{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T04:10:09Z","timestamp":1751861409974,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_40","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T16:14:23Z","timestamp":1536768863000},"page":"463-472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Text Coverless Information Hiding Based on Word2vec"],"prefix":"10.1007","author":[{"given":"Yi","family":"Long","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"key":"40_CR1","first-page":"126","volume":"2","author":"I Cox","year":"2002","unstructured":"Cox, I., Miller, M.: The first 50 years of electronic watermarking. J. Appl. Signal Proc. 2, 126\u2013132 (2002)","journal-title":"J. Appl. Signal Proc."},{"key":"40_CR2","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/49.464718","volume":"13","author":"J Brassil","year":"1994","unstructured":"Brassil, J., Low, S., Maxemchuk, N., Gorman, L.: Electronic marking and identification techniques to discourage document copying. J. IEEE J. Sel. Areas Commun. 13, 1495\u20131504 (1994)","journal-title":"J. IEEE J. Sel. Areas Commun."},{"key":"40_CR3","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/49.668978","volume":"16","author":"S Low","year":"1998","unstructured":"Low, S., Maxemchuk, N.: Performance comparison of two text marking methods. J. Sel. Areas Commun. 16, 561\u2013572 (1998)","journal-title":"J. Sel. Areas Commun."},{"key":"40_CR4","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/5.771071","volume":"87","author":"J Brassil","year":"1999","unstructured":"Brassil, J., Low, S., Maxemchuk, N.: Copyright protection for the electronic distribution of text documents. Proc. IEEE 87, 1181\u20131196 (1999)","journal-title":"Proc. IEEE"},{"key":"40_CR5","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10772-013-9192-6","volume":"16","author":"MA Nematollahi","year":"2013","unstructured":"Nematollahi, M.A., Al-Haddad, S.A.R.: An overview of digital speech watermarking. Int. J. Speech Technol. 16, 471\u2013488 (2013)","journal-title":"Int. J. Speech Technol."},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Mali M.L., Patil N.N., Patil J.B.: Implementation of text watermarking technique using natural language. In: IEEE International Conference on Communication Systems and Network Technologies, pp. 482\u2013486 (2013)","DOI":"10.1109\/CSNT.2013.106"},{"key":"40_CR7","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1016\/j.jss.2012.05.027","volume":"85","author":"E Satir","year":"2012","unstructured":"Satir, E., Isik, H.: A compression-based text steganography method. J. Syst. Softw. 85, 2385\u20132394 (2012)","journal-title":"J. Syst. Softw."},{"key":"40_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.14257\/ijgdc.2013.6.6.05","volume":"6","author":"ZH Xia","year":"2013","unstructured":"Xia, Z.H., Wang, S.H., Sun, X.M., Wang, J.: Print-scan resilient watermarking for the chinese text image. Int. J. Grid Distrib. Comput. 6, 51\u201362 (2013)","journal-title":"Int. J. Grid Distrib. Comput."},{"key":"40_CR9","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.patrec.2013.04.022","volume":"35","author":"F Daraee","year":"2014","unstructured":"Daraee, F., Mozaffari, S.: Watermarking in binary document images using fractal codes. Pattern Recogn. Lett. 35, 120\u2013129 (2014)","journal-title":"Pattern Recogn. Lett."},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Sui XG, Luo H.: A steganalysis method based on the distribution of space characters. In: Proceedings of IEEE International Conference on Communications, Circuits and Systems, pp. 54\u201356 (2006)","DOI":"10.1109\/ICCCAS.2006.284584"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Meng, P., Huang, L.S., Yang, W.: Attacks on translation based steganography. In: IEEE Youth Conference on Information, Computing and Telecommunication, Beijing, China, pp. 227\u2013230 (2009)","DOI":"10.1109\/YCICT.2009.5382382"},{"key":"40_CR12","first-page":"14","volume":"1","author":"L Goyal","year":"2014","unstructured":"Goyal, L., Raman, M., Diwan, P.: A robust method for integrity protection of digital data in text document watermarking. Int. J. Innovative Res. Sci. Technol. 1, 14\u201318 (2014)","journal-title":"Int. J. Innovative Res. Sci. Technol."},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the Chinese mathematical expression. In: 1st International Conference on Cloud Computing and Security, Nanjing China (2015)","DOI":"10.1007\/978-3-319-27051-7_12"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, J., Shen, J., Wang, L., et al.: Coverless text information hiding method based on the word rank map. In: International Conference on Cloud Computing and Security. Nanjing China, pp. 145\u2013155 (2016)","DOI":"10.1007\/978-3-319-48671-0_14"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, J., Xie, Y., Wang, L., Lin, H.: Coverless text information hiding method using the frequent words distance. In: 3rd International Conference on Cloud Computing and Security, pp. 121\u2013132 (2017)","DOI":"10.1007\/978-3-319-68505-2_11"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Mu, Y., Zhao, N., et al.: Coverless information hiding method based on multi-keywords. In: International Conference on Cloud Computing and Security. Nanjing, China, pp. 39\u201347 (2016)","DOI":"10.1007\/978-3-319-48671-0_4"},{"key":"40_CR17","first-page":"443","volume":"18","author":"SHR Grishman","year":"2017","unstructured":"Grishman, S.H.R., Wang, Y.: Active learning based named entity recognition and its application in natural language coverless information hiding. the. J. Internet Technol. 18, 443\u2013451 (2017)","journal-title":"J. Internet Technol."},{"key":"40_CR18","first-page":"1353","volume":"18","author":"ZH Xia","year":"2017","unstructured":"Xia, Z.H., Xuan, L.: Coverless information hiding method based on LSB of the character\u2019s unicode. J. Internet Technol. 18, 1353\u20131360 (2017)","journal-title":"J. Internet Technol."},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"Shi, S.W., Qi, Y.N., Huang, Y.F.: An approach to text steganography based on search in internet. In: International Computer Symposium (ICS), pp. 227\u2013232 (2016)","DOI":"10.1109\/ICS.2016.0052"},{"key":"40_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","volume-title":"Cloud Computing and Security","author":"Z Zhou","year":"2015","unstructured":"Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123\u2013132. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27051-7_11"},{"key":"40_CR21","first-page":"435","volume":"18","author":"CS Yuan","year":"2017","unstructured":"Yuan, C.S., Xia, Z.H., Sun, X.M.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18, 435\u2013442 (2017)","journal-title":"J. Internet Technol."},{"key":"40_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/978-3-319-63315-2_47","volume-title":"Intelligent Computing Methodologies","author":"S Zheng","year":"2017","unstructured":"Zheng, S., Wang, L., Ling, B., Hu, D.: Coverless information hiding based on robust image hashing. In: Huang, D.-S., Hussain, A., Han, K., Gromiha, M.M. (eds.) ICIC 2017. LNCS (LNAI), vol. 10363, pp. 536\u2013547. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63315-2_47"},{"key":"40_CR23","unstructured":"Mikolov, T., Chen, K., Corrado, G., et al.: Efficient Estimation of Word Representations in Vector Space. arXiv:1301.3781 .(2013)"},{"key":"40_CR24","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G., Dean, J.: Distributed Representations of Words and Phrases and their Compositionality. arXiv.1301.4546 (2013)"},{"key":"40_CR25","unstructured":"http:\/\/download.labs.sogou.com (2016)"},{"key":"40_CR26","unstructured":"Le, Q.V., Mikolov, T.: Distributed Representations of Sentences and Documents. arXiv:1405.4053 (2014)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T03:33:45Z","timestamp":1751859225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}