{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T18:38:56Z","timestamp":1769193536302,"version":"3.49.0"},"publisher-location":"Cham","reference-count":72,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222765","type":"print"},{"value":"9783030222772","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_34","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"849-872","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Recent Trends in Text Steganography with Experimental Study"],"prefix":"10.1007","author":[{"given":"Ravinder","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Hitesh","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"34_CR1","unstructured":"Popa, R. (1998). An analysis of steganographic techniques. The Politehnica University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering."},{"key":"34_CR2","first-page":"1","volume-title":"Information Hiding","author":"David Kahn","year":"1996","unstructured":"Kahn, D. (1996, May). The history of steganography. In International Workshop on Information Hiding (pp. 1\u20135). Berlin: Springer."},{"key":"34_CR3","unstructured":"The Science of Secrecy, Steganography. Last visited May 6, 2009, from \nhttp:\/\/www.arch.columbia.edu\/DDL\/cad\/A4S13"},{"issue":"3.4","key":"34_CR4","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313\u2013336.","journal-title":"IBM Systems Journal"},{"key":"34_CR5","unstructured":"Johnson, N. (2009). Steganography. George Meson University. Last visited May 4, 2009, from \nhttp:\/\/patriot.net\/~johnson\/html\/neil\/stegdoc"},{"issue":"3","key":"34_CR6","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3923\/itj.2004.245.269","volume":"3","author":"K Rabah","year":"2004","unstructured":"Rabah, K. (2004). Steganography-the art of hiding data. Information Technology Journal, 3(3), 245\u2013269.","journal-title":"Information Technology Journal"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Alattar, A. M., & Alattar, O. M. (2004, June). Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In Security, Steganography, and Watermarking of Multimedia Contents VI (Vol. 5306, pp. 685\u2013696). International Society for Optics and Photonics.","DOI":"10.1117\/12.527147"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Bhaya, W., Rahma, A. M., & Al-nasrawi, D. (2013). Text steganography based on font type in MS-Word documents.","DOI":"10.3844\/jcssp.2013.898.904"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Odeh, A., Elleithy, K., & Faezipour, M. (2013, May). Steganography in Arabic text using Kashida variation algorithm (KVA). In 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT) (pp. 1\u20136). IEEE.","DOI":"10.1109\/LISAT.2013.6578239"},{"issue":"19","key":"34_CR10","first-page":"2113","volume":"118","author":"KA Kumar","year":"2018","unstructured":"Kumar, K. A., & Pabboju, S. (2018). An optimized text steganography approach using differently spelt English words. International Journal of Pure and Applied Mathematics, 118(19), 2113\u20132125.","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-981-10-7245-1_19","volume-title":"Intelligent Computing and Information and Communication","author":"KK Mandal","year":"2018","unstructured":"Mandal, K. K., Koley, S., & Mondal, S. (2018). Number system oriented text steganography in English language for short messages: A decimal approach. In Intelligent Computing and Information and Communication (pp. 183\u2013193). Singapore: Springer."},{"key":"34_CR12","unstructured":"Khairullah, M., & Ratul, M. A. S. (2018). Steganography in Bengali unicode text. SUST Journal of Science and Technology."