{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:46:41Z","timestamp":1773931601370,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T00:00:00Z","timestamp":1713484800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T00:00:00Z","timestamp":1713484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19027-9","type":"journal-article","created":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T07:01:51Z","timestamp":1713510111000},"page":"6445-6471","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0923-202X","authenticated-orcid":false,"given":"Adnan","family":"Gutub","sequence":"first","affiliation":[]},{"given":"Faiza","family":"Al-Shaarani","sequence":"additional","affiliation":[]},{"given":"Khoulood","family":"Alharthi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,19]]},"reference":[{"key":"19027_CR1","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-981-10-8797-4_54","volume":"771","author":"N Kini","year":"2019","unstructured":"Kini N et al (2019) A secured steganography algorithm for hiding an image in an image. Stud Comput Intell 771:539\u2013546. https:\/\/doi.org\/10.1007\/978-981-10-8797-4_54","journal-title":"Stud Comput Intell"},{"issue":"4","key":"19027_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.20967\/jcscm.2018.04.006","volume":"8","author":"A Al-Qurashi","year":"2018","unstructured":"Al-Qurashi A et al (2018) Reliable secret key generation for counting-based secret sharing. J Comput Sci Comput Math 8(4):87\u2013101. https:\/\/doi.org\/10.20967\/jcscm.2018.04.006","journal-title":"J Comput Sci Comput Math"},{"issue":"5","key":"19027_CR3","doi-asserted-by":"crossref","first-page":"5591","DOI":"10.1007\/s11042-017-5293-6","volume":"78","author":"A Gutub","year":"2019","unstructured":"Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl (MTAP) 78(5):5591\u20135619","journal-title":"Multimed Tools Appl (MTAP)"},{"issue":"11\u201312","key":"19027_CR4","doi-asserted-by":"publisher","first-page":"7951","DOI":"10.1007\/s11042-019-08427-x","volume":"79","author":"A Gutub","year":"2020","unstructured":"Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl 79(11\u201312):7951\u20137985. https:\/\/doi.org\/10.1007\/s11042-019-08427-x","journal-title":"Multimed Tools Appl"},{"key":"19027_CR5","doi-asserted-by":"crossref","unstructured":"Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Display Res Center 10(1)","DOI":"10.1007\/s13319-019-0216-0"},{"issue":"11","key":"19027_CR6","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to Share a Secret. Commun ACM 22(11):612\u2013613. https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun ACM"},{"key":"19027_CR7","doi-asserted-by":"publisher","unstructured":"Blakley G (1979) Safeguarding cryptographic keys, 1979 Int Work Manag Requir Knowledge, MARK 1979:313\u2013317, https:\/\/doi.org\/10.1109\/MARK.1979.8817296","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"9","key":"19027_CR8","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1016\/j.jksuci.2019.06.014","volume":"33","author":"A Gutub","year":"2021","unstructured":"Gutub A, Alaseri K (2021) Refining arabic text stego-techniques for shares memorization of counting-based secret sharing. J King Saud Univ - Comp Inf Sci 33(9):1108\u20131120","journal-title":"J King Saud Univ - Comp Inf Sci"},{"key":"19027_CR9","doi-asserted-by":"publisher","unstructured":"Porwal S, Mittal S (2020) A threshold secret sharing technique based on matrix manipulation. AIP Conf Proc 2214. https:\/\/doi.org\/10.1063\/5.0003358","DOI":"10.1063\/5.0003358"},{"key":"19027_CR10","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12093","author":"A Gutub","year":"2022","unstructured":"Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol. https:\/\/doi.org\/10.1049\/cit2.12093","journal-title":"CAAI Trans Intell Technol"},{"issue":"25\u201326","key":"19027_CR11","doi-asserted-by":"publisher","first-page":"17373","DOI":"10.1007\/s11042-020-08695-y","volume":"79","author":"A Gutub","year":"2020","unstructured":"Gutub A, AlKhodaidi T (2020) Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimed Tools Appl 79(25\u201326):17373\u201317401. https:\/\/doi.org\/10.1007\/s11042-020-08695-y","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"19027_CR12","doi-asserted-by":"publisher","first-page":"16283","DOI":"10.1007\/s11042-018-6977-2","volume":"78","author":"M Al-Ghamdi","year":"2019","unstructured":"Al-Ghamdi M et al (2019) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78(12):16283\u201316310. https:\/\/doi.org\/10.1007\/s11042-018-6977-2","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"19027_CR13","doi-asserted-by":"publisher","first-page":"3403","DOI":"10.1007\/s13369-020-04422-9","volume":"45","author":"T AlKhodaidi","year":"2020","unstructured":"AlKhodaidi T et al (2020) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng (AJSE) 45(4):3403\u20133423. https:\/\/doi.org\/10.1007\/s13369-020-04422-9","journal-title":"Arab J Sci Eng (AJSE)"},{"key":"19027_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-20901-7_2","volume":"6639","author":"A Beimel","year":"2011","unstructured":"Beimel A (2011) Secret-sharing schemes: A survey. Lect Notes Comput Sci LNCS 6639:11\u201346. https:\/\/doi.org\/10.1007\/978-3-642-20901-7_2","journal-title":"Lect Notes Comput Sci LNCS"},{"key":"19027_CR15","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/3-540-48329-2_10","volume":"773","author":"C Blundo","year":"1994","unstructured":"Blundo C et al (1994) Fully dynamic secret sharing schemes. Lect Notes Comput Sci LNCS 773:110\u2013125. https:\/\/doi.org\/10.1007\/3-540-48329-2_10","journal-title":"Lect Notes Comput Sci LNCS"},{"key":"19027_CR16","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1007\/11902140_97","volume":"4263","author":"K Kaya","year":"2006","unstructured":"Kaya K et al (2006) Threshold cryptography based on asmuth-bloom secret sharing. Lect Notes Comput Sci LNCS 4263:935\u2013942. https:\/\/doi.org\/10.1007\/11902140_97","journal-title":"Lect Notes Comput Sci LNCS"},{"issue":"4","key":"19027_CR17","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1504\/IJSN.2009.028667","volume":"4","author":"L Bai","year":"2009","unstructured":"Bai L, Zou XK (2009) A proactive secret sharing scheme in matrix projection method. Int J Secur Netw 4(4):201\u2013209. https:\/\/doi.org\/10.1504\/IJSN.2009.028667","journal-title":"Int J Secur Netw"},{"key":"19027_CR18","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-48658-5_17","volume":"839","author":"C Blundo","year":"1994","unstructured":"Blundo C, De Santis A, Di Crescenzo G, Gaggia AG, Vaccaro U (1994) Multi-secret sharing schemes. Lect Notes Comput Sci LNCS 839:150\u2013163. https:\/\/doi.org\/10.1007\/3-540-48658-5_17","journal-title":"Lect Notes Comput Sci LNCS"},{"key":"19027_CR19","unstructured":"Chien HY, Jan JK, Tseng YM (2000) A practical (t, n) multi-secret sharing scheme. https:\/\/www.researchgate.net\/publication\/279945302"},{"issue":"1\u20133","key":"19027_CR20","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0304-3975(02)00399-7","volume":"295","author":"G Di Crescenzo","year":"2003","unstructured":"Di Crescenzo G (2003) Sharing one secret vs. sharing many secrets. Theoret Comput Sci 295(1\u20133):123\u2013140. https:\/\/doi.org\/10.1016\/S0304-3975(02)00399-7","journal-title":"Theoret Comput Sci"},{"key":"19027_CR21","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-540-24638-1_26","volume":"2951","author":"T Tassa","year":"2004","unstructured":"Tassa T (2004) Hierarchical threshold secret sharing. Lect Notes Comput Sci LNCS 2951:473\u2013490. https:\/\/doi.org\/10.1007\/978-3-540-24638-1_26","journal-title":"Lect Notes Comput Sci LNCS"},{"key":"19027_CR22","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume":"963","author":"A Herzberg","year":"1995","unstructured":"Herzberg A, Jarecki S, Krawczyk H, Yung M (1995) Proactive secret sharing or: How to cope with perpetual leakage. Lect Notes Comput Sci LNCS 963:339\u2013352. https:\/\/doi.org\/10.1007\/3-540-44750-4_27","journal-title":"Lect Notes Comput Sci