{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:50:38Z","timestamp":1762505438092,"version":"3.37.0"},"reference-count":21,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Digital Forensic Practice"],"published-print":{"date-parts":[[2008,12,9]]},"DOI":"10.1080\/15567280802558818","type":"journal-article","created":{"date-parts":[[2008,12,12]],"date-time":"2008-12-12T21:39:49Z","timestamp":1229117989000},"page":"132-139","source":"Crossref","is-referenced-by-count":15,"title":["Nostega: A Novel Noiseless Steganography Paradigm"],"prefix":"10.1080","volume":"2","author":[{"given":"Abdelrahman","family":"Desoky","sequence":"first","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Kipper, G. 2004.Investigator's Guide to Steganography, 15\u201316. CRC Press LLC.","DOI":"10.1201\/9780203504765"},{"key":"CIT0003","first-page":"43","volume-title":"Information Hiding","author":"Johnson N. F.","year":"1999"},{"key":"CIT0004","volume":"6","author":"Kessler G. C.","year":"2004","journal-title":"Forensic Science Communications. Technical Report"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859370"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1080\/15567280701797087"},{"journal-title":"Journal of Security and Communication Networks","author":"Desoky A.","key":"CIT0007"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M. H. and Shirali-Shahreza, M. \u201cA New Approach to Persian\/Arabic Text Steganography.\u201d. Proceedings of the 5th IEEE\/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 2006). July10\u2013122006, Honolulu, Hawaii. pp.310\u2013315.","DOI":"10.1109\/ICIS-COMSAR.2006.10"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_6"},{"key":"CIT0013","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/3-540-61996-8_29","volume":"1174","author":"Handel T. G.","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"volume-title":"The Codebreakers: The Story of Secret Writing","year":"1996","author":"Kahn D.","key":"CIT0015"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119291866883"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860769-9\/50033-0"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028489"},{"key":"CIT0019","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0028489","volume-title":"Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text","author":"Chapman M.","year":"1997"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45439-X_11"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45831-X_19"},{"key":"CIT0023","doi-asserted-by":"crossref","unstructured":"Grothoff, C. \u201cTranslation-Based Steganography.\u201d.Proceedings of Information Hiding Workshop (IH 2005), Barcelona, Spain, June 2005. pp.213\u2013233.","DOI":"10.1007\/11558859_17"},{"key":"CIT0024","unstructured":"Stutsman, R. 2006. \u201cLost in Just the Translation.\u201d. Proceedings of the 21st Annual ACM Symposium on Applied Computing (SAC\u201906). April2006, Dijon, France. pp.338\u2013345."},{"key":"CIT0025","doi-asserted-by":"crossref","unstructured":"Topkara, M., Topkara, U. and Atallah, M. J. 2007. Information Hiding Through Errors: A Confusing Approach. Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents. January2007. 65050V\u20131\u201365050V\u201312","DOI":"10.1117\/12.706980"},{"key":"CIT0026","first-page":"2260","author":"Shirali-Shahreza M.","year":"2007","journal-title":"International Conference on Convergence Information Technology"}],"container-title":["Journal of Digital Forensic Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T04:58:54Z","timestamp":1738817934000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/15567280802558818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,9]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,12,9]]}},"alternative-id":["10.1080\/15567280802558818"],"URL":"https:\/\/doi.org\/10.1080\/15567280802558818","relation":{},"ISSN":["1556-7281","1556-7346"],"issn-type":[{"type":"print","value":"1556-7281"},{"type":"electronic","value":"1556-7346"}],"subject":[],"published":{"date-parts":[[2008,12,9]]}}}