{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T03:06:31Z","timestamp":1775790391639,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319486703","type":"print"},{"value":"9783319486710","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_14","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T03:53:29Z","timestamp":1477886009000},"page":"145-155","source":"Crossref","is-referenced-by-count":14,"title":["Coverless Text Information Hiding Method Based on the Word Rank Map"],"prefix":"10.1007","author":[{"given":"Jianjun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jun","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Lucai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haijun","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/TIFS.2006.890310","volume":"2","author":"TY Liu","year":"2007","unstructured":"Liu, T.Y., Tsai, W.H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24\u201330 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"14_CR2","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1002\/j.1538-7305.1994.tb00612.x","volume":"73","author":"NF Maxemchuk","year":"1994","unstructured":"Maxemchuk, N.F., Liu, T.Y., Tsai, W.H.: Electronic document distribution. AT&T Tech. J. 73(5), 73\u201380 (1994)","journal-title":"AT&T Tech. J."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Low, S.H., Maxemchuk, N.F., Brassil, J.T.: Document marking and identification using both line and word shifting. In: Proceedings of Infocom 1995, vol. 2007, pp. 853\u2013860. IEEE (1995)","DOI":"10.1109\/INFCOM.1995.515956"},{"issue":"8","key":"14_CR4","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1109\/49.464718","volume":"13","author":"JT Brassil","year":"1995","unstructured":"Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495\u20131504 (1995)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"14_CR5","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/26.662643","volume":"46","author":"SH Low","year":"1998","unstructured":"Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372\u2013383 (1998)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"14_CR6","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/49.668978","volume":"16","author":"SH Low","year":"1998","unstructured":"Low, S.H., Maxemchuk, N.F.: Performance comparison of two text marking methods. IEEE J. Sel. Areas Commun. 16(4), 561\u2013572 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. In: Proceedings of the IEEE, vol. 87, pp. 1181\u20131196 (1999)","DOI":"10.1109\/5.771071"},{"issue":"12","key":"14_CR8","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1109\/76.974678","volume":"11","author":"D Huang","year":"2001","unstructured":"Huang, D., Yan, H.: Inter word distance changes represented by sine waves for watermarking text images. IEEE Trans. Circ. Syst. 11(12), 1237\u20131245 (2001)","journal-title":"IEEE Trans. Circ. Syst."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Adnan, M.A., Osama, M.A.: Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In: Proceedings of the SPIE, pp. 685\u2013695 (2004)","DOI":"10.1117\/12.527147"},{"key":"14_CR10","unstructured":"Kim, Y.W., Moon, K.A., Oh I.S.: A text watermarking algorithm based on word classification and inter word space statistics. In: Proceedings of Seventh International Conference on Document Analysis and Recognition, pp. 775\u2013779 (2003)"},{"key":"14_CR11","unstructured":"Xie, L., Huang, H., Qin, J.: A Text similarity detection algorithm based on components interconnected graph. In: Proceedings of 2015 China Information Hiding and Multimedia Security Workshop (CIHW2015), pp. 251\u2013260 (2015)"},{"issue":"6","key":"14_CR12","first-page":"735","volume":"7","author":"LY Por","year":"2008","unstructured":"Por, L.Y., Ang, T.F., Delina, B.: WhiteSteg: a new Scheme in information hiding using text steganography. WSEAS Trans. Comput. 7(6), 735\u2013745 (2008)","journal-title":"WSEAS Trans. Comput."},{"issue":"2","key":"14_CR13","first-page":"141","volume":"6","author":"IS Lee","year":"2008","unstructured":"Lee, I.S., Tsai, W.H.: Secret communication through web pages using special space codes in HTML files. Int. J. Appl. Sci. Eng. 6(2), 141\u2013149 (2008)","journal-title":"Int. J. Appl. Sci. Eng."},{"issue":"34","key":"14_CR14","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. IBM Syst. J. 35(34), 313\u2013336 (1996)","journal-title":"IBM Syst. J."},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1007\/11553939_146","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"O Takizawa","year":"2005","unstructured":"Takizawa, O., Makino, K., Matsumoto, T., Nakagawa, H., Murase, I.: Method of hiding information in agglutinative language documents using adjustment to new line positions. