{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T08:56:22Z","timestamp":1768985782183,"version":"3.49.0"},"reference-count":133,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Nanjing Municipal Government Scholarship, Jiangsu province of China.","award":["2016050328"],"award-info":[{"award-number":["2016050328"]}]},{"name":"Project of ZTE Cooperation Research","award":["2016ZTE04-11"],"award-info":[{"award-number":["2016ZTE04-11"]}]},{"name":"Jiangsu province key research and development program: Social development project","award":["BE2017739"],"award-info":[{"award-number":["BE2017739"]}]},{"name":"Jiangsu province key research and development program: Industry outlook and common key technology projects","award":["BE2017100"],"award-info":[{"award-number":["BE2017100"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Modern text hiding is an intelligent programming technique which embeds a secret message\/watermark into a cover text message\/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and steganography has found broad applications in, for instance, covert communication, copyright protection, content authentication, etc. In contrast to text hiding, text steganalysis is the process and science of identifying whether a given carrier text file\/message has hidden information in it, and, if possible, extracting\/detecting the embedded hidden information. This paper presents an overview of state of the art of the text hiding area, and provides a comparative analysis of recent techniques, especially those focused on marking structural characteristics of digital text message\/file to hide secret bits. Also, we discuss different types of attacks and their effects to highlight the pros and cons of the recently introduced approaches. Finally, we recommend some directions and guidelines for future works.<\/jats:p>","DOI":"10.3390\/e21040355","type":"journal-article","created":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T03:39:28Z","timestamp":1554262768000},"page":"355","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5052-5492","authenticated-orcid":false,"given":"Milad","family":"Taleby Ahvanooey","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, China"}]},{"given":"Qianmu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, China"},{"name":"Intelligent Manufacturing Department, Wuyi University, P.O. Box 529020, Jiangmen, China"}]},{"given":"Jun","family":"Hou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, China"}]},{"given":"Ahmed Raza","family":"Rajput","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, China"}]},{"given":"Yini","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,4,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"65981","DOI":"10.1109\/ACCESS.2018.2866063","article-title":"AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media","volume":"6","author":"Ahvanooey","year":"2018","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8011","DOI":"10.1109\/ACCESS.2018.2796585","article-title":"A Review of Text Watermarking: Theory, Methods, and Applications","volume":"6","author":"Kamaruddin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_3","first-page":"5325040","article-title":"A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents","volume":"2018","author":"TAhvanooey","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1080\/19393555.2016.1202356","article-title":"An innovative technique for web text watermarking (AITW)","volume":"25","author":"Ahvanooey","year":"2016","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Rizzo, S.G., Bertini, F., and Montesi, D. (2016, January 11\u201313). Content-preserving Text Watermarking through Unicode Homoglyph Substitution. Proceedings of the 20th International Database Engineering & Applications Symposium (IDEAS \u201916), Montreal, QC, Canada.","DOI":"10.1145\/2938503.2938510"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Rizzo, S.G., Bertini, F., Montesi, D., and Stomeo, C. (August, January 31). Text Watermarking in Social Media. Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, Sydney, Australia.","DOI":"10.1145\/3110025.3116203"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1016\/j.jss.2011.12.023","article-title":"UniSpaCh: A text-based data hiding method using Unicode space characters","volume":"85","author":"Por","year":"2012","journal-title":"J. Syst. Softw."},{"key":"ref_8","first-page":"1","article-title":"Text Steganography using Daily Emotions Monitoring","volume":"7","author":"Patiburn","year":"2017","journal-title":"Int. J. Educ. Manag. Eng."