{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T18:45:09Z","timestamp":1747853109138,"version":"3.37.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,4,11]],"date-time":"2009-04-11T00:00:00Z","timestamp":1239408000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1007\/s10207-009-0079-0","type":"journal-article","created":{"date-parts":[[2009,4,10]],"date-time":"2009-04-10T07:16:43Z","timestamp":1239347803000},"page":"247-261","source":"Crossref","is-referenced-by-count":25,"title":["Listega: list-based steganography methodology"],"prefix":"10.1007","volume":"8","author":[{"given":"Abdelrahman","family":"Desoky","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,4,11]]},"reference":[{"key":"79_CR1","doi-asserted-by":"crossref","unstructured":"Kipper, G.: Investigator\u2019s Guide to Steganography, pp. 15\u201316. CRC Press LLC, Boca Raton (2004)","DOI":"10.1201\/9780203504765"},{"key":"79_CR2","unstructured":"Davern, P., Scott, M.: Steganography its history and its application to computer based data files. Internal Report Working Paper: CA-0795. School of Computing, Dublin City University. http:\/\/computing.dcu.ie\/research\/papers\/1995\/0795.pdf (1995). Accessed 3 Aug 2006"},{"key":"79_CR3","first-page":"43","volume-title":"Information Hiding","author":"N.F. Johnson","year":"1999","unstructured":"Johnson N.F., Katzenbeisser S.: A survey of steganographic techniques. In: Katzenbeisser, S., Petitcolas, F.(eds) Information Hiding, pp. 43\u201378. Artech House, Norwood (1999)"},{"key":"79_CR4","unstructured":"Kessler, G.C.: An Overview of Steganography for the Computer Forensics Examiner. An edited version, issue of Forensic Science Communications. Technical Report, 6, No. 3 (2004)"},{"issue":"12","key":"79_CR5","doi-asserted-by":"crossref","first-page":"2040","DOI":"10.1109\/TIP.2005.859370","volume":"14","author":"A. Martin","year":"2005","unstructured":"Martin A., Sapiro G., Seroussi G.: Is image steganography natural? IEEE Trans. Image Process. 14(12), 2040\u20132050 (2005)","journal-title":"Image Process."},{"issue":"1","key":"79_CR6","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1080\/15567280701797087","volume":"2","author":"A. Desoky","year":"2008","unstructured":"Desoky A.: Graphstega: graph steganography methodology. J. Digit. Forensic Pract. 2(1), 27\u201336 (2008). doi: 10.1080\/15567280701797087","journal-title":"J. Digit. Forensic Pract."},{"key":"79_CR7","unstructured":"Desoky, A., Younis, M.: PSM: Public Steganography Methodology. Technical Report TR-CS-06\u201307, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County (2006)"},{"key":"79_CR8","doi-asserted-by":"crossref","unstructured":"Petitcolas, F.A.P.: Information hiding\u2014a survey. In: Anderson, R.J., Kuhn, M.G. (eds.) Proceedings of the IEEE, vol. 87(7), pp. 1062\u20131078 (1999)","DOI":"10.1109\/5.771065"},{"key":"79_CR9","unstructured":"Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. Technical Report CERIAS Tech Report 2004\u201313, Purdue University (2004)"},{"key":"79_CR10","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new approach to Persian\/Arabic text steganography. In: The Proceedings of 5th IEEE\/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 2006), 10\u201312 July, pp. 310\u2013315. Honolulu, Hawaii (2006)","DOI":"10.1109\/ICIS-COMSAR.2006.10"},{"key":"79_CR11","doi-asserted-by":"crossref","unstructured":"Anderson, R.J., Needham, R., Shamir, A.: The steganographic file system. In: Proceedings of the Second International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525, pp. 73\u201382. Springer, Berlin (1998)","DOI":"10.1007\/3-540-49380-8_6"},{"key":"79_CR12","unstructured":"ScramDisk: Free Hard Drive Encryption For Windows 95 & 98. http:\/\/www.scramdisk.clara.net . Accessed 3 Aug 2008"},{"key":"79_CR13","doi-asserted-by":"crossref","unstructured":"Handel, T.G., Sandford, M.T.: Data hiding in the OSI network model. In: Information Hiding: First International Workshop, Proceedings. Lecture Notes in Computer Science, vol. 1174, pp. 23\u201338. Springer, Berlin (1996)","DOI":"10.1007\/3-540-61996-8_29"},{"key":"79_CR14","unstructured":"Kahn, D.: The Codebreakers: The Story of Secret Writing. Revised edition. Scribner, New York (1996)"},{"key":"79_CR15","doi-asserted-by":"crossref","unstructured":"Wayner, P.: Mimic functions. Cryptologia XVI(3), 193\u2013214 (1992). doi: 10.1080\/0161-119291866883","DOI":"10.1080\/0161-119291866883"},{"key":"79_CR16","doi-asserted-by":"crossref","unstructured":"Wayner, P.: Disappearing Cryptography, 2nd edn, pp. 81\u2013128. Morgan Kaufmann, Menlo Park (2002)","DOI":"10.1016\/B978-155860769-9\/50033-0"},{"key":"79_CR17","doi-asserted-by":"crossref","unstructured":"Chapman, M., Davida, G.: Hiding the hidden: a software system for concealing ciphertext as innocuous text. In: The Proceedings of the International Conference on Information and Communications Security. Lecture Notes in Computer Science, vol. 1334, pp. 335\u2013345. Springer, Beijing (1997)","DOI":"10.1007\/BFb0028489"},{"key":"79_CR18","unstructured":"Chapman, M., Davida, G.I.: Nicetext System Official Home Page. http:\/\/www.nicetext.com . Accessed 3 Aug 2007"},{"key":"79_CR19","doi-asserted-by":"crossref","unstructured":"Chapman, M. et\u00a0al.: A practical and effective approach to large-scale automated linguistic steganography. In: Proceedings of the Information Security Conference (ISC\u201901), pp. 156\u2013165. Lecture Notes in Computer Science, vol. 2200. Springer, Malaga (2001)","DOI":"10.1007\/3-540-45439-X_11"},{"key":"79_CR20","doi-asserted-by":"crossref","unstructured":"Chapman, M., Davida, G.I.: Plausible deniability using automated linguistic steganography. In: Davida, G., Frankel, Y. (eds.) International Conference on Infrastructure Security (InfraSec\u201902). Lecture Notes in Computer Science, vol. 2437, pp. 276\u2013287. Springer, Berlin (2002)","DOI":"10.1007\/3-540-45831-X_19"},{"key":"79_CR21","unstructured":"Grothoff, C. et\u00a0al.: Translation-based steganography. Technical Report CSD TR# 05-009, Purdue University (CERIAS Tech Report 2005-39) (2005)"},{"key":"79_CR22","doi-asserted-by":"crossref","unstructured":"Grothoff, C. et\u00a0al.: Translation-based steganography. In: Proceedings of Information Hiding Workshop (IH 2005), pp. 213\u2013233. Springer, Barcelona (2005)","DOI":"10.1007\/11558859_17"},{"key":"79_CR23","doi-asserted-by":"crossref","unstructured":"Stutsman, R. et\u00a0al.: Lost in just the translation. In: Proceedings of the 21st Annual ACM Symposium on Applied Computing (SAC\u201906). Dijon, France (2006)","DOI":"10.1145\/1141277.1141358"},{"key":"79_CR24","doi-asserted-by":"crossref","unstructured":"Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents (2007)","DOI":"10.1117\/12.706980"},{"key":"79_CR25","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M. et\u00a0al.: Text steganography in SMS. In: International Conference on Convergence Information Technology, Issue 21\u201323, pp. 2260\u20132265 (2007)","DOI":"10.1109\/ICCIT.2007.100"},{"key":"79_CR26","unstructured":"Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash. January 1999. Secondary education at the Illinois Mathematics and Science Academy. http:\/\/alumni.imsa.edu\/~keithw\/tlex\/lsteg.ps . Accessed 15 April 2008"},{"key":"79_CR27","unstructured":"Winstein, K.: Lexical steganography. http:\/\/alumni.imsa.edu\/~keithw\/tlex . Accessed 3 Aug 2008"},{"key":"79_CR28","doi-asserted-by":"crossref","unstructured":"Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) Information Hiding: 6th International Workshop. Lecture Notes in Computer Science, vol. 3200, pp. 180\u2013191. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-30114-1_13"},{"key":"79_CR29","doi-asserted-by":"crossref","unstructured":"Bolshakov, I.A., Gelbukh, A.: Synonymous paraphrasing using wordnet and internet. In: Meziane, F., Metais, E. (eds.) Natural Language Processing and Information Systems: 9th International Conference on Applications of Natural Language to Information Systems, NLDB 2004. Lecture Notes in Computer Science, vol. 3136, pp. 312\u2013323. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-27779-8_27"},{"key":"79_CR30","unstructured":"Calvo, H., Bolshakov, I.A.: Using selectional preferences for extending a synonymous paraphrasing method in steganography. In: Sossa Azuela, J.H. (ed.) Avances en Ciencias de la Computacion e Ingenieria de Computo\u2014CIC\u20192004: XIII Congreso Internacional de Computacion, pp. 231\u2013242 (2004)"},{"key":"79_CR31","doi-asserted-by":"crossref","unstructured":"Chand, V., Orgun, C.O.: Exploiting linguistic features in lexical steganography: design and proof-of-concept implementation. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS\u201906), vol. 6, p. 126b. IEEE, New York (2006)","DOI":"10.1109\/HICSS.2006.175"},{"key":"79_CR32","unstructured":"Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., Murase, I.: Text information hiding with preserved meaning\u2014a case for japanese documents. IPSJ Trans. 42(9):2339\u20132350 (2001). Originally published in Japanese. A similar paper By the first author in English. http:\/\/www.r.dl.itc.u-tokyo.ac.jp\/nakagawa\/academic-res\/finpri02.pdf . Accessed 4 June 2008"},{"key":"79_CR33","unstructured":"Niimi, M., Minewaki, S., Noda, H., Kawaguchi, E.: A framework of text-based steganography using sd-form semantics model. IPSJ J. 44(8) (2003). http:\/\/www.know.comp.kyutech.ac.jp\/STEG03\/STEG03-PAPERS\/papers\/12-Niimi.pdf . Accessed 3 June 2008"},{"key":"79_CR34","doi-asserted-by":"crossref","unstructured":"Bergmair, R., Katzenbeisser, S.: Content-aware steganography: about lazy prisoners and narrow-minded wardens. In: Proceedings of the 8th Information Hiding Workshop. Lecture Notes in Computer Science, vol. 4437, pp. 109\u2013123. Springer, Berlin (2007) (in print)","DOI":"10.1007\/978-3-540-74124-4_8"},{"key":"79_CR35","unstructured":"Bergmair, R.: Towards linguistic steganography: a systematic investigation of approaches, systems, and issues. final year project, The University of Derby (2004)"},{"key":"79_CR36","doi-asserted-by":"crossref","unstructured":"Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Proceedings of the 7th Information Security Conference (ISC\u201904). Lecture Notes in Computer Science. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-30144-8_22"},{"key":"79_CR37","doi-asserted-by":"crossref","unstructured":"Topkara, U., Topkara, M., Atallah, M.J.: The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In: MM&Sec\u201906: Proceeding of the 8th Workshop on Multimedia and Security, pp. 164\u2013174. ACM Press, New York (2006)","DOI":"10.1145\/1161366.1161397"},{"key":"79_CR38","doi-asserted-by":"crossref","unstructured":"Murphy, B., Vogel, C.: The syntax of concealment: reliable methods for plain text information hiding. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents (2007)","DOI":"10.1117\/12.713357"},{"key":"79_CR39","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) Information Hiding: Fourth International Workshop. Lecture Notes in Computer Science, vol. 2137, pp. 185\u2013199. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45496-9_14"},{"key":"79_CR40","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Raskin, V., Hempelmann, C.F., Topkara, M., Sion, R., Topkara, U., Triezenberg, K.E.: Natural language watermarking and tamperproofing. In: Petitcolas, F.A.P. (ed.) Information Hiding: Fifth International Workshop. Lecture Notes in Computer Science, vol. 2578, pp. 196\u2013212. Springer, Berlin (2002)","DOI":"10.1007\/3-540-36415-3_13"},{"key":"79_CR41","doi-asserted-by":"crossref","unstructured":"Desoky, A.: Nostega: noiseless steganography paradigm. J. Digit. Forensic Pract. (in press)","DOI":"10.1080\/15567280802558818"},{"key":"79_CR42","doi-asserted-by":"crossref","unstructured":"Desoky, A. et\u00a0al.: Auto-summarization-based steganography. In: The Proceedings of the 5th IEEE International Conference on Innovations in Information Technology, Al-Ain, UAE (2008) (in press)","DOI":"10.1109\/INNOVATIONS.2008.4781634"},{"key":"79_CR43","doi-asserted-by":"crossref","unstructured":"Cvejic, N., Seppanen, T.: Increasing robustness of LSB audio steganography using a novel embedding method. In: The Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC\u201904), pp. 533\u2013537, Las Vegas, Nevada (2004)","DOI":"10.1109\/ITCC.2004.1286709"},{"key":"79_CR44","doi-asserted-by":"crossref","unstructured":"Cvejic, N., Seppanen, T.: Reduced distortion bit-modification for LSB audio steganography. In:\u201904. 2004 in the Proceedings of the 7th International Conference on Signal Processing (ICSP 04), vol. 3, pp. 2318\u20132321, Beijing, China (2004)","DOI":"10.1109\/ICOSP.2004.1442244"},{"issue":"3, 4","key":"79_CR45","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender W. et\u00a0al.: Techniques for data hiding. IBM Systems J. 35(3, 4), 313\u2013336 (1996)","journal-title":"IBM Systems J."},{"key":"79_CR46","doi-asserted-by":"crossref","unstructured":"Kirovski, D., Malvar, H.: Spread-spectrum audio watermarking: requirements, applications, and limitations. In: The Proceedings of the 4th IEEE Workshop on Multimedia Signal Processing, pp. 219\u2013224. Cannes, France (2001)","DOI":"10.1109\/MMSP.2001.962737"},{"key":"79_CR47","doi-asserted-by":"crossref","unstructured":"Ansari, R., Malik, H., Khokhar, A.: Data-hiding in audio using frequency-selective phase alteration. In: The Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP\u201904), 17\u201321 May, vol. 5, pp. 389\u201392 (2004)","DOI":"10.1109\/ICASSP.2004.1327129"},{"key":"79_CR48","doi-asserted-by":"crossref","unstructured":"Gruhl, D., Lu, A., Bender, W.: Echo hiding. In: The Proceedings of First International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1174, pp. 295\u2013316, Cambridge, UK. Springer, Berlin (1996)","DOI":"10.1007\/3-540-61996-8_48"},{"key":"79_CR49","unstructured":"Desoky, A., Younis, M.: Chestega: chess steganography methodology. J. Secur. Commun. Netw. (in press)"},{"key":"79_CR50","unstructured":"Laywine, C.F., Mullen, G.L.: Discrete Mathematics Using Latin Squares, 1st edn. Wiley-Interscience, London (1998)"},{"key":"79_CR51","doi-asserted-by":"crossref","unstructured":"D\u00e9nes, J., Keedwell, A.D.: Latin Squares (Annals of Discrete Mathematics), vol. 46. Elsevier, North-Holland (1991)","DOI":"10.1016\/S0167-5060(08)70969-5"},{"key":"79_CR52","unstructured":"Google Internet Search Engine: http:\/\/www.google.com , used to generate the lest of items. Accessed 26 Sept 2008"},{"key":"79_CR53","unstructured":"List of Songs: http:\/\/www.advicenators.com\/qview.php?q=549142 . Accessed 26 Sept 2008"},{"key":"79_CR54","unstructured":"Intranet Book List: http:\/\/www.iblist.com . Accessed 26 Sept 2008"},{"key":"79_CR55","unstructured":"Spam Mimic: http:\/\/www.spammimic.com . Accessed 31 July 2007"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0079-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0079-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0079-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T22:48:08Z","timestamp":1739054888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0079-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,11]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["79"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0079-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2009,4,11]]}}}