The science of detecting llm-generated text

R Tang, YN Chuang, X Hu - Communications of the ACM, 2024 - dl.acm.org
ACM: Digital Library: Communications of the ACM ACM Digital Library Communications of the
ACM Volume 67, Number 4 (2024), Pages 50-59 The Science of Detecting LLM-Generated Text …

A review of text watermarking: theory, methods, and applications

NS Kamaruddin, A Kamsin, LY Por, H Rahman - IEEE Access, 2018 - ieeexplore.ieee.org
During the recent years, the issue of preserving the integrity of digital text has become a
focus of interest in the transmission of online content on the Internet. Watermarking has a …

A review of digital watermarking techniques for text documents

Z Jalil, AM Mirza - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
Copyright protection of plain text while traveling over the Internet is very crucial. Digital
watermarking provides the complete copyright protection solution for this problem. Text …

Adversarial watermarking transformer: Towards tracing text provenance with data hiding

S Abdelnabi, M Fritz - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
Recent advances in natural language generation have introduced powerful language
models with high-quality output text. However, this raises concerns about the potential …

Natural language watermarking via morphosyntactic alterations

HM Meral, B Sankur, AS Özsoy, T Güngör… - Computer Speech & …, 2009 - Elsevier
We develop a morphosyntax-based natural language watermarking scheme. In this scheme,
a text is first transformed into a syntactic tree diagram where the hierarchies and the …

Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method

CY Chang, S Clark - Computational linguistics, 2014 - direct.mit.edu
Linguistic steganography is concerned with hiding information in natural language text. One
of the major transformations used in linguistic steganography is synonym substitution …

A new approach to covert communication via PDF files

IS Lee, WH Tsai - Signal processing, 2010 - Elsevier
A new covert communication method via PDF files is proposed. A secret message, after
being encoded by a special ASCII code and embedded at between-word and between …

Towards code watermarking with dual-channel transformations

B Yang, W Li, L **ang, B Li - arxiv preprint arxiv:2309.00860, 2023 - arxiv.org
The expansion of the open source community and the rise of large language models have
raised ethical and security concerns on the distribution of source code, such as misconduct …

[PDF][PDF] e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing

A Gutub, F Al-Haidari, KM Al-Kahsah… - Journal of Emerging …, 2010 - jetwi.us
Digital watermarking is the process of embedding information into a digital signal. This work
targets web applications that need to have hidden secure data within their Arabic e-text files …

SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations

B Yang, W Li, L **ang, B Li - 2024 IEEE Symposium on Security and …, 2024 - computer.org
The expansion of the open source community and the rise of large language models have
raised ethical and security concerns on the distribution of source code, such as misconduct …