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1039\u20131048. Springer, Heidelberg (2005)"},{"issue":"4","key":"14_CR16","first-page":"888","volume":"2","author":"A Koluguri","year":"2014","unstructured":"Koluguri, A., Gouse, S., Reddy, P.B.: Text steganography methods and its tools. Int. J. Adv. Sci. Tech. Res. 2(4), 888\u2013902 (2014)","journal-title":"Int. J. Adv. Sci. Tech. Res."},{"issue":"6","key":"14_CR17","first-page":"14","volume":"1","author":"L Goyal","year":"2014","unstructured":"Goyal, L., Raman, M., Diwan, P.: A robust method for integrity protection of digital data in text document watermarking. Int. J. Sci. Res. Dev. 1(6), 14\u201318 (2014)","journal-title":"Int. J. Sci. Res. Dev."},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Sui, X.G., Luo, H.: A steganalysis method based on the distribution of space characters. In: Proceedings of IEEE International Conference on Communications, Circuits and Systems, vol. 1, pp. 54\u201356. IEEE (2006)","DOI":"10.1109\/ICCCAS.2006.284584"},{"issue":"6","key":"14_CR19","first-page":"181","volume":"32","author":"G Luo","year":"2005","unstructured":"Luo, G., Sun, X., Liu, Y.: A text hiding information detection algorithm based on noise detecting. J. Hunan Univ. (Nat. Sci.) 32(6), 181\u2013184 (2005)","journal-title":"J. Hunan Univ. (Nat. Sci.)"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Kwon, H., Kim, Y., Lee, S.: A tool for the detection of hidden data in microsoft compound document file format. In: Proceedings of International Conference on Information Science and Security (ICISS), pp. 141\u2013146 (2008)","DOI":"10.1109\/ICISS.2008.19"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Wu, M., Tang, E., Liu, B.: Data hiding in digital binary image. In: Proceedings of IEEE International Conference on Multimedia and Expo, pp. 393\u2013396 (2000)","DOI":"10.1109\/ICME.2000.869623"},{"issue":"4","key":"14_CR22","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1109\/TMM.2004.830814","volume":"6","author":"M Wu","year":"2004","unstructured":"Wu, M., Liu, B.: Data hiding in binary images for authentication and annotation. IEEE Trans. Multimedia 6(4), 528\u2013538 (2004)","journal-title":"IEEE Trans. Multimedia"},{"key":"14_CR23","unstructured":"Zhao, J., Koch, E.: Embedding robust labels into images for copyright protection. In: Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, pp. 242\u2013251 (1995)"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Mei, Q., Wong, E.K., Memon, N.: Data hiding in binary text documents. In: Proceedings of International Society for Optics and Photonics, pp. 369\u2013375 (2001)","DOI":"10.1117\/12.435420"},{"issue":"10","key":"14_CR25","first-page":"183","volume":"29","author":"W Qi","year":"2008","unstructured":"Qi, W., Li, X., Yang, B., Cheng, D.: Document watermarking scheme for information tracking. J. Commun. 29(10), 183\u2013190 (2008)","journal-title":"J. Commun."},{"issue":"3","key":"14_CR26","first-page":"521","volume":"16","author":"H Wang","year":"2004","unstructured":"Wang, H., Li, R.: A binary text digital watermarking algorithm. J. Syst. Simul.16(3), 521\u2013524 (2004)","journal-title":"J. Syst. Simul."},{"key":"14_CR27","volume-title":"Steganography of Telecommunication Information","author":"S Bo","year":"2005","unstructured":"Bo, S., Hu, Z., Wu, L., Zhou, H.: Steganography of Telecommunication Information. National Defense University, Beijing (2005)"},{"issue":"4","key":"14_CR28","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/s10772-013-9192-6","volume":"16","author":"MA Nematollahi","year":"2013","unstructured":"Nematollahi, M.A., Al-Haddad, S.A.R.: An overview of digital speech watermarking. Int. J. Speech Technol. 16(4), 471\u2013488 (2013)","journal-title":"Int. J. Speech Technol."},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Mali, M.L., Patil, N.N., Patil, J.B.: Implementation of text watermarking technique using natural language. In: Proceedings of IEEE International Conference on Communication Systems and Network Technologies, 482\u2013486 (2013)","DOI":"10.1109\/CSNT.2013.106"},{"key":"14_CR30","unstructured":"Meng, P., Huang, L., Chen, Z., Yang, W., Yang, M.: Analysis and detection of translation based steganography. Acta Electronica Sinica 38(8), 1748\u20131852 (2012)"},{"key":"14_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-27051-7_12","volume-title":"Cloud Computing and Security","author":"X Chen","year":"2015","unstructured":"Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Aixiang, Z., et al. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133\u2013143. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-27051-7_12"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T22:37:12Z","timestamp":1749681432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}