{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T18:01:29Z","timestamp":1774375289487,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"35-36","license":[{"start":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T00:00:00Z","timestamp":1594857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T00:00:00Z","timestamp":1594857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11042-020-09329-z","type":"journal-article","created":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T21:08:22Z","timestamp":1594933702000},"page":"26549-26569","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A forward email based high capacity text steganography technique using a randomized and indexed word dictionary"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4751-3471","authenticated-orcid":false,"given":"Giridhar","family":"Maji","sequence":"first","affiliation":[]},{"given":"Sharmistha","family":"Mandal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,16]]},"reference":[{"key":"9329_CR1","first-page":"129","volume":"4","author":"T Ahmad","year":"2014","unstructured":"Ahmad T, Marbun MSZ, Studiawan H et al (2014) A novel random email-based steganography. Int J e-Education, e-Business, e-Management e-Learning 4:129","journal-title":"Int J e-Education, e-Business, e-Management e-Learning"},{"key":"9329_CR2","doi-asserted-by":"crossref","unstructured":"Al-Nofaie S, Gutub A, Al-Ghamdi M (2019). Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ Inf Sci","DOI":"10.1016\/j.jksuci.2019.06.010"},{"key":"9329_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.20967\/jcscm.2018.03.002","volume":"8","author":"A Alsaidi","year":"2018","unstructured":"Alsaidi A, Al-lehaibi K, Alzahrani H et al (2018) Compression multi-level crypto stego security of texts utilizing colored email forwarding. J Comput Sci Comput Math 8:33\u201342","journal-title":"J Comput Sci Comput Math"},{"key":"9329_CR4","unstructured":"Bennett K (2004). Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text. Tech Rep 2004\u201313"},{"key":"9329_CR5","doi-asserted-by":"publisher","first-page":"7101","DOI":"10.1007\/s11042-019-08497-x","volume":"79","author":"R Biswas","year":"2020","unstructured":"Biswas R, Bandyapadhay SK (2020) Random selection based GA optimization in 2D-DCT domain color image steganography. Multimed Tools Appl 79:7101\u20137120. https:\/\/doi.org\/10.1007\/s11042-019-08497-x","journal-title":"Multimed Tools Appl"},{"key":"9329_CR6","first-page":"111","volume":"9","author":"S Changder","year":"2009","unstructured":"Changder S, Debnath NC (2009) A new approach for steganography in Bengali text. J Comput Methods Sci Eng 9:111\u2013122","journal-title":"J Comput Methods Sci Eng"},{"key":"9329_CR7","doi-asserted-by":"crossref","unstructured":"Chaudhary S, Dave M, Sanghi A, Sidh H (2018). Indian script encoding technique (ISET): a Hindi text steganography approach. In: Information and Communication Technology for Sustainable Development. Springer, pp 393\u2013401","DOI":"10.1007\/978-981-10-3932-4_41"},{"key":"9329_CR8","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s10207-009-0079-0","volume":"8","author":"A Desoky","year":"2009","unstructured":"Desoky A (2009) Listega: list-based steganography methodology. Int J Inf Secur 8:247\u2013261","journal-title":"Int J Inf Secur"},{"key":"9329_CR9","doi-asserted-by":"publisher","first-page":"29","DOI":"10.4018\/IJSI.2019070102","volume":"7","author":"SA El Rahman","year":"2019","unstructured":"El Rahman SA (2019) Text steganography approaches using similarity of English font styles. Int J Softw Innov 7:29\u201350","journal-title":"Int J Softw Innov"},{"key":"9329_CR10","doi-asserted-by":"publisher","first-page":"24091","DOI":"10.1007\/s11042-016-4113-8","volume":"76","author":"SE El-Khamy","year":"2017","unstructured":"El-Khamy SE, Korany NO, El-Sherif MH (2017) A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimed Tools Appl 76:24091\u201324106. https:\/\/doi.org\/10.1007\/s11042-016-4113-8","journal-title":"Multimed Tools Appl"},{"key":"9329_CR11","doi-asserted-by":"crossref","unstructured":"Fateh M, Rezvani M (2018). An email-based high capacity text steganography using repeating characters. Int J Comput Appl 1\u20137","DOI":"10.1080\/1206212X.2018.1517713"},{"key":"9329_CR12","first-page":"129","volume":"35","author":"M Garg","year":"2011","unstructured":"Garg M (2011) A novel text steganography technique based on html documents. Int J Adv Sci Technol 35:129\u2013138","journal-title":"Int J Adv Sci Technol"},{"key":"9329_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/03772063.2018.1491807","volume":"66","author":"B Gupta Banik","year":"2018","unstructured":"Gupta Banik B, Bandyopadhyay SK (2018) Novel text steganography using natural language processing and part-of-speech tagging. IETE J Res 66:1\u201312. https:\/\/doi.org\/10.1080\/03772063.2018.1491807","journal-title":"IETE J Res"},{"key":"9329_CR14","doi-asserted-by":"crossref","unstructured":"Hamzah AA, Khattab S, Bayomi