[1] Shannon C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949, 28(4):656-715.
[2] Low S H, Maxemchuk N F, Brassil J T, et al. Document marking and identification using both line and word shifting[C]//Proceedings of INFOCOM. IEEE, 1995, 2:853-860.
[3] Mahato S, Yadav D K, Khan D A. A novel approach to text steganography using font size of invisible space characters in Microsoft word document[M]. New Delhi:Springer, 2014.
[4] Kumar R, Malik A, Singh S, et al. A space based reversible high capacity text steganography scheme using font type and style[C]//International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016:1090-1094.
[5] Ali A A, Saad A. New text steganography technique by using mixed-case font[J]. International Journal of Computer Applications, 2013, 62(3):6-9.
[6] Khairullah M D. A novel text steganography system using font color of the invisible characters in Microsoft word documents[C]//2009 second international conference on computer and electrical engineering. IEEE, 2009:482-484.
[7] Tang X, Chen M S. Design and implementation of information hiding system based on RGB[C]//20133rd International Conference on Consumer Electronics, Communications and Networks. IEEE, 2013:217-220.
[8] 陈芳, 王冰. 基于文本字体的信息隐藏算法[J]. 计算机技术与发展, 2006, 16(1):20-22. Chen F, Wang B. An algorithm of text information hiding based on font[J]. Computer Technology and Development, 2006, 16(1):20-22. (in Chinese)
[9] 付兵. 基于字符Unicode编码奇偶性的文本信息隐藏算法研究[J]. 福建电脑, 2008, 24(12):66. Fu B. Research on text information hiding algorithms based on Unicode coding parity[J]. Fujian Computer, 2008, 24(12):66. (in Chinese)
[10] 陆绿, 方勇. 基于字符Unicode奇偶性的数字水印设计与实现[J]. 计算机技术与发展, 2010, 20(8):176-179. Lu L, Fang Y. Design and implementation of digital watermark based on character Unicode parity[J]. Computer Technology and Development, 2010, 20(8):176-179. (in Chinese)
[11] 黄国超, 王衍波, 张凯泽. 基于Unicode编码的信息隐藏算法研究与设计[J]. 计算机技术与发展, 2011, 21(10):233-236. Huang G C, Wang Y B, Zhang K Z. Research and design of information hiding algorithm based on encoding of Unicode[J]. Computer Technology and Development, 2011, 21(10):233- 236. (in Chinese)
[12] Liu F, Luo P P, Ma Z J, et al. Security secret information hiding based on hash function and invisible ASCII characters replacement[C]//2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016:1963-1969.
[13] 崔光明, 洪星, 袁翔, 等. 基于不可见字符替换的信息隐藏方法研究[J]. 计算机应用与软件, 2016, 33(4):277-280. Cui G M, Hong X, Yuan X, et al. Research on information hiding based on invisible characters replacement[J]. Computer Applications & Software, 2016, 33(4):277-280. (in Chinese)
[14] 张震宇, 李千目, 戚湧. 基于不可见字符的文本水印设计[J]. 南京理工大学学报(自然科学版), 2017, 41(4):405-411. Zhang Z Y, Li Q M, Qi Y. Text watermarking design based on invisible characters[J]. Journal of Nanjing University of Science and Technology, 2017, 41(4):405-411. (in Chinese)
[15] 赵敏之, 孙星明, 向华政. 基于虚词变换的自然语言信息隐藏算法研究[J]. 计算机工程与应用, 2006, 42(3):158-160. Zhao M Z, Sun X M, Xiang H Z. Research on the Chinese text steganography based on the modification of the empty word[J]. Computer Engineering and Application, 2006, 42(3):158-160. (in Chinese)
[16] 刘玉玲, 孙星明, 辛国江. 基于移位变换的句子层自然语言信息隐藏算法[J]. 控制与决策, 2009, 24(12):1861-1864. Liu Y L, Sun X M, Xin G J. Algorithm of natural language information hiding based on shift conversion in sentence level[J]. Control and Decision, 2009:24(12):1861-1864. (in Chinese)
[17] Wang F, Huang L S, Chen Z L, et al. A novel text steganography by context-based equivalent substitution[C]//2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013). IEEE, 2013:1-6.
