Hiding in Plain Sight: Secure Communication with Language Models

A new approach to steganography leverages the power of large language models to conceal information with provable security guarantees.

A new approach to steganography leverages the power of large language models to conceal information with provable security guarantees.
![The AttackerDP algorithm, when constrained by a 0.202-second execution limit, exhibits a threshold of approximately 310,310 methods-a value determined by the simulation’s parameters, including a benchmark of 500 methods with [latex]k=500[/latex] and [latex]v=1000[/latex], a success probability range of [latex]s\_{.,j} \in [0.05, 0.85][/latex], and method costs between 40 and 200 units, calculated via a linear cost function [latex]\varphi(x) = x[/latex]-suggesting that system performance is intrinsically tied to the interplay between computational budget and the defined parameter space.](https://arxiv.org/html/2604.21436v1/Images/dp_time_threshold_crossing.png)
This research introduces a game-theoretic model to optimize the combination of cryptographic algorithms, anticipating and responding to evolving attacker strategies.
This review unravels the complex world of Layer-2 scaling technologies, explaining how they’re poised to unlock mainstream blockchain adoption.
New research rigorously compares three leading methods for protecting data transmitted over noisy channels, revealing performance differences in practical, short-message scenarios.
A new review synthesizes the landscape of attacks targeting autonomous vehicle perception, revealing critical vulnerabilities as systems increasingly rely on multiple sensors.
This review explores how to build multi-armed and linear bandit algorithms that consistently select the same actions under repeated runs, improving the reliability of reinforcement learning systems.

Researchers have developed a method for significantly extending the length of sequences processed by attention mechanisms without requiring hardware modifications.
![A Wi-Fi steganography system conceals data within the seemingly innocuous structure of wireless network traffic, offering a covert communication channel by exploiting the inherent redundancies and flexibility of the [latex]802.11[/latex] protocol.](https://arxiv.org/html/2604.20521v1/x1.png)
Researchers have developed a system to embed secret messages within the normally unused components of Wi-Fi transmissions, offering a new avenue for covert communication.
New research details how rigorous pre-deployment checks can bolster the security of AI sandbox infrastructure and prevent potentially catastrophic model escapes.
A new technique streamlines privacy-preserving computation by efficiently combining arithmetic and comparison operations within fully homomorphic encryption schemes.