Text steganography method based on generative adversarial network

A network and text technology, applied in the Internet field, can solve problems affecting the accuracy and fluency of text grammar, and achieve high-quality results

Active Publication Date: 2018-11-30
BEIJING TECHNOLOGY AND BUSINESS UNIVERSITY
View PDF3 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although traditional text steganography algorithms have achieved a lot, they are all based on limited modifications to the text carrier. Large-scale synonym replacement, punctuation swap, replacement and modification of typesetting structure, etc. will affect the accuracy and fluency of text grammar. Therefore, it is particularly important to solve such problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Text steganography method based on generative adversarial network
  • Text steganography method based on generative adversarial network
  • Text steganography method based on generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to deepen the understanding of the present invention, the present invention will be further described below in conjunction with the examples, which are only used to explain the present invention, and do not constitute a limitation to the protection scope of the present invention.

[0030] This embodiment discloses a text steganography method based on generating an adversarial network, which is characterized in that it includes:

[0031] Text generation model based on Generative Adversarial Network (hereinafter referred to as GAN): Generative Adversarial Network consists of two parts, the first part is the raw network, the second part is the discriminant network, let the raw network and the discriminant network compete with each other, and generate false The confrontation network uses the discriminator to judge the authenticity of the data, and finally uses the data generated by the generation network to deceive the discriminator with the false ones;

[0032] Op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a text steganography method based on a generative adversarial network. A model regards text steganography as a text sequence generation process, a secret text is effectively steganographed into a generated text through a key mapping table, and meanwhile it is guaranteed that the generated text has the high quality; and a policy gradient optimization generator is used in adversarial training, and finally the generation model can generate a high-quality steganographic text. Compared with a traditional training method, the adversarial learning process can enable the modelto better fit distribution of an overall corpus to generate the more reasonable phrase collocation and long text.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a text steganography method based on generating an adversarial network. Background technique [0002] Steganography is a technology that hides secret information in a public carrier to achieve covert communication. According to different types of carrier data, steganography can be divided into text steganography, image steganography, audio steganography and video steganography. Text steganography requires loading hidden information in text data and maintaining good readability without being easily detected. Compared with multimedia carriers such as images, audio and video with a lot of redundant information, text steganography realizes It's more difficult to get up. There are many ways to achieve text steganography, such as changing the existing format of the text, replacing text synonyms, generating random character sequences and generating readable text with a specific g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/24G06N3/08G06N3/04
CPCG06N3/049G06N3/08H04L9/0861H04L41/145
Inventor 段大高赵振东韩忠明崔岩松
Owner BEIJING TECHNOLOGY AND BUSINESS UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products