[18] Shirali-Shahreza M, Shirali-Shahreza M H. Text steganography in SMS[C]//International Conference on Convergence Information Technology (ICCIT 2007). IEEE, 2007:2260-2265.
[19] Rafat K F. Enhanced text steganography in SMS[C]//20092nd International Conference on Computer, Control and Communication. IEEE, 2009:1-6.
[20] 甘灿. 基于同义词替换的自然语言文本信息隐藏技术研究[D]. 长沙:湖南大学, 2008.
[21] 甘灿, 孙星明, 刘玉玲, 等. 一种改进的基于同义词替换的中文文本信息隐藏方法[J]. 东南大学学报(自然科学版), 2007, 37(增刊1):137-140. Gan C, Sun X M, Liu Y L, et al. Improved steganographic algorithm based on synonymy substitution for Chinese text[J]. Journal of Southeast University (Natural Science Edition), 2007, 37(Suppl.1):137-140. (in Chinese)
[22] 杨潇, 李峰, 向凌云. 基于矩阵编码的同义词替换隐写算法[J]. 小型微型计算机系统, 2015, 36(6):1296-1300. Yang X, Li F, Xiang L Y. Synonym substitution-based steganographic algorithm with matrix coding[J]. Journal of Chinese Mini-Micro Computer Systems, 2015, 36(6):1296-1300. (in Chinese)
[23] Bolshakov I A, Gelbukh A. Synonymous paraphrasing using word net and Internet[C]//International Conference on Application of Natural Language to Information Systems. Heidelberg:Springer, 2004:312-323.
[24] Dai W H, Yu Y, Dai Y H, et al. Text steganography system using Markov chain source model and DES algorithm[J]. Journal of Software, 2010, 5(7):785-792.
[25] Moraldo H H. An Approach for text steganography based on Markov chains[EB/OL].[2014- 09-02]. https://arxiv.org/abs/1409.0915.
[26] Luo Y B, Huang Y F, Li F F, et al. Text steganography based on ci-poetry generation using Markov chain model[J]. KSII Transactions on Internet and Information Systems (TIIS), 2016, 10(9):4568-4584.
[27] Yang Z L, Jin S Y, Huang Y F, et al. Automatically generate steganographic text based on Markov model and Huffman coding[EB/OL].[2018-11-12]. https://arxiv.org/abs/1811.04720.
[28] Fang T, Jaggi M, Argyraki K. Generating steganographic text with LSTMs[EB/OL].[2017- 05-30]. https://arxiv.org/abs/1705.10742.
[29] Yang Z L, Guo X Q, Chen Z M, et al. RNN-Stega:linguistic steganography based on recurrent neural networks[J]. IEEE Transactions on Information Forensics and Security, 2018, 14(5):1280-1295.
[30] Yang Z L, Wei N, Liu Q S, et al. GAN-TStega:text steganography based on generative adversarial networks[C]//International Workshop on Digital Watermarking. Cham:Springer, 2019, 12022 LNCS:18-31.
[31] Kang H X, Wu H Z, Zhang X P. Generative text steganography based on LSTM network and attention mechanism with keywords[J]. Electronic Imaging, 2020(4):2911-2918.
[32] Ziegler Z M, Deng Y, Rush A M. Neural linguistic steganography[EB/OL].[2019-09-03]. https://arxiv.org/abs/1909.01496.
[33] Shen J M, Ji H, Han J W. Near-imperceptible neural linguistic steganography via selfadjusting arithmetic coding[EB/OL].[2020-10-01].https://arxiv.org/abs/2010.00677.
[34] Yang Z L, Zhang S Y, Hu Y T, et al. VAE-Stega:linguistic steganography based on variational auto-encoder[J]. IEEE Transactions on Information Forensics and Security, 2020, 16:880-895.
[35] Yang Z L, Zhang P Y, Jiang M Y, et al. Rits:real-time interactive text steganography based on automatic dialogue model[C]//International Conference on Cloud Computing and Security. Cham:Springer, 2018, 11065:253-264.
