{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:05:04Z","timestamp":1750219504257,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,18]]},"DOI":"10.1145\/3733102.3733136","type":"proceedings-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:07Z","timestamp":1750158847000},"page":"64-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Support of Forensic Attribution by Visualizing Textual Embeddings of Stegomalware"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3040-2315","authenticated-orcid":false,"given":"Felix","family":"Feist","sequence":"first","affiliation":[{"name":"Institute for Computer Science, Martin Luther University Halle-Wittenberg, Halle (Saale), Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7698-7554","authenticated-orcid":false,"given":"Sebastian","family":"Karius","sequence":"additional","affiliation":[{"name":"Institute for Computer Science, Martin Luther University Halle-Wittenberg, Halle (Saale), Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6469-9947","authenticated-orcid":false,"given":"Mandy","family":"Kn\u00f6chel","sequence":"additional","affiliation":[{"name":"Institute for Computer Science, Martin Luther University Halle-Wittenberg, Halle (Saale), Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2746-532X","authenticated-orcid":false,"given":"Sandro","family":"Wefel","sequence":"additional","affiliation":[{"name":"Institute for Computer Science, Martin Luther University Halle-Wittenberg, Halle (Saale), Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2025. KDiff3 - Powerful File Comparison and Merging Tool. https:\/\/kdiff3.com\/"},{"key":"e_1_3_3_1_3_2","unstructured":"Adrian Crenshaw. 2025. Unicode Text Steganography Encoders\/Decoders. https:\/\/www.irongeek.com\/i.php?page=security\/unicode-steganography-homoglyph-encoder"},{"key":"e_1_3_3_1_4_2","first-page":"33","volume-title":"SECURWARE 2023: The Seventeenth International Conference on Emerging Security Information, Systems and Technologies","author":"Birnbaum Bernhard","year":"2023","unstructured":"Bernhard Birnbaum, Christian Kr\u00e4tzer, and Jana Dittmann. 2023. Stego-Malware Attribution: Simple Signature and Content-based Features Derived and Validated from Classical Image Steganalysis on Five Exemplary Chosen Algorithms. In SECURWARE 2023: The Seventeenth International Conference on Emerging Security Information, Systems and Technologies. 33\u201342."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1515\/9783110753325"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Krzysztof Cabaj Luca Caviglione Wojciech Mazurczyk Steffen Wendzel Alan Woodward and Sebastian Zander. 2018. The New Threats of Information Hiding: The Road Ahead. IT Professional 20 3 (2018) 31\u201339. 10.1109\/MITP.2018.032501746","DOI":"10.1109\/MITP.2018.032501746"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Luca Caviglione and Wojciech Mazurczyk. 2022. Never Mind the Malware Here\u2019s the Stegomalware. IEEE Security & Privacy 20 5 (Sept. 2022) 101\u2013106. 10.1109\/MSEC.2022.3178205","DOI":"10.1109\/MSEC.2022.3178205"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Janis D\u00e4hne Marcus P\u00f6ckelmann J\u00f6rg Ritter and Paul Molitor. 2022. Putting Collation of Text Witnesses on a Formal Basis. Digital Scholarship in the Humanities 37 2 (June 2022) 375\u2013390. 10.1093\/llc\/fqab058","DOI":"10.1093\/llc\/fqab058"},{"key":"e_1_3_3_1_9_2","unstructured":"Andrey Dolgushev Vasily Berdnikov and Ilya Pomerantsev. 2019. Platinum Is Back. https:\/\/securelist.com\/platinum-is-back\/91135\/"},{"key":"e_1_3_3_1_10_2","unstructured":"Stephen Forrest. 2006. Deogol - HTML Steganography Tool. https:\/\/hord.ca\/projects\/deogol\/"},{"key":"e_1_3_3_1_11_2","unstructured":"Nagham Hamid Abid Yahya R. Badlishah Ahmad and Osamah Al-qershi. 