H (2019). A linguistic steganography framework using Arabic calligraphy. J King Saud Univ Inf Sci","DOI":"10.1016\/j.jksuci.2019.04.015"},{"key":"9329_CR15","doi-asserted-by":"crossref","unstructured":"Kahn D (1996). The history of steganography. In: International Workshop on Information Hiding. pp 1\u20135","DOI":"10.1007\/3-540-61996-8_27"},{"key":"9329_CR16","unstructured":"Kerckhoffs A (1883). La cryptographic militaire. J des Sci Mil 5\u201338"},{"key":"9329_CR17","doi-asserted-by":"crossref","unstructured":"Khairullah MD (2009). A novel text steganography system using font color of the invisible characters in microsoft word documents. In: 2009 second international conference on computer and electrical engineering. Pp 482\u2013484","DOI":"10.1109\/ICCEE.2009.127"},{"key":"9329_CR18","doi-asserted-by":"publisher","first-page":"25999","DOI":"10.1007\/s11042-019-7664-7","volume":"78","author":"A Khan","year":"2019","unstructured":"Khan A, Sarfaraz A (2019) FFT-ETM based distortion less and high payload image steganography. Multimed Tools Appl 78:25999\u201326022. https:\/\/doi.org\/10.1007\/s11042-019-7664-7","journal-title":"Multimed Tools Appl"},{"key":"9329_CR19","first-page":"61","volume":"45","author":"B Khosravi","year":"2019","unstructured":"Khosravi B, Khosravi B, Khosravi B, Nazarkardeh K (2019) A new method for pdf steganography in justified texts. J Inf Secur Appl 45:61\u201370","journal-title":"J Inf Secur Appl"},{"key":"9329_CR20","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/CONFLUENCE.2014.6949231","volume-title":"2014 5th international conference - confluence the next generation information technology summit (confluence)","author":"R Kumar","year":"2014","unstructured":"Kumar R, Chand S, Singh S (2014) An email based high capacity text steganography scheme using combinatorial compression. In: 2014 5th international conference - confluence the next generation information technology summit (confluence). IEEE, Noida, pp 336\u2013339"},{"key":"9329_CR21","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1166\/jmihi.2019.2559","volume":"9","author":"J Liu","year":"2019","unstructured":"Liu J, Li J, Zhang K, Bhatti UA, Ai Y (2019) Zero-watermarking algorithm for medical images based on dual-tree complex wavelet transform and discrete cosine transform. J Med Imaging Heal Informatics 9:188\u2013194","journal-title":"J Med Imaging Heal Informatics"},{"key":"9329_CR22","unstructured":"Maher K (1995). TEXTO. ftp:\/\/ftp.funet.fi\/pub\/crypt\/steganography\/texto.tar.gz. Accessed 14 Aug 2019"},{"key":"9329_CR23","first-page":"2828","volume":"8","author":"G Maji","year":"2019","unstructured":"Maji G, Mandal S (2019) Secure and robust image steganography using a reference image as key. Int J Innov Technol Explor Eng 8:2828\u20132839","journal-title":"Int J Innov Technol Explor Eng"},{"key":"9329_CR24","doi-asserted-by":"crossref","unstructured":"Maji G, Mandal S, Debnath NC, Sen S (2019). Pixel value difference based image steganography with one time pad encryption. In: 17th international conference on industrial informatics (INDIN 2019). IEEE","DOI":"10.1109\/INDIN41052.2019.8972175"},{"key":"9329_CR25","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/SIGTELCOM.2018.8325806","volume-title":"2nd international conference on recent advances in signal processing, telecommunications and computing, SIGTELCOM 2018","author":"G Maji","year":"2018","unstructured":"Maji G, Mandal S, Sen S, Debnath NC (2018) Dual image based LSB steganography. In: 2nd international conference on recent advances in signal processing, telecommunications and computing, SIGTELCOM 2018. Ho Chi Minh City, Vietnam, pp 61\u201366"},{"key":"9329_CR26","doi-asserted-by":"crossref","unstructured":"Murphy B, Vogel C (2007). The syntax of concealment: reliable methods for plain text information hiding. In: security, steganography, and watermarking of multimedia contents IX. P 65050Y","DOI":"10.1117\/12.713357"},{"key":"9329_CR27","doi-asserted-by":"publisher","first-page":"9101","DOI":"10.1007\/s11042-019-7507-6","volume":"79","author":"GVK Murugan","year":"2020","unstructured":"Murugan GVK, Uthandipalayam Subramaniyam R (2020) Performance analysis of image steganography using wavelet transform for safe and secured transaction. Multimed Tools Appl 79:9101\u20139115. https:\/\/doi.org\/10.1007\/s11042-019-7507-6","journal-title":"Multimed Tools Appl"},{"key":"9329_CR28","first-page":"8887","volume":"975","author":"TP Nagarhalli","year":"2014","unstructured":"Nagarhalli TP (2014) A new approach to SMS text steganography using emoticons. Int J Comput Appl 975:8887","journal-title":"Int J Comput Appl"},{"key":"9329_CR29","first-page":"115","volume":"23","author":"VL Narayana","year":"2018","unstructured":"Narayana VL, Gopi AP, KUMAR NA (2018) Different techniques for hiding the text information using text steganography techniques: a survey. Ing des Syst d\u2019Information 23:115","journal-title":"Ing des Syst