LNCS"},{"key":"19027_CR23","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/0-387-34805-0_26","volume":"435","author":"CS Laih","year":"1990","unstructured":"Laih CS, Harn L, Lee JY, Hwang T (1990) Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space. Lect Notes Comput Sci LNCS 435:286\u2013298. https:\/\/doi.org\/10.1007\/0-387-34805-0_26","journal-title":"Lect Notes Comput Sci LNCS"},{"key":"19027_CR24","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-57843-9_11","volume":"781","author":"C Blundo","year":"1994","unstructured":"Blundo C, De Santis A, Gargano L, Vaccaro U (1994) Secret sharing schemes with veto capabilities. Lect Notes Comput Sci LNCS 781:82\u201389. https:\/\/doi.org\/10.1007\/3-540-57843-9_11","journal-title":"Lect Notes Comput Sci LNCS"},{"key":"19027_CR25","doi-asserted-by":"publisher","unstructured":"Zhang E, Zhu J, Li G, Chang J, Li Y (2019) Outsourcing hierarchical threshold secret sharing scheme based on reputation. Secur Commun Netw 2019. https:\/\/doi.org\/10.1155\/2019\/6989383","DOI":"10.1155\/2019\/6989383"},{"issue":"1","key":"19027_CR26","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1049\/ipr2.12938","volume":"18","author":"Z Saeidi","year":"2024","unstructured":"Saeidi Z et al (2024) High performance image steganography integrating IWT and Hamming code within secret sharing. IET Image Proc 18(1):129\u2013139. https:\/\/doi.org\/10.1049\/ipr2.12938","journal-title":"IET Image Proc"},{"issue":"3","key":"19027_CR27","doi-asserted-by":"publisher","first-page":"91","DOI":"10.36909\/JER.V8I3.8079","volume":"8","author":"A Gutub","year":"2020","unstructured":"Gutub A, Al-Qurashi A (2020) Secure shares generation via m-blocks partitioning for counting-based secret sharing. J Eng Res 8(3):91\u2013117. https:\/\/doi.org\/10.36909\/JER.V8I3.8079","journal-title":"J Eng Res"},{"issue":"4","key":"19027_CR28","doi-asserted-by":"publisher","first-page":"2631","DOI":"10.1007\/s13369-020-04413-w","volume":"45","author":"A Gutub","year":"2020","unstructured":"Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45(4):2631\u20132644. https:\/\/doi.org\/10.1007\/s13369-020-04413-w","journal-title":"Arab J Sci Eng"},{"key":"19027_CR29","doi-asserted-by":"publisher","unstructured":"Elharrouss O et al (2020) An image steganography approach based on k-least significant bits (k-LSB). 2020 IEEE Int Conf Informatics IoT Enabling Technol ICIoT 2020 no. February:131\u2013135. https:\/\/doi.org\/10.1109\/ICIoT48696.2020.9089566","DOI":"10.1109\/ICIoT48696.2020.9089566"},{"issue":"19","key":"19027_CR30","doi-asserted-by":"publisher","first-page":"13877","DOI":"10.1007\/s00500-023-09042-7","volume":"27","author":"A Aljarf","year":"2023","unstructured":"Aljarf A et al (2023) Integrating machine learning and features extraction for practical reliable color images steganalysis classification. Soft Comput 27(19):13877\u201313888. https:\/\/doi.org\/10.1007\/s00500-023-09042-7","journal-title":"Soft Comput"},{"key":"19027_CR31","doi-asserted-by":"publisher","unstructured":"Gutub A, Al-Ghamdi M (2019) Accommodating secret sharing technique for personal remembrance via steganography. 2019 Int Conf Fourth Ind Revolution, ICFIR 2019, 1\u20136 https:\/\/doi.org\/10.1109\/ICFIR.2019.8894784","DOI":"10.1109\/ICFIR.2019.8894784"},{"issue":"9","key":"19027_CR32","doi-asserted-by":"publisher","first-page":"6909","DOI":"10.1016\/J.JKSUCI.2021.09.009","volume":"34","author":"F Al-Shaarani","year":"2022","unstructured":"Al-Shaarani F et al (2022) Securing matrix counting-based secret-sharing involving crypto steganography. J King Saud Univ - Comput Inf Sci 34(9):6909\u20136924. https:\/\/doi.org\/10.1016\/J.JKSUCI.2021.09.009","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"19027_CR33","doi-asserted-by":"publisher","unstructured":"Al-Shaarani F et al (2021) Increasing participants using counting-based secret sharing via involving matrices and practical steganography. Arab J Sci Eng 2021 472, 47(2):2455\u20132477. https:\/\/doi.org\/10.1007\/S13369-021-06165-7","DOI":"10.1007\/S13369-021-06165-7"},{"issue":"2","key":"19027_CR34","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/S13369-021-06200-7\/TABLES\/9","volume":"47","author":"E