},{"issue":"1","key":"34_CR13","doi-asserted-by":"publisher","first-page":"42","DOI":"10.18178\/lnit.3.1.42-47","volume":"3","author":"EM Ahmadoh","year":"2015","unstructured":"Ahmadoh, E. M., & Gutub, A. A. A. (2015). Utilization of two diacritics for Arabic text steganography to enhance performance. Lecture Notes on Information Theory, 3(1), 42.","journal-title":"Lecture Notes on Information Theory"},{"key":"34_CR14","unstructured":"Al-Nofaie, S., Fattani, M., & Gutub, A. A. A. (2016, February). Capacity improved Arabic text steganography technique utilizing \u2018kashida\u2019 with whitespaces. In The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE2016) (pp. 38\u201344)."},{"issue":"5","key":"34_CR15","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1016\/j.jss.2011.12.023","volume":"85","author":"LY Por","year":"2012","unstructured":"Por, L. Y., Wong, K., & Chee, K. O. (2012). UniSpaCh: A text-based data hiding method using Unicode space characters. Journal of Systems and Software, 85(5), 1075\u20131082.","journal-title":"Journal of Systems and Software"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Kumar, R., Malik, A., Singh, S., Kumar, B., & Chand, S. (2016, April). A space based reversible high capacity text steganography scheme using font type and style. In Computing, Communication and Automation (ICCCA) (pp. 1090\u20131094). IEEE.","DOI":"10.1109\/CCAA.2016.7813878"},{"issue":"12","key":"34_CR17","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/76.974678","volume":"11","author":"D Huang","year":"2001","unstructured":"Huang, D., & Yan, H. (2001). Interword distance changes represented by sine waves for watermarking text images. IEEE Transactions on Circuits and Systems for Video Technology, 11(12), 1237\u20131245.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"34_CR18","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.protcy.2013.12.349","volume":"10","author":"S Roy","year":"2013","unstructured":"Roy, S., & Venkateswaran, P. (2013). A text based steganography technique with Indian root. Procedia Technology, 10, 167\u2013171.","journal-title":"Procedia Technology"},{"issue":"8","key":"34_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.5815\/ijcnis.2012.08.08","volume":"4","author":"I Banerjee","year":"2012","unstructured":"Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2012). A procedure of text steganography using Indian regional language. International Journal of Computer Network and Information Security, 4(8), 65.","journal-title":"International Journal of Computer Network and Information Security"},{"key":"34_CR20","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1016\/j.procs.2015.02.079","volume":"46","author":"PM Vidhya","year":"2015","unstructured":"Vidhya, P. M., & Paul, V. (2015). A method for text steganography using Malayalam text. Procedia Computer Science, 46, 524\u2013531.","journal-title":"Procedia Computer Science"},{"key":"34_CR21","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2018.2871746","volume":"14","author":"Z Yang","year":"2018","unstructured":"Yang, Z., Guo, X., Chen, Z., Huang, Y., & Zhang, Y. J. (2018). RNN-Stega: Linguistic steganography based on recurrent neural networks. IEEE Transactions on Information Forensics and Security, 14, 1280.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"34_CR22","doi-asserted-by":"publisher","first-page":"28969","DOI":"10.1007\/s11042-018-6072-8","volume":"77","author":"L Xiang","year":"2018","unstructured":"Xiang, L., Wu, W., Li, X., & Yang, C. (2018). A linguistic steganography based on word indexing compression and candidate selection. Multimedia Tools and Applications, 77, 28969.","journal-title":"Multimedia Tools and Applications"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wang, S., Gan, W., Tang, C., Zhang, J., & Liang, H. (2018, June). SLIDE: An efficient secure linguistic steganography detection protocol. In International Conference on Cloud Computing and Security (pp. 298\u2013309). Cham: Springer.","DOI":"10.1007\/978-3-030-00012-7_28"},{"key":"34_CR24","unstructured":"Mandal, K. K., Koley, S., & Mondal, S. (2018). Number system oriented text steganography in English language for short messages: A decimal approach. In Intelligent Computing and Information and Communication (pp. 183\u2013193). Singapore: Springer."