{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:23:13Z","timestamp":1772043793064,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T00:00:00Z","timestamp":1716336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T00:00:00Z","timestamp":1716336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11760-024-03208-y","type":"journal-article","created":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T18:02:12Z","timestamp":1716400932000},"page":"965-978","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Customized model for text cryptography using hybrid image-key"],"prefix":"10.1007","volume":"18","author":[{"given":"Yahya","family":"Khan","sequence":"first","affiliation":[]},{"given":"Shakeel","family":"Ahmad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3320-2074","authenticated-orcid":false,"given":"Muhammad Zubair","family":"Asghar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,22]]},"reference":[{"key":"3208_CR1","doi-asserted-by":"publisher","unstructured":"Almuhammadi, S., Al-Shaaby, A.: A survey on recent approaches combining cryptography and steganography 63\u201374 (2017). https:\/\/doi.org\/10.5121\/csit.2017.70306.","DOI":"10.5121\/csit.2017.70306"},{"key":"3208_CR2","doi-asserted-by":"publisher","unstructured":"Radanliev, P., De Roure, D., Cannady, S., Montalvo, R. M., Nicolescu, R., Huth, M.: Economic impact of IoT cyber risk\u2014Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. IET Conf. Publ., CP740, 2019 (2018). https:\/\/doi.org\/10.1049\/cp.2018.0003.","DOI":"10.1049\/cp.2018.0003"},{"issue":"04","key":"3208_CR3","first-page":"118","volume":"3","author":"N Alanizy","year":"2018","unstructured":"Alanizy, N., Alanizy, A., Baghoza, N., Alghamdi, M., Gutub, A.: 3-Layer PC text security via combining compression, AES cryptography 2LSB image steganography. J. Res. Eng. Appl. Sci. 3(04), 118\u2013124 (2018)","journal-title":"J. Res. Eng. Appl. Sci."},{"key":"3208_CR4","unstructured":"Gutub, A. A., Fattani, M. M.: A novel Arabic text steganography method using letter points and extensions. Eng. Technol. 28\u201331 (2007)."},{"issue":"4","key":"3208_CR5","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.eij.2022.10.003","volume":"23","author":"N Alifah Roslan","year":"2022","unstructured":"Alifah Roslan, N., Izura Udzir, N., Mahmod, R., Gutub, A.: Systematic literature review and analysis for Arabic text steganography method practically, Egypt. Inf. J. 23(4), 177\u2013191 (2022). https:\/\/doi.org\/10.1016\/j.eij.2022.10.003","journal-title":"Inf. J."},{"issue":"1","key":"3208_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00438-y","volume":"2","author":"M Alkhudaydi","year":"2021","unstructured":"Alkhudaydi, M., Gutub, A.: Securing data via cryptography and Arabic text steganography. SN Comput. Sci. 2(1), 1\u201318 (2021). https:\/\/doi.org\/10.1007\/s42979-020-00438-y","journal-title":"SN Comput. Sci."},{"issue":"9","key":"3208_CR7","doi-asserted-by":"publisher","first-page":"8869","DOI":"10.1007\/s13369-021-05605-8","volume":"46","author":"N Alanazi","year":"2021","unstructured":"Alanazi, N., Khan, E., Gutub, A.: Involving spaces of Unicode standard within irreversible Arabic text steganography for practical implementations. Arab. J. Sci. Eng. 46(9), 8869\u20138885 (2021). https:\/\/doi.org\/10.1007\/s13369-021-05605-8","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"3208_CR8","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1007\/s11042-020-09667-y","volume":"80","author":"N Alanazi","year":"2021","unstructured":"Alanazi, N., Khan, E., Gutub, A.: Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimed. Tools Appl. 80(1), 1403\u20131431 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09667-y","journal-title":"Multimed. Tools Appl."},{"issue":"12","key":"3208_CR9","doi-asserted-by":"publisher","first-page":"11037","DOI":"10.1007\/s13369-020-04917-5","volume":"45","author":"N Alanazi","year":"2020","unstructured":"Alanazi, N., Khan, E., Gutub, A.: Functionality-improved Arabic text steganography based on Unicode features. Arab. J. Sci. Eng. 45(12), 11037\u201311050 (2020). https:\/\/doi.org\/10.1007\/s13369-020-04917-5","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"3208_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.26735\/FMIT1649","volume":"3","author":"MG Alkhudaydi","year":"2020","unstructured":"Alkhudaydi, M.G., Gutub, A.A.: Integrating Light-weight cryptography with diacritics Arabic text steganography improved for practical security applications. J. Inf. Secur. Cybercrimes Res. 3(1), 13\u201330 (2020)","journal-title":"J. Inf. Secur. Cybercrimes Res."},{"issue":"1\u20132","key":"3208_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s11042-019-08025-x","volume":"79","author":"SMA Al-Nofaie","year":"2020","unstructured":"Al-Nofaie, S.M.A., Gutub, A.A.A.: Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed. Tools Appl. 79(1\u20132), 19\u201367 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08025-x","journal-title":"Multimed. Tools Appl."},{"key":"3208_CR12","unstructured":"Jan, M. A., Ahmad, B.: Extension of tinny application for cloud based custom software with encryption queue: A strategy to protect data on cloud. Innov. Syst. Des. Eng. 2(3) (2012)."