pith. sign in

Integrity report for Set Shaping Theory as a Complementary Payload-Shaping Layer for Steganography

A machine-verified record of the checks Pith has run against this paper: detector runs, findings, signed bundle events, and canonical identifiers.

arXiv:2605.19885 · pith:2026:DQTCSI3WOFZ2F5E5OYZWEIZIYO

0Critical
0Advisory
5Detectors run
2026-05-21Last checked

Paper page arXiv integrity.json bundle.json

Detector runs

claim_evidence completed v1.0.0 · findings 0 · 2026-05-21 03:42:20.326388+00:00
shingle_duplication skipped v0.1.0 · findings 0 · 2026-05-20 01:49:49.359975+00:00
citation_quote_validity skipped v0.1.0 · findings 0 · 2026-05-20 01:49:48.936298+00:00
ai_meta_artifact skipped v1.0.0 · findings 0 · 2026-05-20 01:33:24.847326+00:00
cited_work_retraction completed v1.0.0 · findings 0 · 2026-05-20 01:21:59.830296+00:00

Findings

No public integrity findings for this paper.

Signed record

The machine-readable record for this paper lives at /pith/DQTCSI3W/integrity.json. Pith Number bundles also include signed pith.integrity.v1 events where a Pith Number exists.