},{"key":"34_CR25","doi-asserted-by":"publisher","first-page":"1563","DOI":"10.1007\/s11277-018-5868-1","volume":"103","author":"N Naqvi","year":"2018","unstructured":"Naqvi, N., Abbasi, A. T., Hussain, R., Khan, M. A., & Ahmad, B. (2018). Multilayer partially homomorphic encryption text steganography (MLPHE-TS): A zero steganography approach. Wireless Personal Communications, 103, 1563\u20131585.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"34_CR26","first-page":"1","volume":"29","author":"A Kaur","year":"2018","unstructured":"Kaur, A., Kaur, S., & Sethi, G. (2018). A study on text based steganography using email platform and color mapping. International Journal of Computer (IJC), 29(1), 1\u201312.","journal-title":"International Journal of Computer (IJC)"},{"issue":"1","key":"34_CR27","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1504\/IJESDF.2018.089214","volume":"10","author":"A Ditta","year":"2018","unstructured":"Ditta, A., Yongquan, C., Azeem, M., Rana, K. G., Yu, H., & Memon, M. Q. (2018). Information hiding: Arabic text steganography by using Unicode characters to hide secret data. International Journal of Electronic Security and Digital Forensics, 10(1), 61\u201378.","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"34_CR28","unstructured":"Sanghi, A., Chaudhary, S., & Dave, M. (2018). Enhance the data security in cloud computing by text steganography. In Smart Trends in Systems, Security and Sustainability (pp. 241\u2013248). Singapore: Springer."},{"key":"34_CR29","doi-asserted-by":"crossref","unstructured":"Siahaan, R. F., Zarlis, M., & Nasution, B. B. (2018, September). Performance analysis of steganography alphanumeric text in the text based on Indonesian linguistic. In IOP Conference Series: Materials Science and Engineering (Vol. 420, No. 1, p. 012123). IOP Publishing.","DOI":"10.1088\/1757-899X\/420\/1\/012123"},{"key":"34_CR30","doi-asserted-by":"crossref","unstructured":"Zuo, X., Hu, H., Zhang, W., & Yu, N. (2018, June). Text semantic steganalysis based on word embedding. In International Conference on Cloud Computing and Security (pp. 485\u2013495). Cham: Springer.","DOI":"10.1007\/978-3-030-00015-8_42"},{"key":"34_CR31","doi-asserted-by":"publisher","unstructured":"Fateh, M., & Rezvani, M. (2018). An email-based high capacity text steganography using repeating characters. International Journal of Computers and Applications, 1\u20137. \nhttps:\/\/doi.org\/10.1080\/1206212x.2018.1517713","DOI":"10.1080\/1206212x.2018.1517713"},{"issue":"3","key":"34_CR32","first-page":"541","volume":"55","author":"L Xiang","year":"2018","unstructured":"Xiang, L., Li, Y., Hao, W., Yang, P., & Shen, X. (2018). Reversible natural language watermarking using synonym substitution and arithmetic coding. Computers, Materials and Continua, 55(3), 541\u2013559.","journal-title":"Computers, Materials and Continua"},{"key":"34_CR33","doi-asserted-by":"crossref","unstructured":"Ashraf, Z., Roy, M. L., Muhuri, P. K., & Lohani, Q. D. (2018, July). A novel image steganography approach based on interval type-2 fuzzy similarity. In 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (pp. 1\u20138). IEEE.","DOI":"10.1109\/FUZZ-IEEE.2018.8491582"},{"issue":"2","key":"34_CR34","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1007\/s11277-017-4962-0","volume":"98","author":"B Bhushan","year":"2017","unstructured":"Bhushan, B., & Sahoo, G. (2017). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037\u20132077. \nhttps:\/\/doi.org\/10.1007\/s11277-017-4962-0\n\n.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"34_CR35","first-page":"83","volume":"12","author":"R Kumar","year":"2016","unstructured":"Kumar, R., Chandra, P., & Hanmandlu, M. (2016). A robust fingerprint matching system using orientation features. Journal of Information Processing Systems, 12(1), 83\u201399.","journal-title":"Journal of Information Processing Systems"},{"key":"34_CR36","unstructured":"Kumar, R., Chandra, P., & Hanmandlu, M. (2012). Fingerprint matching based on orientation feature. In Advanced Materials Research (Vol. 403, pp. 888\u2013894). Trans Tech Publications."