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Zhou, X., Wang, Z., Zhao, W., and Yu, J. (2009, January 26\u201327). Attack Model of Text Watermarking Based on Communications. Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, Xi\u2019an, China.","DOI":"10.1109\/ICIII.2009.529"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.ic.2004.02.003","article-title":"An information-theoretic model for steganography","volume":"192","author":"Cachin","year":"2004","journal-title":"Inf. Comput."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Shiu, H.J., Lin, B.S., Lin, B.S., Huang, P.Y., Huang, C.H., and Lei, C.L. (2017, January 19\u201321). Data Hiding on Social Media Communications Using Text Steganography. Proceedings of the International Conference on Risks and Security of Internet and Systems, Dinard, France.","DOI":"10.1007\/978-3-319-76687-4_15"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIT.2008.921684","article-title":"Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions","volume":"54","author":"Wang","year":"2008","journal-title":"IEEE Trans. Inf."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1515\/eletel-2017-0029","article-title":"Network Information Hiding and Science 2.0: Can it be a Match?","volume":"63","author":"Wendzel","year":"2017","journal-title":"Int. J. Electron. Telecommun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/TE.2016.2520400","article-title":"A Network Steganography Lab on Detecting TCP\/IP Covert Channels","volume":"59","author":"Zseby","year":"2016","journal-title":"IEEE Trans. Educ."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Alotaibi, R.A., and Elrefaei, L.A. (2016, January 6\u20138). Utilizing Word Space with Pointed and Un-pointed Letters for Arabic Text Watermarking. Proceedings of the 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim), Cambridge, UK.","DOI":"10.1109\/UKSim.2016.34"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1353\/chn.2014.0002","article-title":"A SVM based text steganalysis algorithm for spacing coding","volume":"11","author":"Yu","year":"2014","journal-title":"China Commun."},{"key":"ref_17","unstructured":"Banik, B.G., and Bandyopadhyay, S.K. (2018). Novel Text Steganography Using Natural Language Processing and Part-of-Speech Tagging. IETE J. Res., 1\u201312."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"6066","DOI":"10.1002\/sec.1757","article-title":"Text steganography: A novel character-level embedding algorithm using font attribute","volume":"9","author":"Ramakrishnan","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Information hiding-a survey","volume":"87","author":"Petitcolas","year":"1999","journal-title":"Proc. IEEE"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Fateh, M., and Rezvani, M. (2018). An email-based high capacity text steganography using repeating characters. Int. J. Comput. Appl., 1\u20137.","DOI":"10.1080\/1206212X.2018.1517713"},{"key":"ref_21","first-page":"72","article-title":"A high capacity text steganography scheme based on LZW compression and color coding","volume":"20","author":"Malik","year":"2017","journal-title":"Eng. Sci. Technol. Int. J."},{"key":"ref_22","unstructured":"Mahato, S., Khan, D.A., and Yadav, D.K. (2017). A modified approach to data hiding in Microsoft Word documents by change-tracking technique. J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1080\/02533839.2012.734470","article-title":"A robust zero-watermarking algorithm for copyright protection of text documents","volume":"36","author":"Jalil","year":"2013","journal-title":"J. Chin. Inst. Eng."},{"key":"ref_24","first-page":"647","article-title":"A high capacity text steganography scheme based on huffman compression and color coding","volume":"38","author":"Malik","year":"2017","journal-title":"J. Inf. Optim. Sci."},{"key":"ref_25","unstructured":"Rahman, M.S., Khalil, I., Yi, X., and Dong, H. (2017, January 19). Highly imperceptible and reversible text steganography using invisible character based codeword. Proceedings of the PACIS 2017: Twenty First Pacific Asia Conference on Information Systems, Langkawi, Malaysia."},{"key":"ref_26","first-page":"1153","article-title":"Text steganography based on Unicode of characters in multilingual","volume":"3","author":"Rahma","year":"2013","journal-title":"Int. J. Eng. Res. Appl. (IJERA)"},{"key":"ref_27","first-page":"85","article-title":"A hybrid text steganography approach utilizing Unicode space characters and zero-width character","volume":"9","author":"Aman","year":"2017","journal-title":"Int. J. Inf. Technol. