{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:TC6CUW5XOGDJF66AZX2SJIYJTX","short_pith_number":"pith:TC6CUW5X","canonical_record":{"source":{"id":"2605.19955","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-19T15:08:41Z","cross_cats_sorted":["cs.SD"],"title_canon_sha256":"9f4251bc1cf8be0de90ab493b7f543718920d35e7c9122bfede08a85323f8c5f","abstract_canon_sha256":"497f9c1412028f3b9220362421e210a73d314737f6dc9dadffdfd385b489ae7f"},"schema_version":"1.0"},"canonical_sha256":"98bc2a5bb7718692fbc0cdf524a3099dd7d68b56867a1329cbf9df1594bfa172","source":{"kind":"arxiv","id":"2605.19955","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.19955","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"arxiv_version","alias_value":"2605.19955v1","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.19955","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"pith_short_12","alias_value":"TC6CUW5XOGDJ","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"pith_short_16","alias_value":"TC6CUW5XOGDJF66A","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"pith_short_8","alias_value":"TC6CUW5X","created_at":"2026-05-20T02:05:56Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:TC6CUW5XOGDJF66AZX2SJIYJTX","target":"record","payload":{"canonical_record":{"source":{"id":"2605.19955","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-19T15:08:41Z","cross_cats_sorted":["cs.SD"],"title_canon_sha256":"9f4251bc1cf8be0de90ab493b7f543718920d35e7c9122bfede08a85323f8c5f","abstract_canon_sha256":"497f9c1412028f3b9220362421e210a73d314737f6dc9dadffdfd385b489ae7f"},"schema_version":"1.0"},"canonical_sha256":"98bc2a5bb7718692fbc0cdf524a3099dd7d68b56867a1329cbf9df1594bfa172","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T02:05:56.879802Z","signature_b64":"okvxgEcNcimzG5rgGyUyziykg+iT4SkJ0kYJGUrt9u8IGrgys7F9Kn2DwiCDHE9GbLeG6O9XdZ4x0Q2ShUxBAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"98bc2a5bb7718692fbc0cdf524a3099dd7d68b56867a1329cbf9df1594bfa172","last_reissued_at":"2026-05-20T02:05:56.879047Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T02:05:56.879047Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.19955","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T02:05:56Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"LCZ+9fkkvCxgD4c1dSTaPMpNg0dOdPVgJ9m4UcCTVprRvNQ4e5IElGrwv0w3IarhLimMZ0z2++TMvuSC3H7tAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:24:14.579437Z"},"content_sha256":"55de6d142c9837a011a6c74857c3669e6493efe659b83e4358127e1666c3f2c5","schema_version":"1.0","event_id":"sha256:55de6d142c9837a011a6c74857c3669e6493efe659b83e4358127e1666c3f2c5"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:TC6CUW5XOGDJF66AZX2SJIYJTX","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"DASM: Domain-Aware Sharpness Minimization for Multi-Domain Voice Stream Steganalysis","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.SD"],"primary_cat":"cs.CR","authors_text":"Linna Zhou, Mengqin Zhao, Pengcheng Zhou, Pianran Guo, Shuhua Chen, Zhongliang Yang","submitted_at":"2026-05-19T15:08:41Z","abstract_excerpt":"The growing use of information hiding in network streaming media for covert communication poses a significant security threat, necessitating the development of robust detection technologies. However, existing steganalysis methods for network voice streams mostly rely on data distributions in specific scenarios, making it difficult to adapt to the practical detection needs of non-homologous data distributions. Through Hessian analysis, we find that the loss landscapes of mainstream models are dominated by numerous saddle points and sharp local minima, rendering them highly sensitive to data dis"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.19955","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.19955/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T02:05:56Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"T8VNBJVV90gdPD8Y2H2MVReIeclMPuiTbmTKE5JvnDia16Xe+z8iU3rGd3UQR0ecyEVGcPCHRde7dHmzTfRxAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:24:14.579821Z"},"content_sha256":"cb17602ee8f9a63b53a294c9be117fcba94721a6bbb62a5276ee9678788faae3","schema_version":"1.0","event_id":"sha256:cb17602ee8f9a63b53a294c9be117fcba94721a6bbb62a5276ee9678788faae3"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/TC6CUW5XOGDJF66AZX2SJIYJTX/bundle.json","state_url":"https://pith.science/pith/TC6CUW5XOGDJF66AZX2SJIYJTX/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/TC6CUW5XOGDJF66AZX2SJIYJTX/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T22:24:14Z","links":{"resolver":"https://pith.science/pith/TC6CUW5XOGDJF66AZX2SJIYJTX","bundle":"https://pith.science/pith/TC6CUW5XOGDJF66AZX2SJIYJTX/bundle.json","state":"https://pith.science/pith/TC6CUW5XOGDJF66AZX2SJIYJTX/state.json","well_known_bundle":"https://pith.science/.well-known/pith/TC6CUW5XOGDJF66AZX2SJIYJTX/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:TC6CUW5XOGDJF66AZX2SJIYJTX","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"497f9c1412028f3b9220362421e210a73d314737f6dc9dadffdfd385b489ae7f","cross_cats_sorted":["cs.SD"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-19T15:08:41Z","title_canon_sha256":"9f4251bc1cf8be0de90ab493b7f543718920d35e7c9122bfede08a85323f8c5f"},"schema_version":"1.0","source":{"id":"2605.19955","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.19955","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"arxiv_version","alias_value":"2605.19955v1","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.19955","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"pith_short_12","alias_value":"TC6CUW5XOGDJ","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"pith_short_16","alias_value":"TC6CUW5XOGDJF66A","created_at":"2026-05-20T02:05:56Z"},{"alias_kind":"pith_short_8","alias_value":"TC6CUW5X","created_at":"2026-05-20T02:05:56Z"}],"graph_snapshots":[{"event_id":"sha256:cb17602ee8f9a63b53a294c9be117fcba94721a6bbb62a5276ee9678788faae3","target":"graph","created_at":"2026-05-20T02:05:56Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2605.19955/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"The growing use of information hiding in network streaming media for covert communication poses a significant security threat, necessitating the development of robust detection technologies. However, existing steganalysis methods for network voice streams mostly rely on data distributions in specific scenarios, making it difficult to adapt to the practical detection needs of non-homologous data distributions. Through Hessian analysis, we find that the loss landscapes of mainstream models are dominated by numerous saddle points and sharp local minima, rendering them highly sensitive to data dis","authors_text":"Linna Zhou, Mengqin Zhao, Pengcheng Zhou, Pianran Guo, Shuhua Chen, Zhongliang Yang","cross_cats":["cs.SD"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-19T15:08:41Z","title":"DASM: Domain-Aware Sharpness Minimization for Multi-Domain Voice Stream Steganalysis"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.19955","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:55de6d142c9837a011a6c74857c3669e6493efe659b83e4358127e1666c3f2c5","target":"record","created_at":"2026-05-20T02:05:56Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"497f9c1412028f3b9220362421e210a73d314737f6dc9dadffdfd385b489ae7f","cross_cats_sorted":["cs.SD"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-19T15:08:41Z","title_canon_sha256":"9f4251bc1cf8be0de90ab493b7f543718920d35e7c9122bfede08a85323f8c5f"},"schema_version":"1.0","source":{"id":"2605.19955","kind":"arxiv","version":1}},"canonical_sha256":"98bc2a5bb7718692fbc0cdf524a3099dd7d68b56867a1329cbf9df1594bfa172","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"98bc2a5bb7718692fbc0cdf524a3099dd7d68b56867a1329cbf9df1594bfa172","first_computed_at":"2026-05-20T02:05:56.879047Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T02:05:56.879047Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"okvxgEcNcimzG5rgGyUyziykg+iT4SkJ0kYJGUrt9u8IGrgys7F9Kn2DwiCDHE9GbLeG6O9XdZ4x0Q2ShUxBAA==","signature_status":"signed_v1","signed_at":"2026-05-20T02:05:56.879802Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.19955","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:55de6d142c9837a011a6c74857c3669e6493efe659b83e4358127e1666c3f2c5","sha256:cb17602ee8f9a63b53a294c9be117fcba94721a6bbb62a5276ee9678788faae3"],"state_sha256":"932e6bdc081d17a869337c0038b4c1a1b2820a82cac7f464823b75e9cf8c0387"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ccTuGuxdGXEoMrvpcUcM92Lt0QxL98fJCilexgX4jz+TbAK59FN3WcacSX/1ASvclMcQCfXMdZSW/VD1L/KuBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T22:24:14.582054Z","bundle_sha256":"6b6b04f7761483257d6404b4dc7c16978720c30d29d0eb1b6af27519261ad5e0"}}