{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:10Z","timestamp":1773511090884,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642036873","type":"print"},{"value":"9783642036880","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_16","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T11:03:43Z","timestamp":1250507023000},"page":"162-169","source":"Crossref","is-referenced-by-count":4,"title":["Hiding Information by Context-Based Synonym Substitution"],"prefix":"10.1007","author":[{"given":"Xueling","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhili","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhenshan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Bennett, K.: Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Tech. Report, 13:2004 (2004)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-540-30114-1_13","volume-title":"Information Hiding","author":"I.A. Bolshakov","year":"2004","unstructured":"Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 180\u2013191. Springer, Heidelberg (2004)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45439-X_11","volume-title":"Information Security","author":"M. Chapman","year":"2001","unstructured":"Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 156\u2013165. Springer, Heidelberg (2001)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-24624-4_10","volume-title":"Digital Watermarking","author":"Y.L. Chiang","year":"2004","unstructured":"Chiang, Y.L., Chang, L.P., Hsieh, W.T., Chen, W.C.: Natural language watermarking using semantic substitution for chinese text. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol.\u00a02939, pp. 129\u2013140. Springer, Heidelberg (2004)"},{"key":"16_CR5","unstructured":"Sougou\u00a0Labs. SogouR, http:\/\/www.sogou.com\/labs\/dl\/r.html"},{"key":"16_CR6","unstructured":"Hui, W.: The statistical study of Chinese vocabulary. Date of publication unknown from the online source, http:\/\/www.huayuqiao.org\/articles\/wanghui\/wanghui06 (doc. Last checked: 2005-06-20)"},{"key":"16_CR7","unstructured":"HIT\u00a0IR Lab. Chilin-Thesaurus of Chinese Words"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Low, S.H., Maxemchuk, N.F., Brassil, J.T., O\u2019Gorman, L.: Document marking and identification using both line and wordshifting. In: IEEE INFOCOM 1995. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Bringing Information to People. Proceedings, pp. 853\u2013860 (1995)","DOI":"10.1109\/INFCOM.1995.515956"},{"issue":"11","key":"16_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"G.A. Miller","year":"1995","unstructured":"Miller, G.A.: WordNet: a lexical database for English. Communications of the ACM\u00a038(11), 39\u201341 (1995)","journal-title":"Communications of the ACM"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Topkara, M., Taskiran, C.M., Delp III, E.J., et al.: Natural language watermarking. In: Proc. SPIE, vol.\u00a05681, pp. 441\u2013452 (2005)","DOI":"10.1117\/12.593790"},{"key":"16_CR11","volume-title":"Disappearing cryptography: information hiding: steganography & watermarking","author":"P. Wayner","year":"2002","unstructured":"Wayner, P.: Disappearing cryptography: information hiding: steganography & watermarking. Morgan Kaufmann, San Francisco (2002)"},{"key":"16_CR12","unstructured":"Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Yuling, L., Xingming, S., Can, G., Hong, W.: An Efficient Linguistic Steganography for Chinese Text. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 2094\u20132097 (2007)","DOI":"10.1109\/ICME.2007.4285095"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, H.P., Yu, H.K., Xiong, D.Y., Liu, Q.: HHMM-based Chinese lexical analyzer ICTCLAS. In: Proceedings of Second SIGHAN Workshop on Chinese Language Processing, pp. 184\u2013187 (2003)","DOI":"10.3115\/1119250.1119280"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T19:30:21Z","timestamp":1739302221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}