[36] 薛一鸣, 周雪婧, 周小诗, 等. 基于图像描述的文本信息隐藏[J]. 北京邮电大学学报, 2018, 41(6):7-13. Xue Y M, Zhou X Q, Zhou X S, et al. Text information hiding based on image caption[J]. Journal of Beijing University of Posts and Telecommunications, 2018, 41(6):7-13. (in Chinese)
[37] Guo Y Y, Wu H Z, Zhang X P. Steganographic visual story with mutual-perceived joint attention[J]. EURASIP Journal on Image and Video Processing, 2021(1):1-14.
[38] Li L J, Huang L S, Zhao X X, et al. A statistical attack on a kind of word-shift textsteganography[C]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, 2008:1503-1507.
[39] Xiang L Y, Sun X M, Luo G, et al. Research on steganalysis for text steganography based on font format[C]//Third International Symposium on Information Assurance and Security. IEEE, 2007:287-294.
[40] 曾莱蓓, 孙星明, 向凌云, 等. 基于虚词变换的文本隐藏信息检测方法研究[J]. 计算机研究与发展, 2009, 46(增刊1):177-181. Zeng L B, Sun X M, Xiang L Y, et al. Research on text hidden information detection method based on virtual word transformation[J]//Journal of Computer Research and Development, 2009, 46(Suppl.1):177-181. (in Chinese)
[41] Taskiran C M, Topkara U, Topkara M, et al. Attacks on lexical natural language steganography systems[C]//Security, Steganography, and Watermarking of Multimedia Contents VIII. International Society for Optics and Photonics, 2006, 6072:607209.
[42] Ling Y X, Sun X M, Gang L, et al. Linguistic steganalysis using the features derived from synonym frequency[J]. Multimedia Tools and Applications, 2014, 71(3):1893-1911.
[43] Chen Z L, Huang L S, Yu Z S, et al. A statistical algorithm for linguistic steganography detection based on distribution of words[C]//2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. 558-563.
[44] Chen Z L, Huang L S, Yu Z S, et al. Effective linguistic steganography detection[C]//IEEE International Conference on Computer & Information Technology Workshops. IEEE, 2008:224- 229.
[45] Yang H, Cao X B. Linguistic steganalysis based on meta-features and immune mechanism[J]. Chinese Journal of Electronics, 2010, 19(4):661-666.
[46] Meng P, Hang L S, Yang W, et al. Linguistic steganography detection algorithm using statistical language model[C]//2009 International Conference on Information Technology and Computer Science. IEEE, 2009:540-543.
[47] Samanta S, Dutta S, Sanyal G. A real time text steganalysis by using statistical method[C]//2016 IEEE International Conference on Engineering and Technology (ICETECH). IEEE, 2016:264-268.
[48] Yang Z L, Huang Y F, Zhang Y J. A fast and efficient text steganalysis method[J]. IEEE Signal Processing Letters, 2019, 26(4):627-631.
[49] Wen J, Zhou X J, Zhong P, et al. Convolutional neural network based text steganalysis[J]. IEEE Signal Processing Letters, 2019, 26(3):460-464.
[50] Yang Z L, Wei N, Sheng J Y, et al. TS-CNN:text steganalysis from semantic space based on convolutional neural network[EB/OL].[2018-10-18]. https://arxiv.org/abs/1810.08136.
[51] Yang Z L, Wang K, Li J, et al. TS-RNN:text steganalysis based on recurrent neural networks[J]. IEEE Signal Processing Letters, 2019, 26(12):1743-1747.
[52] Bao Y J, Yang H, Yang Z L, et al. Text steganalysis with attentional LSTM-CNN[C]//International Conference on Computer and Communication Systems (ICCCS 2020). IEEE, 2020:138-142.
[53] Yang Z L, Huang Y F, Zhang Y J. TS-CSW:text steganalysis and hidden capacity estimation based on convolutional sliding windows[J]. Multimedia Tools and Applications, 2020, 79(25):18293-18316.
[54] Yang H, Bao Y J, Yang Z L, et al. Linguistic steganalysis via densely connected LSTM with feature pyramid[C]//Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security, 2020:5-10.
[55] Wu H Z, Yi B, Ding F, et al. Linguistic steganalysis with graph neural networks[J]. IEEE Signal Processing Letters, 2021, 28:558-562.