","year":"2019","unstructured":"Wen, J., Zhou, X., Zhong, P., Xue, Y.: Convolutional neural network based text steganalysis. IEEE Signal Process. Lett. 26(3), 460\u2013464 (2019)","journal-title":"IEEE Signal Process. Lett."},{"issue":"12","key":"61_CR20","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1109\/LSP.2019.2953953","volume":"26","author":"Y Niu","year":"2019","unstructured":"Niu, Y., Wen, J., Zhong, P., Xue, Y.: A hybrid R-BILSTM-C neural network based text steganalysis. IEEE Signal Proc. Lett. 26(12), 1907\u20131911 (2019)","journal-title":"IEEE Signal Proc. Lett."},{"issue":"12","key":"61_CR21","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/LSP.2019.2920452","volume":"26","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Wang, K., Li, J., Huang, Y.: TS-RNN: text steganalysis based on recurrent neural networks. IEEE Signal Proc. Lett. 26(12), 1743\u20131747 (2019)","journal-title":"IEEE Signal Proc. Lett."},{"issue":"15","key":"61_CR22","doi-asserted-by":"publisher","first-page":"6851","DOI":"10.3390\/app11156851","volume":"11","author":"R Thabit","year":"2021","unstructured":"Thabit, R., Udzir, N., Yasin, S., Asmawi, A., Roslan, N., Din, R.: A comparative analysis of Arabic text steganography. Appl. Sci. 11(15), 6851 (2021)","journal-title":"Appl. Sci."},{"issue":"3","key":"61_CR23","doi-asserted-by":"publisher","first-page":"986","DOI":"10.3837\/tiis.2022.03.013","volume":"16","author":"L Xiang","year":"2022","unstructured":"Xiang, L., Wang, R., Yang, Z., Liu, Y.: Generative linguistic steganography: a comprehensive review. KSII Trans. Internet Inf. Syst. 16(3), 986\u20131005 (2022). https:\/\/doi.org\/10.3837\/tiis.2022.03.013","journal-title":"KSII Trans. Internet Inf. Syst."}],"container-title":["Lecture Notes in Networks and Systems","Learning in the Age of Digital and Green Transition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-26876-2_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T08:20:46Z","timestamp":1679386846000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-26876-2_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031268755","9783031268762"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-26876-2_61","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Interactive Collaborative Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icl2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icl-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}