{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T09:21:36Z","timestamp":1769764896907,"version":"3.49.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,14]]},"DOI":"10.1109\/icccs49678.2020.9276783","type":"proceedings-article","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T03:21:19Z","timestamp":1607570479000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Handwriting Based Text Steganography Using Universal Languages"],"prefix":"10.1109","author":[{"given":"Indradip","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Kaustav","family":"Bandyopadhyay","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Mohan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-33133-6_9"},{"key":"ref3","first-page":"43","volume":"4531","author":"gea-banacloche","year":"2002","journal-title":"Journal of Mathematical Physics"},{"key":"ref10","first-page":"8130","article-title":"An enhanced embedding method using inter-sentence, inter-word, end-of line and inter-paragraph spacing","volume":"6","author":"por","year":"2011","journal-title":"International Journal of the Physical Sciences"},{"key":"ref6","article-title":"2nd Bielefeld Workshop on Quantum Information and Complexity","author":"curty","year":"2000"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT.2015.7226092"},{"key":"ref5","first-page":"4567","article-title":"Lecture Notes in Computer Science","volume":"32","author":"martin","year":"2008"},{"key":"ref8","first-page":"2004","article-title":"Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text","author":"bennett","year":"2004","journal-title":"CERIAS TR"},{"key":"ref7","author":"nielsen","year":"2000","journal-title":"Quantum Computation and Quantum Information"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2008.4494159"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Kuhn: Information Hiding&#x2014;A Survey","volume":"87","author":"fabien","year":"1999","journal-title":"Proceedings of the IEEE"}],"event":{"name":"2020 5th International Conference on Computing, Communication and Security (ICCCS)","location":"Patna, India","start":{"date-parts":[[2020,10,14]]},"end":{"date-parts":[[2020,10,16]]}},"container-title":["2020 5th International Conference on Computing, Communication and Security (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9276407\/9276491\/09276783.pdf?arnumber=9276783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:23:55Z","timestamp":1656375835000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9276783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,14]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icccs49678.2020.9276783","relation":{},"subject":[],"published":{"date-parts":[[2020,10,14]]}}}