{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:54:36Z","timestamp":1762210476499,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/icme.2007.4285095","type":"proceedings-article","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T20:48:46Z","timestamp":1188334126000},"page":"2094-2097","source":"Crossref","is-referenced-by-count":19,"title":["An Efficient Linguistic Steganography for Chinese Text"],"prefix":"10.1109","author":[{"given":"Liu","family":"Yuling","sequence":"first","affiliation":[]},{"given":"Sun","family":"Xingming","sequence":"additional","affiliation":[]},{"given":"Gan","family":"Can","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Hong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Synonymous Paraphrasing Using WordNet and Internet","author":"bolshakov","year":"2004","journal-title":"In Proc 9th InternationalConference on Application of Natural Language to Information Systems NLDB-2004 LNCS 3136"},{"key":"ref11","first-page":"231","article-title":"Using Selectional Preferences for Extending a Synonymous Paraphrasing Method in Steganography","author":"calvo","year":"2004","journal-title":"Avances en Ciencias de laComputacion e Ingenieria de Computo - CIC'2004 XIII Congreso Internacional de Computacion"},{"article-title":"Information Hiding for Text by Paraphrasing","year":"2002","author":"nakagawa","key":"ref12"},{"key":"ref13","first-page":"129","article-title":"Natural Language Watermarking Using Semantic Substitution for Chinese Text","author":"chiang","year":"0","journal-title":"LNCS 2939"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1117\/12.649551","article-title":"Attacks on Lexical Natural Language Steganography Systems","author":"taskiran","year":"2006","journal-title":"Proc SPIE Int Conf Security Steganography and Watermarking of Multimedia Contents IX"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161397"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1117\/12.713355"},{"year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3115\/1119250.1119259"},{"year":"0","key":"ref19"},{"article-title":"Hiding the hidden: A software system for concealing ciphertext as innocuous text","year":"1998","author":"chapman","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119291866883"},{"year":"1998","author":"lex","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1117\/12.593790","article-title":"Natural Language Watermarking","author":"topkara","year":"2005","journal-title":"Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII"},{"year":"2001","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-45439-X_11","article-title":"A Practical and Effective Approach to G. Davida, Large-Scale Automated Linguistic Steganography","author":"chapman","year":"2001","journal-title":"Lecture Notes in Computer Science (LNCS) 2200"},{"article-title":"Lexical Steganography through Adaptive Modulation of the Word Choice Hash","year":"1998","author":"winstein","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/978-3-540-30114-1_13","article-title":"A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy","volume":"3200","author":"bolshakov","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"year":"0","key":"ref20"},{"key":"ref22","first-page":"97","article-title":"Research on the detecting algorithmof text document information hiding","volume":"25","author":"zhou","year":"2004","journal-title":"Journal of China Institute of Communication"},{"key":"ref21","first-page":"181","article-title":"Research on Steganalysis of Stegotext Based on Noise Detecting","volume":"32","author":"luo","year":"2005","journal-title":"Journal of HunanUniversity (Natural SCience)"}],"event":{"name":"Multimedia and Expo, 2007 IEEE International Conference on","start":{"date-parts":[[2007,7,2]]},"location":"Beijing, China","end":{"date-parts":[[2007,7,5]]}},"container-title":["Multimedia and Expo, 2007 IEEE International Conference on"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4284552\/4284553\/04285095.pdf?arnumber=4285095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T22:24:01Z","timestamp":1497738241000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4285095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icme.2007.4285095","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}