Almehmadi","year":"2022","unstructured":"Almehmadi E et al (2022) Novel Arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab J Sci Eng 47(2):2585\u20132609. https:\/\/doi.org\/10.1007\/S13369-021-06200-7\/TABLES\/9","journal-title":"Arab J Sci Eng"},{"key":"19027_CR35","doi-asserted-by":"publisher","unstructured":"Gutub A (2022) Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation. Multimed Tools Appl 2022 817,81(7):9527\u20139547. https:\/\/doi.org\/10.1007\/S11042-022-12062-4","DOI":"10.1007\/S11042-022-12062-4"},{"key":"19027_CR36","doi-asserted-by":"publisher","unstructured":"Gutub A (2022) Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication. Int J Speech Technol, Springer ISSN: 1572\u20138110, 25(4):997\u20131011. https:\/\/doi.org\/10.1007\/s10772-022-09999-0","DOI":"10.1007\/s10772-022-09999-0"},{"key":"19027_CR37","doi-asserted-by":"publisher","unstructured":"Hemalatha J et al (2023) Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier. Journal of Information Security and Applications 76:10354. Elsevier. https:\/\/doi.org\/10.1016\/j.jisa.2023.103541","DOI":"10.1016\/j.jisa.2023.103541"},{"issue":"1","key":"19027_CR38","doi-asserted-by":"publisher","first-page":"13","DOI":"10.26735\/FMIT1649","volume":"3","author":"M Alkhudaydi","year":"2020","unstructured":"Alkhudaydi M et al (2020) Integrating light-weight cryptography with diacritics arabic text steganography improved for practical security applications. J Inf Secur Cybercrimes Res (JISCR) 3(1):13\u201330. https:\/\/doi.org\/10.26735\/FMIT1649","journal-title":"J Inf Secur Cybercrimes Res (JISCR)"},{"issue":"18","key":"19027_CR39","doi-asserted-by":"publisher","first-page":"28521","DOI":"10.1007\/s11042-021-11051-3","volume":"80","author":"B Al-Roithy","year":"2021","unstructured":"Al-Roithy B et al (2021) Remodeling randomness prioritization to boost-up security of RGB image encryption. Multimed Tools Appl (MTAP) 80(18):28521\u201328581. https:\/\/doi.org\/10.1007\/s11042-021-11051-3","journal-title":"Multimed Tools Appl (MTAP)"},{"key":"19027_CR40","doi-asserted-by":"publisher","unstructured":"Kheshaifaty N et al (2021) Engineering graphical captcha and AES crypto hash functions for secure online authentication. J Eng Res (JER), in press.\u00a0https:\/\/doi.org\/10.36909\/jer.13761","DOI":"10.36909\/jer.13761"},{"issue":"21","key":"19027_CR41","doi-asserted-by":"publisher","first-page":"30663","DOI":"10.1007\/s11042-022-13015-7","volume":"81","author":"AK Sahu","year":"2022","unstructured":"Sahu AK et al (2022) Improving grayscale steganography to protect personal information disclosure within hotel services. Multimed Tools Appl (MTAP) 81(21):30663\u201330683. https:\/\/doi.org\/10.1007\/s11042-022-13015-7","journal-title":"Multimed Tools Appl (MTAP)"},{"key":"19027_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jer.2023.09.014","author":"A Gutub","year":"2023","unstructured":"Gutub A (2023) Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability. J Eng Res (JER). https:\/\/doi.org\/10.1016\/j.jer.2023.09.014","journal-title":"J Eng Res (JER)"},{"issue":"4","key":"19027_CR43","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.eij.2022.10.003","volume":"23","author":"NA Roslan","year":"2022","unstructured":"Roslan NA et al (2022) Systematic literature review and analysis for Arabic text steganography method practically. Egypt Inform J Elsevier 23(4):177\u2013191. https:\/\/doi.org\/10.1016\/j.eij.2022.10.003","journal-title":"Egypt Inform J Elsevier"},{"key":"19027_CR44","doi-asserted-by":"publisher","unstructured":"AlJarf A et al (2024) Is blind image steganalysis practical using feature-based classification? Multimed Tools Appl 83(2):4579\u20134612. https:\/\/doi.org\/10.1007\/s11042-023-15682-6","DOI":"10.1007\/s11042-023-15682-6"},{"key":"19027_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18946-x","author":"A Gutub","year":"2024","unstructured":"Gutub A (2024) Regulating Kashida Arabic steganography to improve security and capacity performance. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-18946-x","journal-title":"Multimed Tools Appl"},{"key":"19027_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-023-08629-4","author":"A Gutub","year":"2024","unstructured":"Gutub A (2024) Emerging Arabic text watermarking utilizing combinations of different diacritics. Arab J Sci Eng. https:\/\/doi.org\/10.1007\/s13369-023-08629-4","journal-title":"Arab J Sci Eng"},{"issue":"4","key":"19027_CR47","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.jer.2023.100099","volume":"11","author":"A Gutub","year":"2023","unstructured":"Gutub A, Almehmadi E (2023) Upgrading script watermarking robustness of unusual-to-tolerate functional confirmation by secret-sharing. J Eng Res 11(4):392\u2013403. https:\/\/doi.org\/10.1016\/j.jer.2023.100099","journal-title":"J Eng Res"},{"issue":"8","key":"19027_CR48","doi-asserted-by":"publisher","first-page":"9963","DOI":"10.1007\/s13369-022-07387-z","volume":"48","author":"A Gutub","year":"2023","unstructured":"Gutub A, Almehmadi E (2023) Advancing partial verification of watermarking for Arabic text via utilization of innovative counting-based secret sharing. Arab J Sci Eng 48(8):9963\u20139989. https:\/\/doi.org\/10.1007\/s13369-022-07387-z","journal-title":"Arab J Sci Eng"},{"issue":"3","key":"19027_CR49","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s43995-023-00026-0","volume":"14","author":"M Abu-Hashem","year":"2023","unstructured":"Abu-Hashem M et al (2023) Discrepancies of remote techno-tolerance due to COVID-19 pandemic within Arab middle-east countries. \u00a0J Umm Al-Qura Univ Eng Archit 14(3):151\u2013165. https:\/\/doi.org\/10.1007\/s43995-023-00026-0","journal-title":"\u00a0J Umm Al-Qura Univ Eng Archit"},{"issue":"14","key":"19027_CR50","doi-asserted-by":"publisher","first-page":"21243","DOI":"10.1007\/s11042-022-14006-4","volume":"82","author":"A Singh","year":"2023","unstructured":"Singh A et al (2023) Redefining food safety traceability system through blockchain: findings challenges and open issues. Multimed Tools Appl 82(14):21243\u201321277. https:\/\/doi.org\/10.1007\/s11042-022-14006-4","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"19027_CR51","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1007\/s13369-022-07250-1","volume":"48","author":"F Sufi","year":"2023","unstructured":"Sufi F et al (2023) Automating global threat-maps generation via advancements of news sensors and AI. Arab J Sci Eng 48(2):2455\u20132472. https:\/\/doi.org\/10.1007\/s13369-022-07250-1","journal-title":"Arab J Sci Eng"},{"key":"19027_CR52","doi-asserted-by":"publisher","first-page":"65439","DOI":"10.1109\/ACCESS.2022.3182712","volume":"10","author":"R Thabit","year":"2022","unstructured":"Thabit R et al (2022) CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access 10:65439\u201365458. https:\/\/doi.org\/10.1109\/ACCESS.2022.3182712","journal-title":"IEEE Access"},{"issue":"1","key":"19027_CR53","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1049\/cit2.12081","volume":"8","author":"KP Roy","year":"2023","unstructured":"Roy KP et al (2023) Analysis of community question-answering issues via machine learning and deep learning: State-of-the-art review. CAAI Transactions on Intelligence Technology 8(1):95\u2013117","journal-title":"CAAI Transactions on Intelligence Technology"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19027-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19027-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19027-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T00:20:27Z","timestamp":1742689227000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19027-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,19]]},"references-count":53,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["19027"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19027-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,19]]},"assertion":[{"value":"14 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}