Skip to main content

A Comprehensive Review on Deep Learning-Based Generative Linguistic Steganography

  • Conference paper
  • First Online:
Learning in the Age of Digital and Green Transition (ICL 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 633))

Included in the following conference series:

Abstract

The recent development of deep learning has made a significant breakthrough in linguistic generative steganography. The text has become one of the most intensely used communication carriers on the Internet, making steganography an efficient carrier for concealing secret messages. Text steganography has long been used to protect the privacy and confidentiality of data via public transmission. Steganography utilizes a carrier to embed the data to generate a secret unnoticed and less attractive message. Different techniques have been used to improve the security of the generated text and quality of the steganographic text, such as the Markov model, Recurrent Neural Network (RNN), Long short-term memory (LSTM), Transformers, Knowledge Graph, and Variational autoencoder (VAE). Those techniques enhance the steganographic text’s language model and conditional probability distribution. This paper provides a comparative analysis to review the key contributions of generative linguistic steganographic deep learning-based methods through different perspectives such as text generation, encoding algorithm, and evaluation criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang, Z.-L., Zhang, S.-Y., Hu, Y.-T., Hu, Z.-W., Huang, Y.-F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880–895 (2021). https://doi.org/10.1109/TIFS.2020.3023279

    Article  Google Scholar 

  2. Zhou, X., Peng, W., Yang, B., Wen, J., Xue, Y., Zhong, P.: Linguistic steganography based on adaptive probability distribution. IEEE Trans. Dependable Secure Comput. 19, 2982–2997 (2021)

    Google Scholar 

  3. Alanazi, N., Khan, E., Gutub, A.: Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimedia Tools Appl. 80(1), 1403–1431 (2020). https://doi.org/10.1007/s11042-020-09667-y

    Article  Google Scholar 

  4. Xiang, L., Yang, S., Liu, Y., Li, Q., Zhu, C.: Novel Linguistic steganography based on character-level text generation. Mathematics 8(9), 1558 (2020). https://doi.org/10.3390/math8091558

    Article  Google Scholar 

  5. Kang, H., Wu, H., Zhang, X.: Generative text steganography based on LSTM network and attention mechanism with keywords. Electron. Imaging 2020(4), 291-1–291-8 (2020)

    Google Scholar 

  6. Li, Y., Zhang, J., Yang, Z., Zhang, R.: Topic-aware neural linguistic steganography based on knowledge graphs. ACM/IMS Trans. Data Sci. 2(2), 1–13 (2021)

    Article  Google Scholar 

  7. Samanta, S., Dutta, S., Sanyal, G.: A real time text steganalysis by using statistical method. In: Proceedings IEEE International Conference on Engineering and Emerging Technologies (ICETECH), pp. 264–268 (2016)

    Google Scholar 

  8. Ziegler, Z.M., Deng, Y., Rush, A.M.: Neural linguistic steganography. arXiv:1909.01496 (2019). http://arxiv.org/abs/1909.01496

  9. Yang, Z., Xiang, L., Zhang, S., Sun, X., Huang, Y.: Linguistic generative steganography with enhanced cognitive-imperceptibility. IEEE Signal Process. Lett. 28, 409–413 (2021). https://doi.org/10.1109/LSP.2021.3058889

    Article  Google Scholar 

  10. Yang, Z., Guo, X., Chen, Z., Huang, Y., Zhang, Y.: RNN-Stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2019)

    Article  Google Scholar 

  11. Li, F., Tang, H., Zou, Y., Huang, Y., Feng, Y., Peng, L.: Research on information security in text emotional steganography based on machine learning. Enterp. Inf. Syst. 15(7), 984–1001 (2020)

    Article  Google Scholar 

  12. Shen, J., Ji, H., Han, J.: Near-imperceptible neural linguistic steganography via self-adjusting arithmetic coding. In: EMNLP (2020)

    Google Scholar 

  13. Gurunath, R., Alahmadi, A., Samanta, D., Khan, M., Alahmadi, A.: A novel approach for linguistic steganography evaluation based on artificial neural networks. IEEE Access 9, 120869–120879 (2021)

    Article  Google Scholar 

  14. Yang, Z., Jin, S., Huang, Y., Zhang, Y., Li, H.: Automatically generate steganographic text based on Markov model and Huffman coding, November 2018. arXiv:1811.04720. http://arxiv.org/abs/1811.04720

  15. Meng, P., Hang, L., Yang, W., Chen, Z., Zheng, H.: Linguistic steganography detection algorithm using statistical language model. Proc. Int. Conf. Inf. Technol. Comput. Sci., 540–543 (2009)

    Google Scholar 

  16. Chen, Z., et al.: Linguistic steganography detection using statistical characteristics of correlations between words. In: Proceedings International Workshop on Information Hiding, pp. 224–235 (2008)

    Google Scholar 

  17. Yang, Z., Huang, Y., Zhang, Y.-J.: A fast and efficient text steganalysis method. IEEE Signal Process. Lett. 26(4), 627–631 (2019)

    Article  Google Scholar 

  18. Din, R., et al.: Performance analysis on text steganalysis method using a computational intelligence approach. In: Proceedings International Conference of Electrical Engineering, Computer Science and Informatics (EECSI), pp. 19–20 (2015)

    Google Scholar 

  19. Wen, J., Zhou, X., Zhong, P., Xue, Y.: Convolutional neural network based text steganalysis. IEEE Signal Process. Lett. 26(3), 460–464 (2019)

    Article  Google Scholar 

  20. Niu, Y., Wen, J., Zhong, P., Xue, Y.: A hybrid R-BILSTM-C neural network based text steganalysis. IEEE Signal Proc. Lett. 26(12), 1907–1911 (2019)

    Article  Google Scholar 

  21. Yang, Z., Wang, K., Li, J., Huang, Y.: TS-RNN: text steganalysis based on recurrent neural networks. IEEE Signal Proc. Lett. 26(12), 1743–1747 (2019)

    Article  Google Scholar 

  22. Thabit, R., Udzir, N., Yasin, S., Asmawi, A., Roslan, N., Din, R.: A comparative analysis of Arabic text steganography. Appl. Sci. 11(15), 6851 (2021)

    Article  Google Scholar 

  23. Xiang, L., Wang, R., Yang, Z., Liu, Y.: Generative linguistic steganography: a comprehensive review. KSII Trans. Internet Inf. Syst. 16(3), 986–1005 (2022). https://doi.org/10.3837/tiis.2022.03.013

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Israa Lotfy Badawy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Badawy, I.L., Nagaty, K., Hamdy, A. (2023). A Comprehensive Review on Deep Learning-Based Generative Linguistic Steganography. In: Auer, M.E., Pachatz, W., Rüütmann, T. (eds) Learning in the Age of Digital and Green Transition. ICL 2022. Lecture Notes in Networks and Systems, vol 633. Springer, Cham. https://doi.org/10.1007/978-3-031-26876-2_61

Download citation

Publish with us

Policies and ethics