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Odeh, A., Elleithy, K., Faezipour, M., and Abdelfattah, E. (2015, January 1). Highly efficient novel text steganography algorithms. Proceedings of the 2015 Long Island Systems, Applications and Technology, Farmingdale, NY, USA.","DOI":"10.1109\/LISAT.2015.7160209"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1563","DOI":"10.1007\/s11277-018-5868-1","article-title":"Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach","volume":"103","author":"Naqvi","year":"2018","journal-title":"Wirel. Pers. Commun."},{"key":"ref_30","first-page":"1","article-title":"Intelligent security algorithm for UNICODE data privacy and security in IOT","volume":"13","author":"Maram","year":"2018","journal-title":"Serv. Comput. Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.ijinfomgt.2018.08.011","article-title":"A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems","volume":"45","author":"Rahman","year":"2019","journal-title":"Int. J. Inf. Manag."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1080\/02533839.2014.981210","article-title":"A zero-watermarking algorithm based on merging features of sentences for Chinese text","volume":"38","author":"Liu","year":"2014","journal-title":"J. Chin. Inst. Eng."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Odeh, A., Elleithy, K., and Faezipour, M. (2014, January 3\u20135). Steganography in text by using MS word symbols. Proceedings of the Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education, Bridgeport, CT, USA.","DOI":"10.1109\/ASEEZone1.2014.6820635"},{"key":"ref_34","first-page":"8","article-title":"An efficient text steganography sheme using Unicode Space Characters","volume":"10","author":"Kumar","year":"2015","journal-title":"Int. J. Comput. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.1007\/s11042-012-1223-9","article-title":"A Huffman compression based text steganography method","volume":"70","author":"Satir","year":"2012","journal-title":"Multimed. Tools Appl."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Kumar, R., Malik, A., Singh, S., and Chand, S. (2016, January 11\u201312). A high capacity email based text steganography scheme using Huffman compression. Proceedings of the 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India.","DOI":"10.1109\/SPIN.2016.7566661"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"54","DOI":"10.18201\/ijisae.05687","article-title":"New Approach in E-mail Based Text Steganography","volume":"3","author":"Tutuncu","year":"2015","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref_38","first-page":"471","article-title":"Data Security Algorithm Using Two-Way Encryption and Hiding in Multimedia Files","volume":"5","author":"Abdullah","year":"2014","journal-title":"Int. J. Sci. Eng. Res."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2385","DOI":"10.1016\/j.jss.2012.05.027","article-title":"A compression-based text steganography method","volume":"85","author":"Satir","year":"2012","journal-title":"J. Syst. Softw."},{"key":"ref_40","unstructured":"Stojanov, I., Mileva, A., and Stojanovic, I. (2014, January 16\u201320). A new property coding in text steganography of Microsoft Word documents. Proceedings of the Eighth International Conference on Emerging Security Information, Systems and Technologies, Lisbon, Portugal."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1007\/s13369-013-0574-5","article-title":"Secure Digital Steganography for ASCII Text Documents","volume":"38","author":"Rafat","year":"2013","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Baawi, S.S., Mokhtar, M.R., and Sulaiman, R. (2018, January 23\u201324). Enhancement of Text Steganography Technique Using Lempel-Ziv-Welch Algorithm and Two-Letter Word Technique. Proceedings of the International Conference of Reliable Information and Communication Technology, Kuala Lumpur, Malaysia.","DOI":"10.1007\/978-3-319-99007-1_49"},{"key":"ref_43","first-page":"26","article-title":"Unicode Text Security Using Dynamic and Key-Dependent 16x16 S-Box (January 4, 2016)","volume":"10","author":"Balajee","year":"2016","journal-title":"Aust. J. Basic Appl. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MAES.2006.284353","article-title":"Digital Text Watermarking: Secure Content Delivery and Data Hiding in Digital Documents","volume":"21","author":"Qadir","year":"2006","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"62","DOI":"10.3844\/jcssp.2016.62.80","article-title":"State-of-the-Art in Techniques of Text Digital Watermarking: Challenges and Limitations","volume":"12","author":"Ali","year":"2016","journal-title":"J. Comput. Sci."