Annotated Bibliography 9/19/2018

Items Listed by Year and Author 2001-2002 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 Annotation Key

2001-2002

  • Chapman, M., Davida, G. I., & Rennhard, M. (2001, October). A practical and effective approach to large-scale automated linguistic steganography. In Intl. Conf. on Information Security (pp. 156-165). Springer, Berlin, Heidelberg.
    CODE, WORD, REPL, SEM
  • Chapman, M., & Davida, G. (2002). Plausible deniability using automated linguistic stegonagraphy. (sic) In Infrastructure Security (pp. 276-287). Springer, Berlin, Heidelberg.
    CODE, WORD, REPL, SEM

2004

  • Bennett, K. (2004). Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. CERIAS Tech Report 2004-13.
    SURV, CODE, DETECT, SEM
  • Bergmair, R. (2004). Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. Final year thesis, B. Sc.(Hons.) in Computer Studies, The University of Derby.
    SURV, CODE, WORD, REPL
  • Bergmair, R. (2004, September). Natural Language Steganography and an “AI-complete” Security Primitive.21st Chaos Communication Congress,
    CODE, WORD, REPL
  • Bolshakov, I. A., & Gelbukh, A. (2004, June). Synonymous paraphrasing using Wordnet and Internet. In Intl. Conf. on Application of Natural Language to Information Systems (pp. 312-323). Springer, Berlin, Heidelberg.
    CODE, WORD, REPL, SEM
  • Bolshakov, I. A. (2004, May). A method of linguistic steganography based on collocationally-verified synonymy. In International Workshop on Information Hiding (pp. 180-191). Springer, Berlin, Heidelberg.
    CODE, WORD, REPL, SEM

2005

  • Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., & Atallah, M. (2005, June). Translation-based steganography. In Intl. Workshop on Information Hiding pp. 219-233). Springer, Berlin, Heidelberg.
    CODE, TRANS, SENT, SEM
  • Takizawa, O., Makino, K., Matsumoto, T., Nakagawa, H., & Murase, I. (2005, September). Method of hiding information in agglutinative language documents using adjustment to new line positions. In Intl. Conf. on Knowledge-Based and Intelligent Information and Engineering Systems (pp. 1039-1048). Springer, Berlin, Heidelberg.
    CODE, INS, FORM, LANG(Japanese, Korean)
  • Topkara, M., Taskiran, C. M., & Delp, E. J. (2005, March). Natural language watermarking. In Security, Steganography, and Watermarking of Multimedia Contents VII 5681 , pp. 441-453). Intl. Society for Optics and Photonics.
    WATER, CODE, COMB, SENT, SYNT – trans grammar

2006

  • Bergmair, R., & Katzenbeisser, S. (2006, July). Content-aware steganography: about lazy prisoners and narrow-minded wardens. In Intl. Workshop on Information Hiding (pp. 109-123). Springer, Berlin, Heidelberg.
    CODE, WORD, REPL, SEM
  • Chand, V., & Orgun, C. O. (2006, January). Exploiting linguistic features in lexical steganography: design and proof-of-concept implementation. In System Sciences, 2006. HICSS’06. Proc. 39th Annual Hawaii Intl. Conf. on 6 126b-126b. IEEE.
    CODE, WORD, REPL, SEM, CRYPT
  • Shirali-Shahreza, M. H., & Shirali-Shahreza, M. (2006, July). A new approach to Persian/Arabic text steganography. In 1st IEEE/ACIS Intl. Workshop on Component-Based Software Engineering, Software Architecture and Reuse. ICIS-COMSAR 2006. 5th IEEE/ACIS Intl. Conf. on (pp. 310-315). IEEE.
    CODE, SYMB, REPL, GLYPH, LANG(Arabic, Persian)
  • Stutsman, R., Grothoff, C., Atallah, M., & Grothoff, K. (2006, April). Lost in just the translation. In Proc. 2006 ACM symposium on Applied computing (pp. 338-345). ACM.
    CODE, TRANS, SENT, SEM
  • Taskiran, C. M., Topkara, U., Topkara, M., & Delp, E. J. (2006, February). Attacks on lexical natural language steganography systems. In Security, Steganography, and Watermarking of Multimedia Contents VIII (Vol. 6072, p. 607209). Intl. Society for Optics and Photonics.
    DETECT, WORD, REPL. SEM
  • Topkara, U., Topkara, M., & Atallah, M. J. (2006, September). The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In Proc. 8th workshop on Multimedia and security (pp. 164-174). ACM.
    WATER, WORD, REPL, SEM
  • Topkara, M., Topkara, U., & Atallah, M. J. (2006, October). Words are not enough: sentence level natural language watermarking. In Proc. 4th ACM Intl. workshop on Contents protection and security (pp. 37-46). ACM.
    WATER, WORD, REPL, SYNT

