{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:11:31Z","timestamp":1771330291814,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789811978661","type":"print"},{"value":"9789811978678","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-19-7867-8_11","type":"book-chapter","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T12:02:18Z","timestamp":1683288138000},"page":"123-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["TexIm: A Novel Text-to-Image Encoding Technique Using BERT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9191-1771","authenticated-orcid":false,"given":"Wazib","family":"Ansar","sequence":"first","affiliation":[]},{"given":"Saptarsi","family":"Goswami","sequence":"additional","affiliation":[]},{"given":"Amlan","family":"Chakrabarti","sequence":"additional","affiliation":[]},{"given":"Basabi","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,6]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Chowdhary, K.R.: Natural language processing. In: Fundamentals of Artificial Intelligence, pp. 603\u2013649. Springer, New Delhi (2020)","DOI":"10.1007\/978-81-322-3972-7_19"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Ainon, R.N.: Storing text using integer codes. In: Coling 1986 Volume 1: The 11th International Conference on Computational Linguistics (1986)","DOI":"10.3115\/991365.991487"},{"issue":"2\u20133","key":"11_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1080\/00437956.1954.11659520","volume":"10","author":"ZS Harris","year":"1954","unstructured":"Harris, Z.S.: Distributional structure. Word 10(2\u20133), 146\u2013162 (1954)","journal-title":"Word"},{"key":"11_CR4","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"11_CR5","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111\u20133119 (2013)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.: Glove: global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Melamud, O., Goldberger, J., Dagan, I.: Context2vec: learning generic context embedding with bidirectional LSTM. In: Proceedings of the 20th SIGNLL Conference on Computational Natural Language Learning, pp. 51\u201361 (2016)","DOI":"10.18653\/v1\/K16-1006"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Peters, M.E., Neumann, M., Iyyer, M., Gardner, M., Clark, C., Lee, K., Zettlemoyer, L.: Deep contextualized word representations. arXiv preprint arXiv:1802.05365 (2018)","DOI":"10.18653\/v1\/N18-1202"},{"key":"11_CR9","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"issue":"9","key":"11_CR10","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"DA Huffman","year":"1952","unstructured":"Huffman, D.A.: A method for the construction of minimum-redundancy codes. Proc. IRE 40(9), 1098\u20131101 (1952)","journal-title":"Proc. IRE"},{"key":"11_CR11","volume-title":"Data Compression Using Zopfli","author":"J Alakuijala","year":"2013","unstructured":"Alakuijala, J., Vandevenne, L.: Data Compression Using Zopfli. Tech. Rep, Google (2013)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Habib, A., Jahirul Islam, M., Rahman, M.S.: A dictionary-based text compression technique using quaternary code. Iran J. Comput. Sci. 3(3), 127\u2013136 (2020)","DOI":"10.1007\/s42044-019-00047-w"},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TIT.1977.1055714","volume":"23","author":"J Ziv","year":"1977","unstructured":"Ziv, J., Lempel, A.: A universal algorithm for sequential data compression. IEEE Trans. Inf. Theory 23(3), 337\u2013343 (1977)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"11_CR14","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TIT.1978.1055934","volume":"24","author":"J Ziv","year":"1978","unstructured":"Ziv, J., Lempel, A.: Compression of individual sequences via variable-rate coding. IEEE Trans. Inf. Theory 24(5), 530\u2013536 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"11_CR15","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1145\/361082.361086","volume":"17","author":"B Hahn","year":"1974","unstructured":"Hahn, B.: A new technique for compression and storage of data. Commun. ACM 17(8), 434\u2013436 (1974)","journal-title":"Commun. ACM"},{"issue":"16","key":"11_CR16","doi-asserted-by":"publisher","first-page":"22833","DOI":"10.1007\/s11042-019-7541-4","volume":"78","author":"J Zakraoui","year":"2019","unstructured":"Zakraoui, J., Saleh, M., Ja\u2019am, A.: Text-to-picture tools, systems, and approaches: a survey. Multimedia Tools Appl. 78(16), 22833\u201322859 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, pp. 1\u20137 (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"He, K., Kim, D.-S.: Malware detection with malware images using deep learning techniques. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE) (2019). https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2019.00022","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00022"},{"key":"11_CR19","unstructured":"Petrie, S.M., Julius, T.D.: Representing text as abstract images enables image classifiers to also simultaneously classify text. arXiv preprint arXiv:1908.07846 (2019)"},{"issue":"6","key":"11_CR20","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1109\/TNNLS.2020.3006531","volume":"32","author":"L Zhu","year":"2020","unstructured":"Zhu, L., Li, W., Shi, Y., Guo, K.: SentiVec: learning sentiment-context vector via kernel optimization function for sentiment analysis. IEEE Trans. Neural Networks Learn. Syst. 32(6), 2561\u20132572 (2020)","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Strubell, E., Ganesh, A., McCallum, A.: Energy and policy considerations for deep learning in NLP. arXiv preprint arXiv:1906.02243 (2019)","DOI":"10.18653\/v1\/P19-1355"},{"key":"11_CR22","unstructured":"Hu, W., Tan, Y.: Black-box attacks against RNN based malware detection algorithms. In: Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence (2018)"},{"key":"11_CR23","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, vol. 25 (2012)"},{"key":"11_CR24","first-page":"83","volume":"3","author":"J Plisson","year":"2004","unstructured":"Plisson, J., Lavrac, N., Mladenic, D.: A rule based approach to word lemmatization. Proc. IS 3, 83\u201386 (2004)","journal-title":"Proc. IS"},{"key":"11_CR25","unstructured":"Wu, Y., Schuster, M., Chen, Z., Le, Q.V., Norouzi, M., Macherey, W., Krikun, M., et al.: Google\u2019s neural machine translation system: bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144 (2016)"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Clark, N.R., Ma\u2019ayan, A.: Introduction to statistical methods to analyze large data sets: principal components analysis. Sci. Signal. 4(190) (2011)","DOI":"10.1126\/scisignal.2001967"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Patro, S., Sahu, K.K.: Normalization: a preprocessing stage. arXiv preprint arXiv:1503.06462 (2015)","DOI":"10.17148\/IARJSET.2015.2305"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Hore, A., Ziou, D.: Image quality metrics: PSNR versus SSIM. In: 2010 20th International Conference on Pattern Recognition, pp. 2366\u20132369. IEEE (2010)","DOI":"10.1109\/ICPR.2010.579"},{"issue":"4","key":"11_CR29","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"11_CR30","unstructured":"Kusner, M., Sun, Y., Kolkin, N., Weinberger, K.: From word embeddings to document distances. In: International Conference on Machine Learning, pp. 957\u2013966. PMLR (2015)"}],"container-title":["Lecture Notes in Networks and Systems","Computer Vision and Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-7867-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T12:04:48Z","timestamp":1683288288000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-7867-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789811978661","9789811978678"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-7867-8_11","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"6 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}