},{"key":"3208_CR13","doi-asserted-by":"publisher","first-page":"65439","DOI":"10.1109\/ACCESS.2022.3182712","volume":"10","author":"R Thabit","year":"2022","unstructured":"Thabit, R., Udzir, N.I., Yasin, S.M., Asmawi, A., Gutub, A.A.A.: CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access 10, 65439\u201365458 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3182712","journal-title":"IEEE Access"},{"key":"3208_CR14","doi-asserted-by":"publisher","unstructured":"Gutub, A., Almehmadi, E.: Arabic text watermarking tuned for medical e-record semi-authentication. J. Eng. Res. (2022). https:\/\/doi.org\/10.36909\/jer.18943.","DOI":"10.36909\/jer.18943"},{"issue":"2","key":"3208_CR15","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s13369-021-06200-7","volume":"47","author":"E Almehmadi","year":"2022","unstructured":"Almehmadi, E., Gutub, A.: Novel Arabic e-Text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab. J. Sci. Eng. 47(2), 2585\u20132609 (2022). https:\/\/doi.org\/10.1007\/s13369-021-06200-7","journal-title":"Arab. J. Sci. Eng."},{"issue":"8","key":"3208_CR16","doi-asserted-by":"publisher","first-page":"9963","DOI":"10.1007\/s13369-022-07387-z","volume":"48","author":"A Gutub","year":"2023","unstructured":"Gutub, A., Almehmadi, E.: Advancing partial verification of watermarking for Arabic text via utilization of innovative counting-based secret sharing. Arab. J. Sci. Eng. 48(8), 9963\u20139989 (2023). https:\/\/doi.org\/10.1007\/s13369-022-07387-z","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"3208_CR17","doi-asserted-by":"publisher","first-page":"48","DOI":"10.4304\/jetwi.2.1.48-55","volume":"2","author":"AAA Gutub","year":"2010","unstructured":"Gutub, A.A.A., Al-Haidari, F., Al-Kahsah, K.M., Hamodi, J.: E-text watermarking: Utilizing \u2018Kashida\u2019 extensions in Arabic language electronic writing. J. Emerg. Technol. Web Intell. 2(1), 48\u201355 (2010). https:\/\/doi.org\/10.4304\/jetwi.2.1.48-55","journal-title":"J. Emerg. Technol. Web Intell."},{"key":"3208_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-023-08629-4","author":"A Gutub","year":"2024","unstructured":"Gutub, A.: Emerging Arabic text watermarking utilizing combinations of different diacritics. Arab. J. Sci. Eng. (2024). https:\/\/doi.org\/10.1007\/s13369-023-08629-4","journal-title":"Arab. J. Sci. Eng."},{"key":"3208_CR19","unstructured":"Blessing, J., Specter, M. A., Weitzner, D. J.: You Really Shouldn\u2019t Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries (2021).. Available: http:\/\/arxiv.org\/abs\/2107.04940."},{"key":"3208_CR20","doi-asserted-by":"publisher","unstructured":"Jager, T., Schwenk, J., Somorovsky, J.: On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption. Proc. ACM Conf. Comput. Commun. Secur. 2015-Octob 1185\u20131196 (2015). https:\/\/doi.org\/10.1145\/2810103.2813657.","DOI":"10.1145\/2810103.2813657"},{"key":"3208_CR21","doi-asserted-by":"publisher","unstructured":"Bhargavan, K., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P. Y.: Implementing TLS with verified cryptographic security. Proc.\u2014IEEE Symp. Secur. Priv. 445\u2013459 (2013). https:\/\/doi.org\/10.1109\/SP.2013.37.","DOI":"10.1109\/SP.2013.37"},{"key":"3208_CR22","unstructured":"https:\/\/www.kaggle.com\/datasets\/uciml\/sms-spam-collection-dataset."},{"issue":"2","key":"3208_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdm.324076","volume":"34","author":"R Gurunath","year":"2023","unstructured":"Gurunath, R., Samanta, D.: A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography. J. Database Manag. 34(2), 1\u201322 (2023). https:\/\/doi.org\/10.4018\/jdm.324076","journal-title":"J. Database Manag."},{"issue":"6","key":"3208_CR24","doi-asserted-by":"publisher","first-page":"213","DOI":"10.5121\/ijnsa.2011.3616","volume":"3","author":"S Dulera","year":"2012","unstructured":"Dulera, S., Jinwala, D., Dasgupta, A.: Experimenting with the novel approaches in text steganography. Int. J. Netw. Secur. Its Appl. 3(6), 213\u2013225 (2012). https:\/\/doi.org\/10.5121\/ijnsa.2011.3616","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"3208_CR25","doi-asserted-by":"publisher","first-page":"8011","DOI":"10.1109\/ACCESS.2018.2796585","volume":"6","author":"NS Kamaruddin","year":"2018","unstructured":"Kamaruddin, N.S., Kamsin, A., Por, L.Y., Rahman, H.: A review of text watermarking: Theory, methods, and applications. IEEE Access 6, 8011\u20138028 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2796585","journal-title":"IEEE Access"}],"updated-by":[{"DOI":"10.1007\/s11760-024-03314-x","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T00:00:00Z","timestamp":1717804800000}}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03208-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03208-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03208-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T12:38:27Z","timestamp":1719319107000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03208-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,22]]},"references-count":25,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3208"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03208-y","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11760-024-03314-x","asserted-by":"object"}]},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,22]]},"assertion":[{"value":"24 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2024","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11760-024-03314-x","URL":"https:\/\/doi.org\/10.1007\/s11760-024-03314-x","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors and does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}