{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:10:48Z","timestamp":1750911048140,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811064265"},{"type":"electronic","value":"9789811064272"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6427-2_44","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T10:32:16Z","timestamp":1506162736000},"page":"552-566","source":"Crossref","is-referenced-by-count":2,"title":["Number System Oriented Text Steganography in Various Language for Short Messages"],"prefix":"10.1007","author":[{"given":"Santanu","family":"Koley","sequence":"first","affiliation":[]},{"given":"Kunal Kumar","family":"Mandal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"44_CR1","unstructured":"Detailed about this statistic\/trend. http:\/\/www.grabstats.com\/statmain.aspx?StatID=402 . Accessed Mar 2017"},{"key":"44_CR2","unstructured":"Messenger and WhatsApp process 60\u00a0billion messages a day, three times more than SMS. http:\/\/www.theverge.com\/2016\/4\/12\/11415198\/facebook-messenger-whatsapp-number-messages-vs-sms-f8-2016 . Accessed Mar 2017"},{"issue":"3","key":"44_CR3","first-page":"23","volume":"38","author":"A Jagetiya","year":"2014","unstructured":"Jagetiya, A., Rama Krishna, C.: Digital image steganography \u201cseeing is always not believing\u201d research front. CSI Commun. 38(3), 23\u201326 (2014)","journal-title":"CSI Commun."},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Chandramouli, R., Memon, N.: Analysis of LSB based image Steganography techniques. In: Proceedings of the International Conference on Image Processing, 7\u201310 October, vol. 3, pp. 1019\u20131022 (2001)","DOI":"10.1109\/ICIP.2001.958299"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Kumar, R., Malik, A., Singh, S., Kumar, B., Chand, S.:A space based reversible high capacity text steganography scheme using font type and style. In: ICCCA, 29\u201330 April 2016. IEEE (2016)","DOI":"10.1109\/CCAA.2016.7813878"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Sharma, S., Gupta, A., Trivedi, M.C., Yadav, V.K.: Analysis of different text steganography techniques: a survey. In: Computational Intelligence and Communication Technology (CICT), 12\u201313 February 2016. IEEE (2016)","DOI":"10.1109\/CICT.2016.34"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Gupta, S., Jain, R.: An innovative method of text steganography. In: Image Information Processing (ICIIP), 21\u201324 December 2015. IEEE (2015)","DOI":"10.1109\/ICIIP.2015.7414741"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Shi, S., Qi, Y., Huang, Y.: An approach to text steganography based on search in internet. In: International Computer Symposium (ICS), 15\u201317 December 2016","DOI":"10.1109\/ICS.2016.0052"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Chen, T.S.C., Cheng, M.W.: A new data hiding scheme in binary image. In: Proceedings of the Fifth International Symposium on Multimedia Software Engineering, pp. 88\u201393 (2003)","DOI":"10.1109\/MMSE.2003.1254426"},{"key":"44_CR10","unstructured":"Judge, J.C.: Steganography: past, present, future, SANS white paper. http:\/\/www.sans.org\/rr\/papers\/index.php?id=552 . Accessed Mar 2017"},{"issue":"7","key":"44_CR11","first-page":"955","volume":"4","author":"M Shirali Shahreza","year":"2005","unstructured":"Shirali Shahreza, M.: An improved method for steganography on mobile phone. WSEAS Trans. Syst. 4(7), 955\u2013957 (2005)","journal-title":"WSEAS Trans. Syst."},{"issue":"4","key":"44_CR12","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S0923-5965(02)00144-3","volume":"18","author":"G Do\u00ebrr","year":"2003","unstructured":"Do\u00ebrr, G., Dugelay, J.L.: A guide tour of video watermarking. Sig. Process. Image Commun. 18(4), 263\u2013282 (2003)","journal-title":"Sig. Process. Image Commun."},{"issue":"10","key":"44_CR13","doi-asserted-by":"publisher","first-page":"2955","DOI":"10.1109\/TSP.2004.833867","volume":"52","author":"G Do\u00ebrr","year":"2004","unstructured":"Do\u00ebrr, G., Dugelay, J.L.: Security pitfalls of frame by frame approaches to video watermarking. IEEE Trans. Sig. Process. Suppl. Secur. Media 52(10), 2955\u20132964 (2004)","journal-title":"IEEE Trans. Sig. Process. Suppl. Secur. Media"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Gopalan, K.: Audio steganography using bit modification. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2003, 6\u201310 April 2003, vol. 2, pp. 421\u2013424 (2003)","DOI":"10.1109\/ICASSP.2003.1202390"},{"issue":"8","key":"44_CR15","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/49.464718","volume":"13","author":"JT Brassil","year":"1995","unstructured":"Brassil, J.T., Low, S., Maxemchuk, N.F., O\u2019Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495\u20131504 (1995)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3&4","key":"44_CR16","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3&4), 313\u2013336 (1996)","journal-title":"IBM Syst. J."},{"issue":"3","key":"44_CR17","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek- an introduction to steganography. IEEE Secur. Priv. 1(3), 32\u201344 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"44_CR18","unstructured":"Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Purdue University, CERIAS Technical report (2004-13)"},{"key":"44_CR19","unstructured":"Moerland, T.: Steganography and Steganalysis. www.liacs.nl\/home\/tmoerlan\/privtech.pdf . Accessed Mar 2017"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Low, S.H., Maxemchuk, N.F., Brassil, J.T., O\u2019Gorman, L.: Document marking and identification using both line and word shifting. In: Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1995, vol. 2, pp. 853\u2013860, 2\u20136 April 1995","DOI":"10.1109\/INFCOM.1995.515956"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Mandal, K.K., Jana, A., Agarwal, V.: A new approach of text Steganography based on mathematical model of number system. In: Circuit, Power and Computing Technologies (ICCPCT), pp. 1737\u20131741, 20\u201321 March 2014. IEEE (2014)","DOI":"10.1109\/ICCPCT.2014.7054849"},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"Koley, S., Mandal, K.K.: A novel approach of secret message passing through text steganography. In: International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES \u2013 2016, 3\u20135 October 2016, pp. 21\u201326 (2016). Issue \u2013 III, 978-1-5090-4620-1\/16\/$31.00 \u00a92016 IEEE, ISBN CPF16H12-PRT\/978-1-5090-4619-5","DOI":"10.1109\/SCOPES.2016.7955624"},{"key":"44_CR23","doi-asserted-by":"crossref","unstructured":"Mandal, K.K.,Koley, S., Dhar, S.: A mathematical model for secret message passing using Steganography. In: Computational Intelligence and Computing Research (ICCIC), pp. 1\u20136, 15\u201317 December 2016. IEEE","DOI":"10.1109\/ICCIC.2016.7919527"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6427-2_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T21:42:44Z","timestamp":1750887764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6427-2_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064265","9789811064272"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6427-2_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}