A Text Steganography Method Based on Generative Adversarial Networks

A network and text technology, applied in the Internet field, can solve problems affecting the accuracy and fluency of text grammar, and achieve high-quality results

Active Publication Date: 2021-04-23
BEIJING TECHNOLOGY AND BUSINESS UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although traditional text steganography algorithms have achieved a lot, they are all based on limited modifications to the text carrier. Large-scale synonym replacement, punctuation swap, replacement and modification of typesetting structure, etc. will affect the accuracy and fluency of text grammar. Therefore, it is particularly important to solve such problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Text Steganography Method Based on Generative Adversarial Networks
  • A Text Steganography Method Based on Generative Adversarial Networks
  • A Text Steganography Method Based on Generative Adversarial Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to deepen the understanding of the present invention, the present invention will be further described below in conjunction with the examples, which are only used to explain the present invention, and do not constitute a limitation to the protection scope of the present invention.

[0030] This embodiment discloses a text steganography method based on generating an adversarial network, which is characterized in that it includes:

[0031] Text generation model based on Generative Adversarial Network (hereinafter referred to as GAN): Generative Adversarial Network consists of two parts, the first part is the raw network, the second part is the discriminant network, let the raw network and the discriminant network compete with each other, and generate false The confrontation network uses the discriminator to judge the authenticity of the data, and finally uses the data generated by the generation network to deceive the discriminator with the false ones;

[0032] Op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a text steganography method based on a generative confrontation network. The model regards text steganography as a text sequence generation process, and effectively steganographically secrets text in the generated text through a key mapping table, while ensuring In order to generate high-quality text, the policy gradient optimization generator is used in the adversarial training, and finally the generative model can generate high-quality steganographic text. Compared with traditional training methods, the adversarial learning process can make the model better simulate Combine the distribution of the entire corpus to generate more reasonable phrase collocations and long texts.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a text steganography method based on generating an adversarial network. Background technique [0002] Steganography is a technology that hides secret information in a public carrier to achieve covert communication. According to different types of carrier data, steganography can be divided into text steganography, image steganography, audio steganography and video steganography. Text steganography requires loading hidden information in text data and maintaining good readability without being easily detected. Compared with multimedia carriers such as images, audio and video with a lot of redundant information, text steganography realizes It's more difficult to get up. There are many ways to achieve text steganography, such as changing the existing format of the text, replacing text synonyms, generating random character sequences and generating readable text with a specific g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L12/24G06N3/08G06N3/04
CPCG06N3/049G06N3/08H04L9/0861H04L41/145
Inventor 段大高赵振东韩忠明崔岩松
Owner BEIJING TECHNOLOGY AND BUSINESS UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products