{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T23:40:02Z","timestamp":1741563602984,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642241772"},{"type":"electronic","value":"9783642241789"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24178-9_23","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T14:49:45Z","timestamp":1315406985000},"page":"329-341","source":"Crossref","is-referenced-by-count":2,"title":["LinL:Lost in n-best List"],"prefix":"10.1007","author":[{"given":"Peng","family":"Meng","sequence":"first","affiliation":[]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhili","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Abdelrahman","family":"Desoky","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/11558859_17","volume-title":"Information Hiding","author":"C. Grothoff","year":"2005","unstructured":"Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M.: Translation-based steganography. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 219\u2013233. Springer, Heidelberg (2005)"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1145\/1141277.1141358","volume-title":"Proceedings of the 2006 ACM Symposium on Applied Computing","author":"R. Stutsman","year":"2006","unstructured":"Stutsman, R., Atallah, M., Grothoff, K.: Lost in just the translation. In: Proceedings of the 2006 ACM symposium on Applied computing, ACM New York, NY, USA (2006) 338\u2013345"},{"issue":"3","key":"23_CR3","doi-asserted-by":"crossref","first-page":"269","DOI":"10.3233\/JCS-2009-0320","volume":"17","author":"C. Grothoff","year":"2009","unstructured":"Grothoff, C., Grothoff, K., Stutsman, R., Alkhutova, L., Atallah, M.: Translation-based steganography. Journal of Computer Security\u00a017(3), 269\u2013303 (2009)","journal-title":"Journal of Computer Security"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-16435-4_16","volume-title":"Information Hiding","author":"P. Meng","year":"2010","unstructured":"Meng, P., Hang, L., Chen, Z., Hu, Y., Yang, W.: STBS: A statistical algorithm for steganalysis of translation-based steganography. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol.\u00a06387, pp. 208\u2013220. Springer, Heidelberg (2010)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-18405-5_21","volume-title":"Digital Watermarking","author":"Z. Chen","year":"2011","unstructured":"Chen, Z., Huang, L., Meng, P., Yang, W., Miao, H.: Blind linguistic steganalysis against translation based steganography. In: Kim, H.-J., Shi, Y.Q., Barni, M. (eds.) IWDW 2010. LNCS, vol.\u00a06526, pp. 251\u2013265. Springer, Heidelberg (2011)"},{"key":"23_CR6","unstructured":"Google: Google translator (2009), http:\/\/translate.google.cn"},{"key":"23_CR7","unstructured":"Systran: Systran translator (2009), https:\/\/www.systransoft.com"},{"key":"23_CR8","unstructured":"Linguatec: Linguatec translation, http:\/\/www.linguatec.de"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Chen, B., Zhang, M., Aw, A., Li, H.: Exploiting n-best hypotheses for smt self-enhancement. In: Proceedings of the 46th Annual Meeting of the Association for Computational Linguistics on Human Language Technologies: Short Papers, Association for Computational Linguistics, pp. 157\u2013160 (2008)","DOI":"10.3115\/1557690.1557733"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Koehn, P., Hoang, H., Birch, A., Callison-Burch, C., Federico, M., Bertoldi, N., Cowan, B., Shen, W., Moran, C., Zens, R., et al.: Moses: Open source toolkit for statistical machine translation. In: Proceedings of the 45th Annual Meeting of the ACL on Interactive Poster and Demonstration Sessions, Association for Computational Linguistics (2007)","DOI":"10.3115\/1557769.1557821"},{"key":"23_CR11","unstructured":"Bennett, K.: Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Tech. Report (2004)"},{"key":"23_CR12","unstructured":"Maker, K.: TEXTO, ftp:\/\/ftp.funet.fi\/pub\/crypt\/steganography\/texto.tar.gz"},{"key":"23_CR13","volume-title":"Disappearing cryptography: information hiding: steganography and watermarking","author":"P. Wayner","year":"2008","unstructured":"Wayner, P.: Disappearing cryptography: information hiding: steganography and watermarking. Morgan Kaufmann Pub., San Francisco (2008)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Chapman, M., Davida, D.: Hiding the hidden: A software system for concealing ciphertext as innocuous text. Lecture Note. In: Computer Science, 335\u2013345 (1997)","DOI":"10.1007\/BFb0028489"},{"key":"23_CR15","unstructured":"Chang, C., Clark, S.: Linguistic steganography using automatically generated paraphrases. In: Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, Association for Computational Linguistics (2010)"},{"issue":"1","key":"23_CR16","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/TIFS.2006.890310","volume":"2","author":"T.Y. Liu","year":"2007","unstructured":"Liu, T.Y., Tsai, W.H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security\u00a02(1), 