},{"key":"34_CR37","first-page":"983","volume":"3","author":"BB Gupta","year":"2013","unstructured":"Gupta, B. B., & Samir, K. B. (2013). A DWT method for image steganography. International Journal of Advanced Research in Computer Science and Software Engineering, 3, 983.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"34_CR38","doi-asserted-by":"crossref","unstructured":"Shi, S., Qi, Y., & Huang, Y. (2016, December). An approach to text steganography based on search in internet. In Computer Symposium (ICS), 2016 International (pp. 227\u2013232). IEEE.","DOI":"10.1109\/ICS.2016.0052"},{"key":"34_CR39","doi-asserted-by":"crossref","unstructured":"Kumar, R., Chandra, P., & Hanmandlu, M. (2013, December). Local directional pattern (LDP) based fingerprint matching using SLFNN. In 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013) (pp. 493\u2013498). IEEE.","DOI":"10.1109\/ICIIP.2013.6707640"},{"key":"34_CR40","unstructured":"Sinha, P., Rai, A. K., Jha, V. K., Bhushan, B. (2007, July) Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In International Conference on Signal Processing and Communication - ICSPC'17, Coimbatore, Tamil Nadu, India."},{"key":"34_CR41","unstructured":"Bennett, K. (2004). Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text."},{"key":"34_CR42","unstructured":"Al-Hamami, A. H., & Al-Shamkhy, R. A. Using natural features of letters in text information hiding."},{"issue":"2","key":"34_CR43","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/TIFS.2007.897255","volume":"2","author":"S Huang","year":"2007","unstructured":"Huang, S., & Wu, J. K. (2007). Optical watermarking for printed document authentication. IEEE Transactions on Information Forensics and Security, 2(2), 164\u2013173.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"34_CR44","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/TIFS.2006.890310","volume":"2","author":"TY Liu","year":"2007","unstructured":"Liu, T. Y., & Tsai, W. H. (2007). A new steganographic method for data hiding in Microsoft word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2(1), 24\u201330.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"34_CR45","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M. (2008, February). Text steganography by changing words spelling. In 10th International Conference on Advanced Communication Technology, 2008. ICACT 2008. (Vol. 3, pp. 1912\u20131913). IEEE.","DOI":"10.1109\/ICACT.2008.4494159"},{"key":"34_CR46","doi-asserted-by":"publisher","unstructured":"Gupta Banik, B., & Bandyopadhyay, S. K. (2018). Novel text steganography using natural language processing and part-of-speech tagging. IETE Journal of Research, 1\u201312. \nhttps:\/\/doi.org\/10.1080\/03772063.2018.1491807","DOI":"10.1080\/03772063.2018.1491807"},{"key":"34_CR47","unstructured":"Khairullah, M. (2018). A novel steganography method using transliteration of Bengali text. Journal of King Saud University - Computer and Information Sciences."},{"key":"34_CR48","doi-asserted-by":"crossref","unstructured":"Samphaiboon, N., & Dailey, M. N. (2008, May). Steganography in Thai text. In 5th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology, 2008. ECTI-CON 2008. (Vol. 1, pp. 133\u2013136). IEEE.","DOI":"10.1109\/ECTICON.2008.4600390"},{"key":"34_CR49","doi-asserted-by":"publisher","first-page":"436","DOI":"10.3923\/jas.2010.436.439","volume":"10","author":"AF Al-Azawi","year":"2010","unstructured":"Al-Azawi, A. F., & Fadhil, M. A. (2010). Arabic text steganography using kashida extensions with Huffman code. Journal of Applied Sciences, 10, 436\u2013439.","journal-title":"Journal of Applied Sciences"},{"issue":"4","key":"34_CR50","doi-asserted-by":"publisher","first-page":"889","DOI":"10.3923\/itj.2011.889.893","volume":"10","author":"B