},{"key":"ref_46","first-page":"165","article-title":"A Survey of Digital Watermarking Techniques, Applications and Attacks","volume":"2","author":"Singh","year":"2013","journal-title":"Int. J. Eng. Innov. Technol."},{"key":"ref_47","first-page":"9","article-title":"Text Steganographic Approaches: a comparison","volume":"5","author":"Agarwal","year":"2013","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"ref_48","first-page":"122","article-title":"Digital Watermarking Classification: A Survey","volume":"2","author":"Guru","year":"2014","journal-title":"Int. J. Comput. Sci. Trends Technol."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"6365","DOI":"10.1002\/sec.1738","article-title":"Concise analysis of current text automation and watermarking approaches","volume":"9","author":"Alkawaz","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_50","first-page":"99","article-title":"A Meliorated Kashida Based Approach for Arabic Text Steganography","volume":"9","author":"Alhusban","year":"2017","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"6004","DOI":"10.1002\/sec.1752","article-title":"AH4S: An algorithm of text in text steganography using the structure of omega network","volume":"9","author":"Hamdan","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"9","DOI":"10.5121\/ijcses.2013.4602","article-title":"A Study of Various Steganographic Techniques Used for Information Hiding","volume":"4","author":"Sumathi","year":"2013","journal-title":"Int. J. Comput. Sci. Eng. Surv."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1016\/j.chb.2013.07.040","article-title":"Copyright for web content using invisible text watermarking","volume":"30","author":"Mir","year":"2014","journal-title":"Comput. Hum. Behav."},{"key":"ref_54","first-page":"420","article-title":"Lossless Data Hiding Method Using Multiplication Property for HTML File","volume":"1","author":"Sruthi","year":"2015","journal-title":"Int. J. Innov. Res. Sci. Technol."},{"key":"ref_55","first-page":"4895","article-title":"A new method for copyright protection in digital text documents by adding hidden Unicode characters in Persian\/English texts","volume":"8","author":"Ahvanooey","year":"2014","journal-title":"Int. J. Curr. Life Sci."},{"key":"ref_56","first-page":"550","article-title":"A Novel Approach for text watermarking in digital documents by Zero-Width Inter-Word Distance Changes","volume":"4","author":"Ahvanooey","year":"2015","journal-title":"DAV Int. J. Sci."},{"key":"ref_57","first-page":"49","article-title":"A novel zero-watermarking scheme for text document authentication","volume":"75","author":"Bashardoost","year":"2015","journal-title":"J. Teknol."},{"key":"ref_58","first-page":"236","article-title":"Improved capacity Arabic text watermarking methods based on open word space","volume":"30","author":"Alotaibi","year":"2018","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Alginahi, Y.M., Kabir, M., and Tayan, O. (2013, January 7\u20139). An enhanced Kashida-based watermarking approach for Arabic text-documents. Proceedings of the 2013 International Conference on Electronics, Computer and Computation (ICECCO), Ankara, Turkey.","DOI":"10.1109\/ICECCO.2013.6718288"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"381","DOI":"10.17706\/IJCEE.2014.V6.857","article-title":"An Enhanced Kashida-Based Watermarking Approach for Increased Protection in Arabic Text-Documents Based on Frequency Recurrence of Characters","volume":"6","author":"Alginahi","year":"2014","journal-title":"Int. J. Comput. Electr. Eng."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.entcs.2017.02.005","article-title":"Software Watermarking: A Semantics-based Approach","volume":"331","author":"Preda","year":"2017","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Gu, J., and Cheng, Y. (2010, January 16\u201318). A watermarking scheme for natural language documents. Proceedings of the 2010 2nd IEEE International Conference on Information Management and Engineering (ICICES 2010), Chengdu, China.","DOI":"10.1109\/ICIME.2010.5477622"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Jaiswal, R., and Patil, N.N. (2013, January 21\u201322). Implementation of a new technique for web document protection using unicode. Proceedings of the 2013 International Conference on Information Communication and Embedded Systems (ICICES 2013), Chennai, India.","DOI":"10.1109\/ICICES.2013.6508287"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/TIFS.2006.890310","article-title":"A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique","volume":"2","author":"Liu","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.eij.2014.04.002","article-title":"An improved algorithm for information hiding based on features of Arabic text: A Unicode approach","volume":"15","author":"Mohamed","year":"2014","journal-title":"Egypt. Inform. J."