2007

  • Gutub, A., & Fattani, M. (2007). A novel Arabic text steganography method using letter points and extensions. www.researchgate.com 8/31/2018.
    CODE, SYMB, REPL, LANG(Arabic)
  • Liu, T. Y., & Tsai, W. H. (2007). A new steganographic method for data hiding in Microsoft word documents by a change tracking technique. IEEE Trans. on Information Forensics and Security, 2(1), 24-30.
    CODE, GEN, DEL, REPL, PERM, WORD, PHR, FORM
  • Meral, H. M., Sevinc, E., Ünkar, E., Sankur, B., Özsoy, A. S., & Güngör, T. (2007, March). Syntactic tools for text watermarking. In Security, Steganography, and Watermarking of Multimedia Contents IX (Vol. 6505, p. 65050X). Intl. Society for Optics and Photonics.
    WATER, WORD, REPL, SENT, COMB, LANG(Turkish)
  • Murphy, B., & Vogel, C. (2007, February). Statistically-constrained shallow text marking: techniques, evaluation paradigm and results. Security, Steganography, and Watermarking of Multimedia Contents IX (Vol. 6505, p. 65050Z). Intl. Society for Optics and Photonics.
    CODE, WORD, REPL, SEM
  • Topkara, M., Topkara, U., & Atallah, M. J. (2007, February). Information hiding through errors: a confusing approach. In Security, Steganography, and Watermarking of Multimedia Contents IX (Vol. 6505, p. 65050V). Intl.
    CODE, WORD, INS, DEL, REPL, ERR, SPELL
  • Vybornova, O., & Macq, B. (2007, August). Natural language watermarking and robust hashing based on presuppositional analysis. In Information Reuse and Integration, 2007. IRI 2007. IEEE International Conference on (pp. 177-182). IEEE.
    WATER, PERM, COMB, PHR, SENT, SEM
  • Yuling, L., Xingming, S., Can, G., & Hong, W. (2007, July). An efficient linguistic steganography for Chinese text. In Multimedia and Expo, 2007 IEEE Intl. Conf. on (pp. 2094-2097). IEEE.
    CODE, WORD, REPL, LANG(Chinese)

