The science of detecting llm-generated text
ACM: Digital Library: Communications of the ACM ACM Digital Library Communications of the
ACM Volume 67, Number 4 (2024), Pages 50-59 The Science of Detecting LLM-Generated Text …
ACM Volume 67, Number 4 (2024), Pages 50-59 The Science of Detecting LLM-Generated Text …
A review of text watermarking: theory, methods, and applications
During the recent years, the issue of preserving the integrity of digital text has become a
focus of interest in the transmission of online content on the Internet. Watermarking has a …
focus of interest in the transmission of online content on the Internet. Watermarking has a …
A review of digital watermarking techniques for text documents
Copyright protection of plain text while traveling over the Internet is very crucial. Digital
watermarking provides the complete copyright protection solution for this problem. Text …
watermarking provides the complete copyright protection solution for this problem. Text …
Adversarial watermarking transformer: Towards tracing text provenance with data hiding
Recent advances in natural language generation have introduced powerful language
models with high-quality output text. However, this raises concerns about the potential …
models with high-quality output text. However, this raises concerns about the potential …
Natural language watermarking via morphosyntactic alterations
We develop a morphosyntax-based natural language watermarking scheme. In this scheme,
a text is first transformed into a syntactic tree diagram where the hierarchies and the …
a text is first transformed into a syntactic tree diagram where the hierarchies and the …
Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method
Linguistic steganography is concerned with hiding information in natural language text. One
of the major transformations used in linguistic steganography is synonym substitution …
of the major transformations used in linguistic steganography is synonym substitution …
A new approach to covert communication via PDF files
IS Lee, WH Tsai - Signal processing, 2010 - Elsevier
A new covert communication method via PDF files is proposed. A secret message, after
being encoded by a special ASCII code and embedded at between-word and between …
being encoded by a special ASCII code and embedded at between-word and between …
Towards code watermarking with dual-channel transformations
B Yang, W Li, L **ang, B Li - arxiv preprint arxiv:2309.00860, 2023 - arxiv.org
The expansion of the open source community and the rise of large language models have
raised ethical and security concerns on the distribution of source code, such as misconduct …
raised ethical and security concerns on the distribution of source code, such as misconduct …
[PDF][PDF] e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing
Digital watermarking is the process of embedding information into a digital signal. This work
targets web applications that need to have hidden secure data within their Arabic e-text files …
targets web applications that need to have hidden secure data within their Arabic e-text files …
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations
The expansion of the open source community and the rise of large language models have
raised ethical and security concerns on the distribution of source code, such as misconduct …
raised ethical and security concerns on the distribution of source code, such as misconduct …