},{"key":"ref_66","first-page":"1","article-title":"Robust Digital Text Watermarking Algorithm based on Unicode Extended Characters","volume":"9","author":"Adnan","year":"2016","journal-title":"Indian J. Sci. Technol."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Qin, H., and Kong, T. (2010, January 16\u201318). A novel robust text watermarking for word document. Proceedings of the 3rd International Congress on Image and Signal Processing (CISP2010), Yantai, China.","DOI":"10.1109\/CISP.2010.5648007"},{"key":"ref_68","first-page":"29","article-title":"An Existential Review on Text Watermarking Techniques","volume":"120","author":"Kaur","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref_69","unstructured":"Kim, M.Y. (2008, January 24\u201326). Text watermarking by syntactic analysis. Proceedings of the 12th WSEAS International Conference on Computers (ICC\u2019 08), World Scientific and Engineering Academy and Society, Heraklion, Greece."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Topkara, M., Topkara, U., and Atallah, M.J. (2006, January 30). Words are not enough: Sentence level natural language watermarking. Proceedings of the 4th ACM International Workshop on Contents Protection and Security, Xi\u2019an, China.","DOI":"10.1145\/1178766.1178777"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Topkara, U., Topkara, M., and Atallah, M.J. (2006, January 26\u201327). The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions. Proceedings of the 8th Workshop on Multimedia and Security (MM&Sec \u201906), Geneva, Switzerland.","DOI":"10.1145\/1161366.1161397"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","article-title":"Techniques for data hiding","volume":"35","author":"Bender","year":"1996","journal-title":"IBM Syst. J."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/5.771071","article-title":"Copyright protection for the electronic distribution of text documents","volume":"87","author":"Brassil","year":"1999","journal-title":"Proc. IEEE"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Petrovic, R., Tehranchi, B., and Winograd, J.M. (2007, January 26\u201328). Security of Copy-Control Watermarks. Proceedings of the 8th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services\u2014TELSIKS 2007, Nis, Serbia.","DOI":"10.1109\/TELSKS.2007.4375954"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Vybornova, O., and Macq, B. (2007, January 13\u201315). Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis. Proceedings of the IEEE International Conference on Information Reuse and Integration, Las Vegas, NV, USA.","DOI":"10.1109\/IRI.2007.4296617"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Jalil, Z., Mirza, A.M., and Iqbal, T. (2010, January 14\u201316). A zero-watermarking algorithm for text documents based on structural components. Proceedings of the IEEE International Conference on Information and Emerging Technologies, Karachi, Pakistan.","DOI":"10.1109\/ICIET.2010.5625705"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s13319-017-0118-y","article-title":"Replacement Attack: A New Zero Text Watermarking Attack","volume":"8","author":"Bashardoost","year":"2017","journal-title":"3D Res."},{"key":"ref_78","first-page":"25","article-title":"Content Authentication of English Text via Internet using Zero Watermarking Technique and Markov Model","volume":"7","author":"Ghilan","year":"2014","journal-title":"Int. J. Appl. Inf. Syst."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Tanha, M., Torshizi, S.D.S., Abdullah, M.T., and Hashim, F. (2012, January 26\u201328). An overview of attacks against digital watermarking and their respective countermeasures. Proceedings of the IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, Malaysia.","DOI":"10.1109\/CyberSec.2012.6246095"},{"key":"ref_80","unstructured":"Meral, H.M., Sevin\u00e7, E., Unkar, E., Sankur, B., \u00d6zsoy, A.S., and G\u00fcng\u00f6r, T. (2007, January 28). Natural language watermarking via morphosyntactic alterations. Proceedings of the SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA."},{"key":"ref_81","first-page":"107","article-title":"Natural language watermarking via morphosyntactic alterations","volume":"23","author":"Meral","year":"2009","journal-title":"Comput. Lang."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Kim, M.-Y., Zaiane, O.R., and Goebel, R. (2010, January 19\u201323). Natural Language Watermarking Based on Syntactic Displacement and Morphological Division. Proceedings of the Computer Software and Applications Conference Workshops (IEEE COMPSACW), Seoul, South Korea.","DOI":"10.1109\/COMPSACW.2010.37"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Halvani, O., Steinebach, M., Wolf, P., and Zimmermann, R. (2013, January 17\u201319). Natural language watermarking for german texts. Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France.","DOI":"10.1145\/2482513.2482522"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Mali, M.L., Patil, N.N., and Patil, J.B. (2013, January 6\u20138). Implementation of Text Watermarking Technique Using Natural Language Watermarks. Proceedings of the IEEE International Conference on Communication Systems and Network Technologies, Gwalior, India.","DOI":"10.1109\/CSNT.2013.106"},{"key":"ref_85","unstructured":"Lu, H., Guangping, M., Dingyi, F., and Xiaolin, G. (2009, January 20\u201321). Resilient natural language watermarking based on pragmatics. Proceedings of the IEEE Youth Conference on Information, Computing and Telecommunication (YC-ICT \u201909), Beijing, China."},{"key":"ref_86","first-page":"141","article-title":"Secret communication through web pages using special space codes in HTML files","volume":"6","author":"Lee","year":"2008","journal-title":"Int. J. Appl. Sci. Eng."},{"key":"ref_87","unstructured":"Cheng, W., Feng, H., and Yang, C. (2010, January 17\u201319). A robust text digital watermarking algorithm based on fragments regrouping strategy. Proceedings of the IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, China."},{"key":"ref_88","unstructured":"Gutub, A.A.A., Ghouti, L., Amin, A.A., Alkharobi, T.M., and Ibrahim, M. (2007, January 28\u201331). Utilizing extension character \u2018Kashida\u2019 with pointed letters 469 for Arabic text digital watermarking. Proceedings of the SECRYPT 2007, Barcelona, Spain."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Chou, Y.-C., Huang, C.-Y., and Liao, H.-C. (2012, January 25\u201328). A Reversible Data Hiding Scheme Using Cartesian Product for HTML File. Proceedings of the Sixth International Conference on Genetic and Evolutionary Computing (ICGEC), Kitakushu, Japan.","DOI":"10.1109\/ICGEC.2012.30"},{"key":"ref_90","unstructured":"Odeh, A., and Elleithy, K. (2013, January 4\u20136). Steganography in Text by Merge ZWC and Space Character. Proceedings of the 28th International Conference on Computers and Their Applications (CATA-2013), Honolulu, HI, USA."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M. (2008, January 6\u20139). Pseudo-space Persian\/Arabic text steganography. Proceedings of the IEEE Symposium on Computers and Communications ISCC, Marrakech, Morocco.","DOI":"10.1109\/ISCC.2008.4625605"},{"key":"ref_92","first-page":"502","article-title":"A Novel Arabic Text Steganography Method Using Letter Points and Extensions","volume":"1","author":"Gutub","year":"2007","journal-title":"Int. J. Comput. Electr. Autom. Control Inf. Eng."},{"key":"ref_93","first-page":"107","article-title":"High Capacity Steganography Tool for Arabic Text Using \u2018Kashida\u2019","volume":"2","author":"Gutub","year":"2010","journal-title":"ISC Int. J. Inf. Secur."},{"key":"ref_94","first-page":"68","article-title":"Improved Method of Arabic Text Steganography Using the Extension \u2018Kashida\u2019 Character","volume":"3","author":"Gutub","year":"2010","journal-title":"Bahria Univ. J. Inf. Commun. Technol."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Al-Nazer, A., and Gutub, A. (2009, January 19\u201321). Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography. Proceedings of the 2009 Third International Conference on Network and System Security, Gold Coast, QLD, Australia.","DOI":"10.1109\/NSS.2009.21"},{"key":"ref_96","unstructured":"Al-Nofaie, S.M., Fattani, M.M., and Gutub, A.A.A. (2016, January 4\u20135). Capacity Improved Arabic Text Steganography Technique Utilizing \u2018Kashida\u2019 with Whitespaces. Proceedings of the 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE 2016), Lankawi, Malaysia."