2008

  • Chen, Z., Huang, L., Yu, Z., Yang, W., Li, L., Zheng, X., & Zhao, X. (2008, March). A statistical algorithm for linguistic steganography detection based on distribution of words. In Computer and Information Technology Workshops, 2008. CIT Workshops 2008. IEEE 8th Intl. Conf. on (pp. 224-229). IEEE.
    DETECT, STAT
  • Chen, Z., Huang, L., Yu, Z., Yang, W., Li, L., Zheng, X., & Zhao, X. (2008, May). Linguistic steganography detection using statistical characteristics of correlations between words. In Intl. Workshop on Information Hiding (pp. 224-235). Springer, Berlin, Heidelberg.
    DETECT, STAT, REV
  • Chen, Z. L., Huang, L. S., Yu, Z. S., Zhao, X. X., & Zhao, X. L. (2008, July). Effective linguistic steganography detection. In Computer and Information Technology Workshops, 2008. CIT Workshops 2008. IEEE 8th Intl. Conf. on (pp. 224-229). IEEE.
    DETECT, STAT, REV
  • Desoky, A., Younis, M., & El-Sayed, H. (2008, December). Auto-summarization-based steganography. In Innovations in Information Technology, 2008. IIT 2008. Intl. Conf. on (pp. 608-612). IEEE.
    CODE, SUM, SEM
  • El Abbadi, N. K. (2008). New Algorithm for Text in Text Steganography. Al-Rafidain University College For Sciences, (23), 99-112.
    CODE, GLYPH, FORM
  • Gutub, A., Elarian, Y., Awaideh, S., & Alvi, A. (2008). Arabic text steganography using multiple diacritics. www.researchgate.com 8/31/2018.
    CODE, SYMB, REPL, SPELL, LANG(Arabic),
  • Kim, M. Y. (2008, July). Text watermarking by syntactic analysis. In Proc. of WSEAS Intl. Conferences on Computers (pp. 904-909).
    CODE, WORD, PHRASE, PERM, SYNT, LANG(Korean)
  • Liu, Y., Sun, X., Liu, Y., & Li, C. T. (2008). MIMIC-PPT: Mimicking-based steganography for Microsoft Power Point document. Inform. Technol. Journal 7, 654-660.
    CODE, WORD, REPL, FORM
  • Memon, J. A., Khowaja, K., & Kazi, H. (2008). Evaluation of Steganography for Urdu/Arabic Text. Journal of Theoretical & Applied Information Technology, 4(3).
    CODE, SYMB, REPL, GLYPH, LANG(Urdu, Arabic)
  • Nanhe, A. M., Kunjir, M. P., & Sakdeo, S. V. (2008). Improved Synonym Approach to Linguistic Steganography Design and Proof-of-Concept Implementation. www.academia.edu 8/31/2018
    CODE, WORD, REPL, SEM
  • Por, L. Y., Ang, T. F., & Delina, B. (2008). Whitesteg: a new scheme in information hiding using text steganography. WSEAS Trans. on Computers, 7(6), 735-745.
    CODE, SYMB, INS, FORM
  • Por, L. Y., & Delina, B. (2008, April). Information hiding: A new approach in text steganography. In WSEAS Intl. Conference. Proc. Mathematics and Computers in Science and Engineering (No. 7). World Scientific and Engineering Academy and Society.
    CODE, SYMB, INS, FORM, REV
  • Por, L. Y., Ang, T. F., & Delina, B. (2008). Whitesteg: a new scheme in information hiding using text steganography. WSEAS Trans. on Computers, 7(6), 735-745.