2012. Image Steganography Techniques: An Overview. International Journal of Computer Science and Security 6 (June 2012) 168\u2013187."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.195"},{"key":"e_1_3_3_1_13_2","unstructured":"John W. Ratcliff and David Metzener. 1988. Pattern Matching: The Gestalt Approach. Dr. Dobb\u2019s Journal 13 7 (1988) 46\u201349."},{"key":"e_1_3_3_1_14_2","unstructured":"Jscrambler. 2022. Steganography in a Magecart Attack. https:\/\/jscrambler.com\/blog\/steganography-in-magecart-attack"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Inas\u00a0Jawad Kadhim Prashan Premaratne Peter\u00a0James Vial and Brendan Halloran. 2019. Comprehensive Survey of Image Steganography: Techniques Evaluations and Trends in Future Research. Neurocomputing 335 (March 2019) 299\u2013326. 10.1016\/j.neucom.2018.06.075","DOI":"10.1016\/j.neucom.2018.06.075"},{"key":"e_1_3_3_1_16_2","unstructured":"Kai Willadsen. 2025. Meld - Visual Diff and Merge Tool. https:\/\/meldmerge.org\/"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658664.3659637"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Meike\u00a0Helena Kombrink Zeno Jean Marius\u00a0Hubert Geradts and Marcel Worring. 2025. Image Steganography Approaches and Their Detection Strategies: A Survey. Comput. Surveys 57 2 (Feb. 2025) 1\u201340. 10.1145\/3694965","DOI":"10.1145\/3694965"},{"key":"e_1_3_3_1_19_2","unstructured":"Konstantin Kovshenin. 2017. The Patience Diff Algorithm \u2013 The If Works. https:\/\/blog.jcoglan.com\/2017\/09\/19\/the-patience-diff-algorithm\/"},{"key":"e_1_3_3_1_20_2","unstructured":"Matthew Kwan. 2013. The SNOW Home Page. https:\/\/darkside.com.au\/snow\/"},{"key":"e_1_3_3_1_21_2","unstructured":"Lexinus. 2021. Steganography-in-Text. https:\/\/pypi.org\/project\/steganography-in-text\/"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"Syiham Lokman Aida Mustapha Azizan Ismail and Roshidi Din. 2020. Analysis Review on Linguistic Steganalysis. Indonesian Journal of Electrical Engineering and Computer Science 17 (Feb. 2020) 950. 10.11591\/ijeecs.v17.i2.pp950-956","DOI":"10.11591\/ijeecs.v17.i2.pp950-956"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Mohammed\u00a0Abdul Majeed Rossilawati Sulaiman Zarina Shukur and Mohammad\u00a0Kamrul Hasan. 2021. A Review on Text Steganography Techniques. Mathematics 9 21 (Jan. 2021) 2829. 10.3390\/math9212829","DOI":"10.3390\/math9212829"},{"key":"e_1_3_3_1_24_2","unstructured":"Neatnik LLC. 2021. Neatnik\/Steganographr: Hide Text in Plain Sight Using Invisible Zero-Width Characters. https:\/\/github.com\/neatnik\/steganographr\/tree\/main"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","unstructured":"Marcus P\u00f6ckelmann Andr\u00e9 Medek J\u00f6rg Ritter and Paul Molitor. 2023. LERA - an Interactive Platform for Synoptical Representations of Multiple Text Witnesses. Digital Scholarship in the Humanities 38 1 (April 2023) 330\u2013346. 10.1093\/llc\/fqac021","DOI":"10.1093\/llc\/fqac021"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","unstructured":"Lip\u00a0Yee Por KokSheik Wong and Kok\u00a0Onn Chee. 2012. UniSpaCh: A Text-Based Data Hiding Method Using Unicode Space Characters. Journal of Systems and Software 85 5 (May 2012) 1075\u20131082. 10.1016\/j.jss.2011.12.023","DOI":"10.1016\/j.jss.2011.12.023"},{"key":"e_1_3_3_1_27_2","unstructured":"Python Software Foundation. 2025. Difflib \u2014 Helpers for Computing Deltas. https:\/\/docs.python.org\/3\/library\/difflib.html"},{"key":"e_1_3_3_1_28_2","volume-title":"The 13th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET 2014)","author":"Rauf Rose H. Abdul","year":"2014","unstructured":"Rose H. Abdul Rauf and Nurhafizah Jamal. 