{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:42Z","timestamp":1740099162465,"version":"3.37.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_42","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:14:23Z","timestamp":1536754463000},"page":"485-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Text Semantic Steganalysis Based on Word Embedding"],"prefix":"10.1007","author":[{"given":"Xin","family":"Zuo","sequence":"first","affiliation":[]},{"given":"Huanhuan","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"key":"42_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-88961-8_18","volume-title":"Information Hiding","author":"T Pevn\u00fd","year":"2008","unstructured":"Pevn\u00fd, T., Fridrich, J.: Benchmarking for steganography. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 251\u2013267. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88961-8_18"},{"key":"42_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)"},{"key":"42_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/BFb0028489","volume-title":"Information and Communications Security","author":"M Chapman","year":"1997","unstructured":"Chapman, M., Davida, G.: Hiding the hidden: a software system for concealing ciphertext as innocuous text. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 335\u2013345. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0028489"},{"issue":"4","key":"42_CR4","doi-asserted-by":"publisher","first-page":"654","DOI":"10.3923\/itj.2008.631.638","volume":"7","author":"Y Liu","year":"2008","unstructured":"Liu, Y., Sun, X., Liu, Y., Li, C.T.: MIMIC-PPT: Mimicking-based steganography for microsoft power point document. Inf. Technol. J. 7(4), 654\u2013660 (2008)","journal-title":"Inf. Technol. J."},{"key":"42_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-540-88961-8_16","volume-title":"Information Hiding","author":"Z Chen","year":"2008","unstructured":"Chen, Z., et al.: Linguistic steganography detection using statistical characteristics of correlations between words. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 224\u2013235. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88961-8_16"},{"key":"42_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-540-30114-1_13","volume-title":"Information Hiding","author":"IA Bolshakov","year":"2004","unstructured":"Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 180\u2013191. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30114-1_13"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Yuling, L., Xingming, S., Can, G., Hong, W.: An efficient linguistic steganography for Chinese text. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 2094\u20132097. IEEE (2007)","DOI":"10.1109\/ICME.2007.4285095"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Muhammad, H.Z., Rahman, S.M.S.A.A., Shakil, A.: Synonym based Malay linguistic text steganography. In: Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2009, pp. 423\u2013427. IEEE (2009)","DOI":"10.1109\/CITISIA.2009.5224169"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. 1524\u20131526. IEEE (2008)","DOI":"10.1109\/IIH-MSP.2008.6"},{"issue":"8","key":"42_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-074","volume":"2016","author":"A Wilson","year":"2016","unstructured":"Wilson, A., Ker, A.D.: Avoiding detection on twitter: embedding strategies for linguistic steganography. Electron. Imaging 2016(8), 1\u20139 (2016)","journal-title":"Electron. Imaging"},{"key":"42_CR11","unstructured":"Winstein, K.: Lexical steganography Through Adaptive Modulation of the Word Choice Hash (1998, unpublished). http:\/\/www.imsa.edu\/~keithw\/tlex"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Wilson, A., Blunsom, P., Ker, A.D.: Linguistic steganography on twitter: hierarchical language modeling with manual interaction. In: IS&T\/SPIE Electronic Imaging, p. 902803. International Society for Optics and Photonics (2014)","DOI":"10.1117\/12.2039213"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Taskiran, C.M., Topkara, U., Topkara, M., Delp, E.J.: Attacks on lexical natural language steganography systems. In: Electronic Imaging 2006, p. 607209. International Society for Optics and Photonics (2006)","DOI":"10.1117\/12.649551"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Yu, Z., Huang, L., Chen, Z., Li, L., Zhao, X., Zhu, Y.: Detection of synonym-substitution modified articles using context information. In: Second International Conference on Future Generation Communication and Networking, FGCN 2008, vol. 1, pp. 134\u2013139. IEEE (2008)","DOI":"10.1109\/FGCN.2008.39"},{"issue":"6","key":"42_CR15","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1016\/j.compeleceng.2011.07.004","volume":"37","author":"Z Chen","year":"2011","unstructured":"Chen, Z., Huang, L., Miao, H., Yang, W., Meng, P.: Steganalysis against substitution-based linguistic steganography based on context clusters. Comput. Electr. Eng. 37(6), 1071\u20131081 (2011)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"42_CR16","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11042-012-1313-8","volume":"71","author":"L Xiang","year":"2014","unstructured":"Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimed. Tools Appl. 71(3), 1893\u20131911 (2014)","journal-title":"Multimed. Tools Appl."},{"key":"42_CR17","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759 (2016)","DOI":"10.18653\/v1\/E17-2068"},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Ji, S., Yun, H., Yanardag, P., Matsushima, S., Vishwanathan, S.: WordRank: Learning word embeddings via robust ranking. arXiv preprint arXiv:1506.02761 (2015)","DOI":"10.18653\/v1\/D16-1063"},{"issue":"11","key":"42_CR20","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller, G.A.: Wordnet: a lexical database for English. Commun. ACM 38(11), 39\u201341 (1995)","journal-title":"Commun. ACM"},{"issue":"3","key":"42_CR21","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T23:50:54Z","timestamp":1571874654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}