    CODE, SYMB, INS, FORM, REV
  • Shirali-Shahreza, M., & Shirali-Shahreza, S. (2008). High capacity Persian-Arabic text steganography. Applied Sci, 8, 4173-4179.
    CODE, SYMB, REPL, FORM, LANG(Persian, Arabic)
  • Tidake, M. V., Pukale, S. G., & Dhore, M. L. (2008). Steganography in MS Word Document using its In-built Features. Proc. ICCNS, 8, 27-28.
    CODE, FORM, INS, DEL, WORD,
  • Wang, H., Sun, X., Liu, Y., & Liu, Y. (2008). Natural language watermarking using Chinese syntactic transformations. Information Technology Journal, 7(6), 904-910.
    WATER, WORD, PHRASE, PERM, SYNT, LANG(Chinese)
  • Wyseur, B., Wouters, K., & Preneel, B. (2008). Lexical natural language steganography systems with human interaction. In ECIW2008-7th European Conf. on Information Warfare and Security: ECIW2008 (p. 313). Academic Conferences Limited.
    CODE, WORD, REPL, SEM
  • Yu, Z., Huang, L., Chen, Z., Li, L., Zhao, X., & Zhu, Y. (2008, December). Detection of synonym-substitution modified articles using context information. In Future Generation Communication and Networking, 2008. FGCN’08. Second Intl. Conf. on (Vol. 1), pp. 134-139). IEEE.
    DETECT, WORD, REPL, SEM

2009

  • Al-Haidari, F., Gutub, A., Al-Kahsah, K., & Hamodi, J. (2009, May). Improving security and capacity for Arabic text steganography using ‘ Kashida’extensions. In Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS Intl. Conf. on (pp. 396-399). IEEE.
    CODE, SYMB, REPL, GLYPH, LANG(Arabic)
  • Desoky, A., & Younis, M. (2009). Chestega: chess steganography methodology. Security and Communication Networks, 2(6), 555-566.
    CODE, DETECT, MULTI, DOM
  • Grothoff, C., Grothoff, K., Stutsman, R., Alkhutova, L., & Atallah, M. (2009). Translation-based steganography. Journal of Computer Security, 17(3), 269-303.
    CODE, TRANS, SENT, SEM, REV
  • Kermanidis, K. L., & Magkos, E. (2009, March). Empirical paraphrasing of modern Greek text in two phases: an application to steganography. Intl. Conf. on Intelligent Text Processing and Computational Linguistics (pp. 535-546). Springer, Berlin, Heidelberg.
    CODE, SUM, GRAM, LANG(Greek)
  • Mansor, S., Din, R., & Samsudin, A. (2009). Analysis of natural language steganography. Intl. Journal of Computer Science and Security IJCSS), 3(2), 113.
    SURV
  • Meral, H. M., Sankur, B., Özsoy, A. S., Güngör, T., & Sevinç, E. (2009). Natural language watermarking via morphosyntactic alterations. Computer Speech & Language, 23(1), 107-125.
    WATER, WORD, INS, REPL, LANG(Turkish)
  • Oren, Y., & Wool, A. (2009). Perfect privacy for webmail with secret sharing. www.semanticscholar.org 8/31/2018
    CODE, MULTI, WORD,
  • Singh, H., Singh, P. K., & Saroha, K. (2009, February). A survey on text based steganography. In Proc. 3rd National Conf. INDIA-COM-2009 (pp. 26-27).
    SURV