Yang","year":"2011","unstructured":"Yang, B., et al. (2011). Steganography in MS Excel document using text-rotation technique. Information Technology Journal, 10(4), 889\u2013893.","journal-title":"Information Technology Journal"},{"key":"34_CR51","unstructured":"Shirali-Shahreza, M. H., & Shirali-Shahreza, M. (2006, July). A new approach to Persian\/Arabic text steganography. In 5th IEEE\/ACIS International Conference on Computer and Information Science, 2006 and 2006 1st IEEE\/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse. ICIS-COMSAR 2006 (pp. 310\u2013315). IEEE."},{"key":"34_CR52","unstructured":"Gutub, A., & Fattani, M. (2007). A novel Arabic text steganography method using letter points and extensions."},{"key":"34_CR53","unstructured":"Chaudhary, S., Dave, M., Sanghi, A., & Sidh, H. (2018). Indian script encoding technique (ISET): A Hindi text steganography approach. In Information and Communication Technology for Sustainable Development (pp. 393\u2013401). Singapore: Springer."},{"key":"34_CR54","doi-asserted-by":"crossref","unstructured":"Yang, Z., Zhang, P., Jiang, M., Huang, Y., & Zhang, Y. J. (2018, June). RITS: Real-time interactive text steganography based on automatic dialogue model. In International Conference on Cloud Computing and Security (pp. 253\u2013264). Cham: Springer.","DOI":"10.1007\/978-3-030-00012-7_24"},{"key":"34_CR55","doi-asserted-by":"publisher","first-page":"65981","DOI":"10.1109\/ACCESS.2018.2866063","volume":"6","author":"MT Ahvanooey","year":"2018","unstructured":"Ahvanooey, M. T., Li, Q., Hou, J., Mazraeh, H. D., & Zhang, J. (2018). AITSteg: An innovative text steganography technique for hidden transmission of text message via social media. IEEE Access, 6, 65981.","journal-title":"IEEE Access"},{"key":"34_CR56","doi-asserted-by":"publisher","unstructured":"Fateh, M., & Rezvani, M. (2018). An email-based high capacity text steganography using repeating characters. International Journal of Computers and Applications, 1\u20137. \nhttps:\/\/doi.org\/10.1080\/1206212x.2018.1517713","DOI":"10.1080\/1206212x.2018.1517713"},{"issue":"2","key":"34_CR57","doi-asserted-by":"publisher","first-page":"773","DOI":"10.26483\/ijarcs.v9i2.5916","volume":"9","author":"B Bala","year":"2018","unstructured":"Bala, B., Kamboj, L., & Luthra, P. (2018). Secure file storage in cloud computing using hybrid cryptography algorithm. International Journal of Advanced Research in Computer Science, 9(2), 773.","journal-title":"International Journal of Advanced Research in Computer Science"},{"issue":"4","key":"34_CR58","first-page":"35","volume":"6","author":"A Walke","year":"2018","unstructured":"Walke, A., Bhanushali, J., Rajgor, A., & Jain, J. (2018). Enhanced password processing scheme using visual cryptography and steganography. International Journal on Recent and Innovation Trends in Computing and Communication, 6(4), 35\u201337.","journal-title":"International Journal on Recent and Innovation Trends in Computing and Communication"},{"key":"34_CR59","doi-asserted-by":"crossref","unstructured":"Baawi, S. S., Mokhtar, M. R., & Sulaiman, R. (2018, June). Enhancement of text steganography technique using Lempel-Ziv-Welch Algorithm and two-letter word technique. In International Conference of Reliable Information and Communication Technology (pp. 525\u2013537). Cham: Springer.","DOI":"10.1007\/978-3-319-99007-1_49"},{"issue":"10","key":"34_CR60","doi-asserted-by":"publisher","first-page":"7355","DOI":"10.1166\/asl.2018.12941","volume":"24","author":"R Din","year":"2018","unstructured":"Din, R., Utama, S., Hanizan, S. H., Hilal, M. M., Hanif, M. A., Zulhazlin, A., & Fazali, G. M. (2018). Evaluating the feature-based technique of text steganography based on capacity and time processing parameters. Advanced Science Letters, 24(10), 7355\u20137359.","journal-title":"Advanced Science Letters"},{"issue":"2","key":"34_CR61","first-page":"599","volume":"19","author":"Y Wu","year":"2018","unstructured":"Wu, Y., Chen, X., & Sun, X. (2018). Coverless steganography based on English texts using binary tags protocol. Journal of Internet Technology, 19(2), 599\u2013606.","journal-title":"Journal of Internet Technology"},{"issue":"4","key":"34_CR62","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1504\/IJICS.2018.095357","volume":"10","author":"M Azeem","year":"2018","unstructured":"Azeem, M., Yongquan, C., Ditta, A., Rana, K. G., & Rajpoot, F. A. (2018). Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters. International Journal of Information and Computer Security, 10(4), 437\u2013453.","journal-title":"International Journal of Information and Computer Security"},{"key":"34_CR63","doi-asserted-by":"crossref","unstructured":"Taha, A., Hammad, A. S., & Selim, M. M. (2018). A high capacity algorithm for information hiding in Arabic text. Journal of King Saud University-Computer and Information Sciences.","DOI":"10.1016\/j.jksuci.2018.07.007"},{"key":"34_CR64","doi-asserted-by":"crossref","unstructured":"Hu, H., Zuo, X., Zhang, W., & Yu, N. (2018, June). Covert communication by exploring statistical and linguistical distortion in text. In International Conference on Cloud Computing and Security (pp. 288\u2013301). Cham: Springer.","DOI":"10.1007\/978-3-030-00015-8_25"},{"issue":"4","key":"34_CR65","first-page":"59","volume":"8","author":"SD Kamat","year":"2018","unstructured":"Kamat, S. D., Patil, S. S., & Mali, A. S. (2018). Implementation of steganographic model using inverted LSB insertion. International Journal of Engineering and Management Research (IJEMR), 8(4), 59\u201362.","journal-title":"International Journal of Engineering and Management Research (IJEMR)"},{"key":"34_CR66","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.protcy.2013.12.343","volume":"10","author":"A Majumder","year":"2013","unstructured":"Majumder, A., & Changder, S. (2013). A novel approach for text steganography: Generating text summary using reflection symmetry. Procedia Technology, 10, 112\u2013120.","journal-title":"Procedia Technology"},{"key":"34_CR67","unstructured":"Kim, Y. W., Moon, K. A., & Oh, I. S. (2003, August). A text watermarking algorithm based on word classification and inter-word space statistics. In ICDAR (p. 775). IEEE."},{"key":"34_CR68","unstructured":"Niimi, M., Minewaki, S., Noda, H., & Kawaguchi, E. (2003, August). A framework of text-based steganography using SD-form semantics model. In Pacific Rim Workshop on Digital Steganography (pp. 3\u20134)."},{"issue":"3","key":"34_CR69","first-page":"232","volume":"4","author":"JA Memon","year":"2008","unstructured":"Memon, J. A., Khowaja, K., & Kazi, H. (2008). Evaluation of steganography for Urdu\/Arabic text. Journal of Theoretical and Applied Information Technology, 4(3), 232.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"1","key":"34_CR70","first-page":"17","volume":"4","author":"S Zhong","year":"2007","unstructured":"Zhong, S., Cheng, X., & Chen, T. (2007). Data hiding in a kind of PDF texts for secret communication. IJ Network Security, 4(1), 17\u201326.","journal-title":"IJ Network Security"},{"key":"34_CR71","doi-asserted-by":"crossref","unstructured":"Vill\u00e1n, R., Voloshynovskiy, S., Koval, O., Vila, J., Topak, E., Deguillaume, F., et al. (2006, February). Text data-hiding for digital and printed documents: Theoretical and practical considerations. In Security, Steganography, and Watermarking of Multimedia Contents VIII (Vol. 6072, p. 607212). International Society for Optics and Photonics.","DOI":"10.1117\/12.641957"},{"key":"34_CR72","unstructured":"Moerland, T. (2003, May 15). Steganography and steganalysis. Last visited May 1, 2009, from \nwww.liacs.nl\/home\/tmoerlan\/privtech.pdf"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:08:24Z","timestamp":1577794104000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_34","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}