},{"key":"ref_97","first-page":"59","article-title":"Merging Two Steganography Techniques Adjusted to Improve Arabic Text Data Security","volume":"6","author":"Fattani","year":"2016","journal-title":"J. Comput. Sci. Comput. Math."},{"key":"ref_98","first-page":"556","article-title":"WoDiCoF-A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms","volume":"24","author":"Keidel","year":"2018","journal-title":"J. Univers. Comput. Sci."},{"key":"ref_99","first-page":"56","article-title":"Software-Based Protection Is Moving to the Mainstream","volume":"28","author":"Gu","year":"2011","journal-title":"IEEE Comput. Soc."},{"key":"ref_100","first-page":"735","article-title":"Whitesteg: A new scheme in information hiding using text steganography","volume":"7","author":"Por","year":"2008","journal-title":"Wseas Trans. Comput."},{"key":"ref_101","unstructured":"(2019, March 30). The Unicode Standard. Available online: http:\/\/www.unicode.org\/standard\/standard.html."},{"key":"ref_102","unstructured":"Unicode (2019, March 30). Wikipedia (the Free Encyclopedia), December 2018. Available online: https:\/\/en.wikipedia.org\/wiki\/Unicode."},{"key":"ref_103","unstructured":"(2019, March 30). Unicode Control Characters. Available online: http:\/\/www.fileformat.info\/info\/unicode\/char\/search.htm."},{"key":"ref_104","first-page":"161","article-title":"La cryptographie militaire","volume":"IX","author":"Kerckhoffs","year":"1883","journal-title":"J. Sci. Mil."},{"key":"ref_105","unstructured":"Din, R., Tuan Muda, T.Z., Lertkrai, P., Omar, M.N., Amphawan, A., and Aziz, F.A. (2012, January 24\u201326). Text steganalysis using evolution algorithm approach. Proceedings of the 11th WSEAS International Conference on Information Security and Privacy (ISP\u201912), Prague, Czech Republic."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Din, R., Samsudin, A., and Lertkrai, P. (2012). A Framework Components for Natural Language Steganalysis. Int. J. Comput. Eng., 641\u2013645.","DOI":"10.7763\/IJCTE.2012.V4.548"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Mazurczyk, W., Wendzel, S., and Cabaj, K. (2018, January 27\u201330). Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany.","DOI":"10.1145\/3230833.3233261"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Simmons, G.J. (1984). The prisoner\u2019s problem and the subliminal channel. Advances in Cryptology, Plenum Press.","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"ref_109","first-page":"61","article-title":"A new method for pdf steganography in justified texts","volume":"145","author":"Khosravi","year":"2019","journal-title":"JISA."},{"key":"ref_110","first-page":"30","article-title":"A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks","volume":"8","author":"Ahvanooey","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Khairullah, M. (2018). A novel steganography method using transliteration of Bengali text. J. King Saud Univ. Comput. Inf. Sci.","DOI":"10.1016\/j.jksuci.2018.01.008"},{"key":"ref_112","unstructured":"Kim, Y.-W., Moon, K.-A., and Oh, I.-S. (July, January 27). A text watermarking algorithm based on word classification and inter-word space statistics. Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR \u201903), Washington, DC, USA."},{"key":"ref_113","first-page":"685","article-title":"Watermarking electronic text documents containing justified paragraphs and irregular line spacing","volume":"5306","author":"Alattar","year":"2004","journal-title":"Electron. Imaging"},{"key":"ref_114","unstructured":"Low, S., Maxemchuk, N., Brassil, J., and O\u2019Gorman, L. (1995, January 2\u20136). Document marking and identification using both line and word shifting. Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Bringing Information to People (INFOCOM \u201995), Boston, MA, USA."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1504\/IJESDF.2018.10009832","article-title":"Information hiding: Arabic text steganography by using Unicode characters to hide secret data","volume":"10","author":"Memon","year":"2018","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"ref_116","unstructured":"Shirali-Shahreza, M. (2006, January 10\u201312). A New Approach to Persian\/Arabic Text Steganography. Proceedings of the 5th IEEE\/ACIS International Conference on Computer and Information Science and 1st IEEE\/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (ICIS-COMSAR\u201906), Honolulu, HI, USA."