d\u2019Information"},{"key":"9329_CR30","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1016\/j.jss.2011.12.023","volume":"85","author":"LY Por","year":"2012","unstructured":"Por LY, Wong K, Chee KO (2012) UniSpaCh: a text-based data hiding method using Unicode space characters. J Syst Softw 85:1075\u20131082","journal-title":"J Syst Softw"},{"key":"9329_CR31","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3923\/itj.2004.245.269","volume":"3","author":"K Rabah","year":"2004","unstructured":"Rabah K (2004) Steganography-the art of hiding data. Inf Technol J 3:245\u2013269","journal-title":"Inf Technol J"},{"key":"9329_CR32","doi-asserted-by":"crossref","unstructured":"Roy S, Manasmita M (2011). A novel approach to format based text steganography. In: proceedings of the 2011 international conference on communication, Computing & Security. Pp 511\u2013516","DOI":"10.1145\/1947940.1948046"},{"key":"9329_CR33","doi-asserted-by":"publisher","first-page":"7063","DOI":"10.1007\/s11042-014-1952-z","volume":"74","author":"MM Sadek","year":"2015","unstructured":"Sadek MM, Khalifa AS, Mostafa MGM (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74:7063\u20137094","journal-title":"Multimed Tools Appl"},{"key":"9329_CR34","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1016\/j.jss.2012.05.027","volume":"85","author":"E Satir","year":"2012","unstructured":"Satir E, Isik H (2012) A compression-based text steganography method. J Syst Softw 85:2385\u20132394","journal-title":"J Syst Softw"},{"key":"9329_CR35","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1007\/s11042-012-1223-9","volume":"70","author":"E Satir","year":"2014","unstructured":"Satir E, Isik H (2014) A Huffman compression based text steganography method. Multimed Tools Appl 70:2085\u20132110","journal-title":"Multimed Tools Appl"},{"key":"9329_CR36","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza M (2008). Text steganography by changing words spelling. In: 2008 10th international conference on advanced communication technology. Pp 1912\u20131913","DOI":"10.1109\/ICACT.2008.4494159"},{"key":"9329_CR37","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza MH, Shirali-Shahreza M (2008). A new synonym text steganography. In: 2008 international conference on intelligent information hiding and multimedia signal processing. Pp 1524\u20131526","DOI":"10.1109\/IIH-MSP.2008.6"},{"key":"9329_CR38","doi-asserted-by":"crossref","unstructured":"Singh S, Siddiqui TJ (2018). Transform domain techniques for image steganography. In: computer vision: concepts, methodologies, tools, and applications. IGI global, pp 170\u2013186","DOI":"10.4018\/978-1-5225-5204-8.ch007"},{"key":"9329_CR39","doi-asserted-by":"crossref","unstructured":"Tan D, Lu Y, Yan X, Wang X (2019). A simple review of audio steganography. In: 2019 IEEE 3rd information technology, Networking, Electronic and Automation Control Conference (ITNEC). pp 1409\u20131413","DOI":"10.1109\/ITNEC.2019.8729476"},{"key":"9329_CR40","unstructured":"Trithemius J, Heidel WE (1721). Steganographia"},{"key":"9329_CR41","doi-asserted-by":"crossref","unstructured":"Wang F, Huang L, Chen Z, et al (2013). A novel text steganography by context-based equivalent substitution. In: 2013 IEEE international conference on signal processing, communication and computing (ICSPCC 2013). Pp 1\u20136","DOI":"10.1109\/ICSPCC.2013.6663950"},{"key":"9329_CR42","unstructured":"Wang Z-H, Kieu TD, Chang C-C, Li M-C (2009). Emoticon-based text steganography in chat. In: 2009 Asia-Pacific conference on computational intelligence and industrial applications (PACIIA). Pp 457\u2013460"},{"key":"9329_CR43","doi-asserted-by":"crossref","unstructured":"Yuling L, Xingming S, Can G, Hong W (2007). An efficient linguistic steganography for Chinese text. In: 2007 IEEE international conference on multimedia and expo. Pp 2094\u20132097","DOI":"10.1109\/ICME.2007.4285095"},{"key":"9329_CR44","first-page":"1","volume-title":"2016 IEEE\/ACIS 15th international conference on computer and information science (ICIS)","author":"X Zhou","year":"2016","unstructured":"Zhou X, Gong W, Fu W, Jin L (2016) An improved method for LSB based color image steganography combined with cryptography. In: 2016 IEEE\/ACIS 15th international conference on computer and information science (ICIS). IEEE, Okayama, pp 1\u20134"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09329-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09329-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09329-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T00:02:49Z","timestamp":1626393769000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09329-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,16]]},"references-count":44,"journal-issue":{"issue":"35-36","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["9329"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09329-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,16]]},"assertion":[{"value":"11 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}