{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:53Z","timestamp":1740099173428,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_25","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:14:23Z","timestamp":1536754463000},"page":"288-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Covert Communication by Exploring Statistical and Linguistical Distortion in Text"],"prefix":"10.1007","author":[{"given":"Huanhuan","family":"Hu","sequence":"first","affiliation":[]},{"given":"Xin","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.1016\/j.procs.2015.07.457","volume":"57","author":"Shivani","year":"2015","unstructured":"Shivani, Kumar, V., Batham, S.: A novel approach of bulk data hiding using text steganography. Procedia Comput. Sci. 57, 1401\u20131410 (2015)","journal-title":"Procedia Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Huanhuan, H., Xin, Z., Weiming, Z., Nenghai, Y.: Adaptive text steganography by exploring statistical and linguistical distortion. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 145\u2013150. IEEE (2017)","key":"25_CR2","DOI":"10.1109\/DSC.2017.16"},{"doi-asserted-by":"crossref","unstructured":"Denemark, T., Bas, P., Fridrich, J.: Natural steganography in JPEG compressed images. In: Electronic Imaging (2018)","key":"25_CR3","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-316"},{"doi-asserted-by":"crossref","unstructured":"Tayel, M., Gamal, A., Shawky, H.: A proposed implementation method of an audio steganography technique. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 180\u2013184. IEEE (2016)","key":"25_CR4","DOI":"10.1109\/ICACT.2016.7423320"},{"issue":"2","key":"25_CR5","doi-asserted-by":"publisher","first-page":"3065","DOI":"10.1007\/s11042-015-3170-8","volume":"76","author":"MM Sadek","year":"2017","unstructured":"Sadek, M.M., Khalifa, A.S., Mostafa, M.G.: Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools Appl. 76(2), 3065\u20133085 (2017)","journal-title":"Multimedia Tools Appl."},{"doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. 1524\u20131526. IEEE (2008)","key":"25_CR6","DOI":"10.1109\/IIH-MSP.2008.6"},{"doi-asserted-by":"crossref","unstructured":"Yuling, L., Xingming, S., Can, G., Hong, W.: An efficient linguistic steganography for chinese text. In: IEEE International Conference on Multimedia and Expo, pp. 2094\u20132097. IEEE (2007)","key":"25_CR7","DOI":"10.1109\/ICME.2007.4285095"},{"doi-asserted-by":"crossref","unstructured":"Muhammad, H.Z., Rahman, S.M.S.A.A., Shakil, A.: Synonym based malay linguistic text steganography. In: Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2009, pp. 423\u2013427. IEEE (2009)","key":"25_CR8","DOI":"10.1109\/CITISIA.2009.5224169"},{"issue":"3","key":"25_CR9","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11042-012-1313-8","volume":"71","author":"L Xiang","year":"2014","unstructured":"Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimedia Tools Appl. 71(3), 1893\u20131911 (2014)","journal-title":"Multimedia Tools Appl."},{"unstructured":"Hinton, G.E.: Distributed representations (1984)","key":"25_CR10"},{"unstructured":"Hinton, G., Rumelhart, D., Williams, R.: Learning internal representations by back-propagating errors. In: Parallel Distributed Processing: Explorations in the Microstructure of Cognition 1 (1985)","key":"25_CR11"},{"issue":"2","key":"25_CR12","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1207\/s15516709cog1402_1","volume":"14","author":"JL Elman","year":"1990","unstructured":"Elman, J.L.: Finding structure in time. Cogn. Sci. 14(2), 179\u2013211 (1990)","journal-title":"Cogn. Sci."},{"key":"25_CR13","first-page":"1137","volume":"3","author":"Y Bengio","year":"2003","unstructured":"Bengio, Y., Ducharme, R., Vincent, P., Jauvin, C.: A neural probabilistic language model. J. Mach. Learn. Res. 3, 1137\u20131155 (2003)","journal-title":"J. Mach. Learn. Res."},{"unstructured":"Mikolov, T.: Language Modeling for Speech Recognition in Czech. Ph.D. thesis, Masters thesis, Brno University of Technology (2007)","key":"25_CR14"},{"doi-asserted-by":"crossref","unstructured":"Mikolov, T., Kopecky, J., Burget, L., Glembek, O., et al.: Neural network based language models for highly inflective languages. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2009, pp. 4725\u20134728. IEEE (2009)","key":"25_CR15","DOI":"10.1109\/ICASSP.2009.4960686"},{"unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)","key":"25_CR16"},{"doi-asserted-by":"crossref","unstructured":"Filler, T., Fridrich, J.: Minimizing additive distortion functions with non-binary embedding operation in steganography. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. 1\u20136, December 2010","key":"25_CR17","DOI":"10.1109\/WIFS.2010.5711444"},{"issue":"3","key":"25_CR18","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Huang, F., Luo, W., Huang, J., Shi, Y.Q.: Distortion function designing for JPEG steganography with uncompressed side-image. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. IH & MMSec 2013, pp. 69\u201376. ACM, New York (2013)","key":"25_CR19","DOI":"10.1145\/2482513.2482517"},{"doi-asserted-by":"crossref","unstructured":"Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206\u20134210, October 2014","key":"25_CR20","DOI":"10.1109\/ICIP.2014.7025854"},{"doi-asserted-by":"crossref","unstructured":"Zhao, Z., Guan, Q., Zhao, X.: Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 139\u2013148. ACM, New York (2016)","key":"25_CR21","DOI":"10.1145\/2909827.2930802"},{"doi-asserted-by":"crossref","unstructured":"Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography (2007)","key":"25_CR22","DOI":"10.1117\/12.697471"},{"issue":"11","key":"25_CR23","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller, G.A.: WordNet: a lexical database for English. Commun. ACM 38(11), 39\u201341 (1995)","journal-title":"Commun. ACM"},{"issue":"6","key":"25_CR24","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1016\/j.compeleceng.2011.07.004","volume":"37","author":"Z Chen","year":"2011","unstructured":"Chen, Z., Huang, L., Miao, H., Yang, W., Meng, P.: Steganalysis against substitution-based linguistic steganography based on context clusters. Comput. Electr. Eng. 37(6), 1071\u20131081 (2011)","journal-title":"Comput. Electr. Eng."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T23:50:33Z","timestamp":1571874633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}