2014. Feasibility of Text Visualization in Text Steganalysis. In The 13th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET 2014)."},{"key":"e_1_3_3_1_29_2","unstructured":"Sabyasachi Samanta and Solanki Pattyanayak. 2020. A Significant Survey on Text Steganalysis Techniques. International Journal of Computer Science Engineering (IJCSE) 9 3 (2020) 187\u2013193. http:\/\/www.ijcse.net\/docs\/IJCSE20-09-03-005.pdf"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","unstructured":"Doaa\u00a0A. Shehab and Mohmmed\u00a0J. Alhaddad. 2022. Comprehensive Survey of Multimedia Steganalysis: Techniques Evaluations and Trends in Future Research. Symmetry 14 1 (Jan. 2022) 117. 10.3390\/sym14010117","DOI":"10.3390\/sym14010117"},{"key":"e_1_3_3_1_31_2","unstructured":"Denis Sinegubko. 2020. CSS-JS Steganography in Fake Flash Player Update Malware. https:\/\/blog.sucuri.net\/2020\/11\/css-js-steganography-in-fake-flash-player-update-malware.html"},{"key":"e_1_3_3_1_32_2","unstructured":"Denis Sinegubko. 2021. Whitespace Steganography Conceals Web Shell in PHP Malware. https:\/\/blog.sucuri.net\/2021\/02\/whitespace-steganography-conceals-web-shell-in-php-malware.html"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3670886"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16745-927"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","unstructured":"Nandhini Subramanian Omar Elharrouss Somaya Al-Maadeed and Ahmed Bouridane. 2021. Image Steganography: A Review of the Recent Advances. IEEE Access 9 (2021) 23409\u201323423. 10.1109\/ACCESS.2021.3053998","DOI":"10.1109\/ACCESS.2021.3053998"},{"key":"e_1_3_3_1_36_2","unstructured":"Graham T.2021. Bunnylab\/pyUnicodeSteganography. https:\/\/github.com\/bunnylab\/pyUnicodeSteganography"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","unstructured":"Milad Taleby\u00a0Ahvanooey Qianmu Li Jun Hou Ahmed\u00a0Raza Rajput and Yini Chen. 2019. Modern Text Hiding Text Steganalysis and Applications: A Comparative Analysis. Entropy 21 4 (April 2019) 355. 10.3390\/e21040355","DOI":"10.3390\/e21040355"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","unstructured":"Steffen Wendzel Luca Caviglione Wojciech Mazurczyk Aleksandra Mileva Jana Dittmann Christian Kr\u00e4tzer Kevin Lamsh\u00f6ft Claus Vielhauer Laura Hartmann J\u00f6rg Keller Tom Neubert and Sebastian Zillien. 2022. A Generic Taxonomy for Steganography Methods. 10.36227\/techrxiv.20215373.v2","DOI":"10.36227\/techrxiv.20215373.v2"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","unstructured":"Lingyun Xiang Rong Wang Zhongliang Yang and Yuling Liu. 2022. Generative Linguistic Steganography: A Comprehensive Review. KSII Transactions on Internet and Information Systems (TIIS) 16 3 (March 2022) 986\u20131005. 10.3837\/tiis.2022.03.013","DOI":"10.3837\/tiis.2022.03.013"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6963-7_82"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","unstructured":"Tariq Yousef and Stefan Janicke. 2021. A Survey of Text Alignment Visualization. IEEE Transactions on Visualization and Computer Graphics 27 2 (Feb. 2021) 1149\u20131159. 10.1109\/TVCG.2020.3028975","DOI":"10.1109\/TVCG.2020.3028975"}],"event":{"name":"IH&MMSEC '25: ACM Workshop on Information Hiding and Multimedia Security","location":"San Jose USA","acronym":"IH&MMSEC '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:32Z","timestamp":1750158872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733102.3733136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":40,"alternative-id":["10.1145\/3733102.3733136","10.1145\/3733102"],"URL":"https:\/\/doi.org\/10.1145\/3733102.3733136","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-06-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}