2010

  • Adesina, A. O., Nyongesa, H. O., & Agbele, K. K. (2010, May). Digital watermarking: A state-of-the-art review. In IST-Africa, 2010 (pp. 1-8). IEEE.
    WATER, SURV
  • Ali, A., & Moayad, F. (2010). Arabic text steganography using Kashida extensions with Huffman code. Journal of Applied Sciences, 10, 436-439.
    CODE, SYMB, REPL, GLYPH, LANG(Arabic)
  • Bhattacharyya, S., Banerjee, I., & Sanyal, G. (2010, July). Design and implementation of a Secure Text Based Steganography Model. In Security and Management (pp. 690-696).
    CODE, FORM, INS, GLYPH
  • Bhattacharyya, S., Sinha, D., & Sanyal, G. (2010). A Secured Data Transmission Technique Using The Combined Approach Of Text And Image Steganography. Researchgate.com 8/31/2018
    CODE, FORM, INS, GLYPH, REV
  • Chang, C. Y., & Clark, S. (2010, October). Practical linguistic steganography using contextual synonym substitution and vertex colour coding. In Proc. 2010 Conf. on Empirical Methods in Natural Language Processing (pp. 1194-1203). Association for Computational Linguistics.
    CODE, SYMB, REPL, SEM
  • Chang, C. Y., & Clark, S. (2010, June). Linguistic steganography using automatically generated paraphrases. In Human Language Technologies: The 2010 Annual Conf. of the North American Chapter of the Association for Computational Linguistics (pp. 591-599). Association for Computational Linguistics.
    CODE, SUM, SEM
  • Changder, S., Ghosh, D., & Debnath, N. C. (2010, July). LCS based text steganography through Indian Languages. In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE Intl. Conf. on (Vol. 8, pp. 53-57). IEEE.
    CODE, SYMB, INS, SYNT, MULTI, LANG(Indian)
  • Chen, Z., Huang, L., Meng, P., Yang, W., & Miao, H. (2010, October). Blind linguistic steganalysis against translation based steganography. Intl. Workshop on Digital Watermarking (pp. 251-265). Springer, Berlin, Heidelberg.
    DETECT, TRANS, STAT
  • Fiore, U. (2010). Selective redundancy removal: a framework for data hiding. Future Internet, 2(1), 30-40.
    CODE, DEL, FORM, DOM
  • Gutub, Adnan, Ghouti, Lahouri, Elarian, Yousef, Awaideh, Sameh, & Alvi, A. K. (2010). Utilizing diacritic marks for Arabic text steganography. Kuwait Journal of Science & Engineering (KJSE), 37(1), 89-109.
    CODE, REPL, SYMB, GLYPH, LANG(Arabic)
  • Kim, M. Y., Zaiane, O. R., & Goebel, R. (2010, July). Natural language watermarking based on syntactic displacement and morphological division. In Computer Software and Applications Conf. Workshops (COMPSACW), 2010 IEEE 34th Annual (pp. 164-169). IEEE.
    WATER, WORD, SENT, REPL, PERM, SPELL, SYNT, LANG(Korean)
  • Morran, M., & Weir, G. R. (2010, September). An Approach to Textual Steganography. Intl. Conf. on Global Security, Safety, and Sustainability (pp. 48-54). Springer, Berlin, Heidelberg.
    CODE, WORD, REPL, SEM
  • Munoz, A., Carracedo, J., & Álvarez, I. A. (2010, June). Measuring the security of linguistic steganography in Spanish based on synonymous paraphrasing with WSD. In 2010 10th IEEE Intl. Conf. on Computer and Information Technology (CIT 2010) (pp. 965-970). IEEE.
    CODE, WORD, REPL, LANG(Spanish)
  • Muñoz, A., Carracedo, J., & Álvarez, I. A. (2010, June). Hiding short secret messages based on linguistic steganography and manual annotation. In Computer and Information Technology (CIT), 2010 IEEE 10th Intl. Conf. on (pp. 960-964). IEEE.
    CODE, WORD,REPL, MULTI, LANG(Spanish)
  • Pathak, M. (2010). A new approach for text steganography using Hindi numerical code. Intl. Journal Comput Appl, 1(8), 199-202.
    CODE, NUM, GLYPH, SPELL, LANG(India)
  • Popovic, N., Mircevski J. (2010) About Feasible usage of the Steganography in Public Administration. In 7th Intl. Conf. for Informatics and Information Technology, 2010.
    SURV, CODE
  • Rafat, K. F., & Sher, M. (2010). State Of The Art In Digital Steganography Focusing ASCII Text Documents. Intl. Journal of Computer Science & Information Security 7(2) , 63-72.
    SURV
  • Shirali-Shahreza, M. H., & Shirali-Shahreza, M. (2010). Arabic/Persian text steganography utilizing similar letters with different codes. The Arabian Journal For Science And Engineering, 35(1b).
    CODE, SYMB, REPL, GLYPH, LANG(Arabic, Persian)
  • Urbanovich, P., Chourikov, K., Rimorev, A., & Urbanovich, N. (2010). Text steganography application for protection and transfer of the information. www.belstu.by 8/31/2018
    SURV
  • Vaughn, R. (2010). U.S. Patent No. 7,646,868. Washington, DC: U.S. Patent and Trademark Office. Method for Steganographic Cryptography.
    CODE, WORD, REPL
  • Weir, G. R., & Morran, M. (2010). Hiding the hidden message: approaches to textual steganography. Intl. Journal of Electronic Security and Digital Forensics, 3(3), 223-233.
    CODE, WORD, REPL
  • Yang, H., & Cao, X. (2010). Linguistic steganalysis based on meta features and immune mechanism. Chinese Journal of Electronics, 19(4), 661-666.
    DETECT, WORD, STAT
  • Zaidan, A. A., Zaidan, B. B., Al-Frajat, A. K., & Jalab, H. A. (2010). Investigate the capability of applying hidden data in text file: An overview. Journal of Applied Sciences (Faisalabad), 10(17), 1916-1922.
    SURV, CODE