},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Aabed, M.A., Awaideh, S.M., Elshafei, A.-R.M., and Gutub, A.A. (2007, January 24\u201327). Arabic Diacritics based Steganography. Proceedings of the 2007 IEEE International Conference on Signal Processing and Communications, United Arab Emirates.","DOI":"10.1109\/ICSPC.2007.4728429"},{"key":"ref_118","unstructured":"Gutub, A., Elarian, Y., Awaideh, S., and Alvi, A. (2008, January 18\u201320). Arabic text steganography using multiple diacritics. Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications (WoSPA08), University of Sharjah, Sharjah, UAE."},{"key":"ref_119","first-page":"232","article-title":"Evaluation of steganography for urdu\/arabic text","volume":"4","author":"Memon","year":"2005","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_120","unstructured":"Nagarhalli, T.P. (2014, January 6\u20137). A new approach to SMS text steganography using emoticons. Proceedings of the International Journal of Computer Applications (0975\u20138887) National Conference on Role of Engineers in Nation Building (NCRENB-14), VIVA Institute of Technology, Maharashtra, India."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Ahmad, T., Sukanto, G., Studiawan, H., Wibisono, W., and Ijtihadie, R.M. (, January 7\u20138). Emoticon-based steganography for securing sensitive data. Proceedings of the 2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE), Yogyakarta, Indonesia.","DOI":"10.1109\/ICITEED.2014.7007904"},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Iranmanesh, V., Wei, H.J., Dao-Ming, S.L., and Arigbabu, O.A. (2015, January 25\u201327). On using emoticons and lingoes for hiding data in SMS. Proceedings of the 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), Melaka, Malaysia.","DOI":"10.1109\/ISTMET.2015.7359010"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M. (2008). A New Persian\/Arabic Text Steganography Using \u201cLa\u201d Word. Advances in Computer and Information Sciences and Engineering, Springer.","DOI":"10.1109\/IAS.2008.12"},{"key":"ref_124","first-page":"29","article-title":"Hiding Data in Text using ASCII Mapping Technology (AMT)","volume":"70","author":"Bhattacharyya","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Kingslin, S., and Kavitha, N. (2015). Evaluative Approach towards Text Steganographic Techniques. J. Sci. Technol., 8.","DOI":"10.17485\/ijst\/2015\/v8i1\/84415"},{"key":"ref_126","unstructured":"Thamaraiselvan, R., and Saradha, A. (2012). A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography. Int. J. Comput. Eng. Res., 1405\u20131409."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Ryabko, B., and Ryabko, D. (2007, January 24\u201329). Information-theoretic approach to steganographic systems. Proceedings of the 2007 IEEE International Symposium on Information Theory, Nice, France.","DOI":"10.1109\/ISIT.2007.4557588"},{"key":"ref_128","unstructured":"Chen, R.X. (arXiv, 2016). A Brief Introduction on Shannon\u2019s Information Theory, arXiv."},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"2057","DOI":"10.1109\/18.720531","article-title":"Fifty years of Shannon theory","volume":"44","year":"1998","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"280","DOI":"10.3390\/e3040280","article-title":"A possible extension of Shannon\u2019s information theory","volume":"3","author":"Yamano","year":"2001","journal-title":"Entropy"},{"key":"ref_131","unstructured":"Rico-Larmer, S.M. (2016, January 4). Cover Text Steganography: N-gram and Entropybased Approach. Proceedings of the 2016 KSU Conference on Cybersecurity Education, Research and Practice, Kennesaw State University, Kennesaw, GA, USA. Available online: https:\/\/digitalcommons.kennesaw.edu\/ccerp\/2016\/Student\/16."},{"key":"ref_132","unstructured":"Menzes, A., van Oorschot, P., and Vanstone, S. (1996). Handbook of Applied Cryptography, CRC Press."},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Ryabko, B., and Fionov, A. (2005). Basics of Contemporary Cryptography for IT Practitioners, World Scientific Pub. Co. Pte Lt.","DOI":"10.1142\/9789812703309"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/4\/355\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:42:06Z","timestamp":1760186526000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/4\/355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":133,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2019,4]]}},"alternative-id":["e21040355"],"URL":"https:\/\/doi.org\/10.3390\/e21040355","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}