24\u201330 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"23_CR17","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1080\/15567280802558818","volume":"2","author":"A. Desoky","year":"2008","unstructured":"Desoky, A.: Nostega: a novel noiseless steganography paradigm. Journal of Digital Forensic Practice\u00a02(3), 132\u2013139 (2008)","journal-title":"Journal of Digital Forensic Practice"},{"issue":"4","key":"23_CR18","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s10207-009-0079-0","volume":"8","author":"A. Desoky","year":"2009","unstructured":"Desoky, A.: Listega: list-based steganography methodology. International Journal of Information Security\u00a08(4), 247\u2013261 (2009)","journal-title":"International Journal of Information Security"},{"issue":"3","key":"23_CR19","first-page":"145","volume":"1","author":"A. Desoky","year":"2010","unstructured":"Desoky, A.: NORMALS: normal linguistic steganography methodology. Journal of Information Hiding and Multimedia Signal Processing\u00a01(3), 145\u2013171 (2010)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"23_CR20","unstructured":"Desoky, A.: Matlist: mature linguistic steganography methodology. Security and Communication Networks"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Taskiran, C., Topkara, U., Topkara, M., Delp, E.: Attacks on lexical natural language steganography systems. In: Proceedings of SPIE, vol.\u00a06072, pp. 97\u2013105 (2006)","DOI":"10.1117\/12.649551"},{"key":"23_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-540-88961-8_16","volume-title":"Information Hiding","author":"C. Zhili","year":"2008","unstructured":"Zhili, C., Liusheng, H., Zhenshan, Y., Wei, Y., Lingjun, L., Xueling, Z., Xinxin, Z.: Linguistic steganography detection using statistical characteristics of correlations between words. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol.\u00a05284, pp. 224\u2013235. Springer, Heidelberg (2008)"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Zhili, C., Liusheng, H., Zhenshan, Y., Lingjun, L., Wei, Y.: A statistical algorithm for linguistic steganography detection based on distribution of words. In: Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 558\u2013563 (2008)","DOI":"10.1109\/ARES.2008.61"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Zhili, C., Liusheng, H., Zhenshan, Y., Xinxin, Z.: Effective linguistic steganography detection. In: IEEE 8th International Conference on Computer and Information Technology Workshops, CIT Workshops 2008, pp. 224\u2013229 (2008)","DOI":"10.1109\/CIT.2008.Workshops.69"},{"key":"23_CR25","first-page":"227","volume-title":"IEEE Youth Conference on Information, Computing and Telecommunication, YC-ICT 2009","author":"P. Meng","year":"2010","unstructured":"Meng, P., Hang, L., Yang, W., Chen, Z.: Attacks on translation based steganography. In: IEEE Youth Conference on Information, Computing and Telecommunication, YC-ICT 2009, pp. 227\u2013230. IEEE, Los Alamitos (2010)"},{"issue":"8","key":"23_CR26","first-page":"1748","volume":"38","author":"P. Meng","year":"2010","unstructured":"Meng, P., Hang, L., Chen, Z., Yang, W., Yang, M.: Analysis and detection of translation-based steganography. Chinese Journal of Electronics\u00a038(8), 1748\u20131752 (2010)","journal-title":"Chinese Journal of Electronics"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Koehn, P.: MOSES, Statistical Machine Translation System, User Manual and Code Guide (2010)","DOI":"10.1017\/CBO9780511815829"},{"issue":"2","key":"23_CR28","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1214\/aoms\/1177704568","volume":"33","author":"T. Anderson","year":"1962","unstructured":"Anderson, T., Bahadur, R.: Classification into two multivariate normal distributions with different covariance matrices. The Annals of Mathematical Statistics\u00a033(2), 420\u2013431 (1962)","journal-title":"The Annals of Mathematical Statistics"},{"key":"23_CR29","unstructured":"WMT08: Wmt08 news commentary (2008), http:\/\/www.statmt.org\/wmt08\/training-parallel.tar"},{"key":"23_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J. Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 310\u2013323. Springer, Heidelberg (2003)"},{"issue":"4","key":"23_CR31","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/TIFS.2006.885020","volume":"1","author":"U. Budhia","year":"2006","unstructured":"Budhia, U., Kundur, D., Zourntos, T.: Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Transactions on Information Forensics and Security\u00a01(4), 502\u2013516 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24178-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T23:26:05Z","timestamp":1741562765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24178-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642241772","9783642241789"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24178-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}