{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T11:02:26Z","timestamp":1753441346032,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icitcs.2016.7740349","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T21:40:55Z","timestamp":1478814055000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Linguistic Based Steganography Using Lexical Substitution and Syntactical Transformation"],"prefix":"10.1109","author":[{"given":"Ari","family":"Barmawi","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"37","article-title":"Words are not enough: Sentence level natural language watermarking","author":"mercan","year":"2006","journal-title":"Proceedings of the ACM Workshop on Content Protection and Security"},{"key":"ref11","first-page":"1y","article-title":"The syntax of concealment: Reliable methods for plain text information hiding","volume":"6505","author":"brian","year":"2007","journal-title":"Proceedings of the SPIE International Conference on Security Steganography and Watermarking of Multimedia Contents"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.csl.2008.04.001","article-title":"Natural language watermarking via morphosyntactic alterations","volume":"23","author":"hasan mesut","year":"2009","journal-title":"Computer Speech and Language"},{"key":"ref13","first-page":"511","article-title":"The secret's in the word order: Text-to-text generation for linguistic steganography","author":"ching-yun","year":"2012","journal-title":"Proceedings of the 24th International Conference on Computational Linguistics"},{"key":"ref14","first-page":"493","article-title":"Adjective deletion for linguistic steganography and secret sharing","author":"ching-yun","year":"2012","journal-title":"Proceedings of the 24th International Conference on Computational Linguistics"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1162\/COLI_a_00176"},{"key":"ref16","article-title":"Keying Hash Functions for Message Authentication","volume":"1109","author":"mihir","year":"1996","journal-title":"Advances in Cryptology Lecture Notes in Computer Science"},{"journal-title":"SemEval-2007 Task 10 English Lexical Substitution Task","year":"2007","author":"mccarthy","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1117\/12.649551"},{"key":"ref3","first-page":"180","article-title":"A method of linguistic steganography based on collocationally-verified synonym","author":"bolshakov","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366190"},{"key":"ref5","first-page":"591","article-title":"Linguistic steganography using automatically generated paraphrases","author":"chang","year":"2010","journal-title":"Proceedings of the Annual Meeting of the North American Association for Computational Linguistics"},{"journal-title":"Syntactic information hiding in plain text","year":"2001","author":"brian","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_14"},{"key":"ref2","article-title":"Tyrannosaurus lex","author":"winstein","year":"1999","journal-title":"Open source"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref9","first-page":"958","article-title":"A natural language watermarking based on Chinese syntax","author":"yuling","year":"2005","journal-title":"Advances in Natural Computation volume 3612 Changsha"}],"event":{"name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","start":{"date-parts":[[2016,9,26]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2016,9,26]]}},"container-title":["2016 6th International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740253\/7740293\/07740349.pdf?arnumber=7740349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:20:24Z","timestamp":1498360824000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7740349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2016.7740349","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}