2011

  • Banerjee, I. (2011). Text Steganography using Article Mapping Technique (AMT) and SSCE. Journal of Global Research in Computer Science, 2(4).
    CODE, GLYPH, REPL, NUM, MULTI
  • Bhattacharyya, S., Banerjee, I., & Sanyal, G. (2011). Bengali steganography using CALP with a novel Bengali word processor. INFOCOMP, 10(4), 40-56.
    CODE, GLYPH, REPL, NUM, LANG(Bengali)
  • Bhattacharyya, S. (2011). Hiding data in text through changing in alphabet letter patterns (CALP). Journal of Global Research in Computer Science, 2(3).
    CODE, GLYPH, REPL, NUM, REV
  • Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2011, January). Novel text steganography through special code generation. In Intl. Conf. on Systemics, Cybernetics and Informatics (pp. 298-303).
    CODE, GLYPH, REPL, NUM, REV
  • Bhattacharyya, S. (2011). Text Steganography using CALP with High Embedding Capacity. Journal of Global Research in Computer Science, 2(5), 29-36.
    CODE, GLYPH, REPL, NUM, REV
  • Castiglione, A., D’Alessio, B., De Santis, A., & Palmieri, F. (2011). Hiding Information into OOXML Documents: New Steganographic Perspectives. JoWUA, 2(4), 59-83.
    CODE, FORM, MULTI
  • Danková, E., Fanfara, P., Ádám, N., & Dufala, M. (2011). Source file copyright protection. Intl. Scientific Conf. Informatics 2011, 132-137.
    WATER, FORM, MULTI
  • Desoky, A. (2011). Matlist: Mature linguistic steganography methodology. Security and Communication Networks, 4(6), 697-718.
    CODE, NUM, GEN, DOM
  • Fu, Z., Sun, X., Zhang, J., & Li, B. (2011). A novel watermark embedding and detection scheme based on zero-knowledge proof. Intl. Journal of Digital Content Technology and Its Applications, 5(3), 273-286.
    WATER, FORM, DOM
  • Grosvald, M., & Orgun, C. O. (2011). Free from the cover text: a human-generated natural language approach to text-based steganography. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 133-141.
    CODE, GEN, WORD,
  • Khairullah, M. (2011). A novel text steganography system in cricket match scorecard. Intl. Journal of Computer Applications, 21, 43-47.
    CODE, FORM, DOM, NUM
  • Kermanidis, K. L. (2011). Capacity-rich knowledge-poor linguistic steganography. Journal of Information Hiding and Multimedia Signal Processing, 2(3), 247-258.
    CODE, PERM, WORD, PHR, SYNT, LANG(Greek)
  • Lakshmeeswari, G., Rajya Lakshmi, D., & Lalitha Bhaskari, D. (2011). Extended Encoding of Telugu text for hiding compatibility. Intl. Journal of Computer Applications, 9(7), 19-23.
    CODE, NUM, GLYPH, SPELL, LANG(Telegu)
  • Meng, P., Shi, Y. Q., Huang, L., Chen, Z., Yang, W., & Desoky, A. (2011, May). LinL: Lost in n-best list. In Intl. Workshop on Information Hiding (pp. 329-341). Springer, Berlin, Heidelberg.
    CODE, TRANS
  • Mir, N. (2011). Robust techniques of web watermarking. Intl. Journal of Computer Science and Information Security, 9(2), 248-252.
    WATER, WORD, MULTI
  • Nechta, I., & Fionov, A. (2011). Applying statistical methods to text steganography. www.arxiv.org 8/31/2018
    CODE, DETECT, SURV
  • Popovic, N., & Mircevski, J. (2011). Suitable forms of Steganography Usage in Public Administration. 8th Conf. on Informatics and Information Technology (CIIT), 3-7.
    SURV, CODE, REV
  • Tatar, U., & Mataracioglu, T. (2011). Analysis and Implementation of Distinct Steganographic Methods. www.arxiv.org 8/31/2018
    SURV, CODE, MULTI
  • Wai, E. N. C., & Khine, M. A. (2011). Syntactic bank-based linguistic steganography approach. In 2011 Intl. Conf. on Information Communication and Management IPCSIT (Vol. 16).
    CODE, PHR, WORD, REPL, PERM, SYNT, MULTI
  • Wai, E. N. C., & Khine, M. A. (2011). Modified Linguistic Steganography Approach by Using Syntax Bank and Digital Signature. Intl. Journal of Information and Education Technology, 1(5), 410.
    CODE, PHR, WORD, REPL, PERM, SYNT, MULTI, REV
  • Xiang, L., Sun, X., Liu, Y., & Yang, H. (2011). A secure steganographic method via multiple choice questions. Information Technology Journal, 10(5), 992-1000.
    CODE, REPL, FORM, DOM
  • Yang, B., Sun, X., Xiang, L., Ruan, Z., & Wu, R. (2011). Steganography in Ms Excel document using text-rotation technique. Information Technology Journal, 10(4), 889-893.
    CODE, FORM, DOM, MULTI

2012

  • Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2012). A procedure of text steganography using Indian regional language. Intl. Journal of Computer Network and Information Security, 4(8), 65.
    CODE, FORM, INS, GLYPH, LANG(India)
  • Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2012). Text steganography using quantum approach in regional language with revised SSCE. Intl. Journal of Computer Network and Information Security, 4(12), 73.
    CODE, FORM, INS, GLYPH, LANG(India), REV
  • Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2012). Text Steganography through Quantum Approach. In Wireless Networks and Computational Intelligence (pp. 632-643). Springer, Berlin, Heidelberg.
    CODE, FORM, INS, GLYPH, LANG(India), REV
  • Bassil, Y. (2012). A generation-based text steganography method using SQL queries. Intl. Journal of Computer Applications, 57(12).
    CODE, GEN, DOM
  • Chang, C. Y., & Clark, S. (2012). Adjective deletion for linguistic steganography and secret sharing. Proc. COLING 2012, 493-510.
    CODE, WORD, DEL, SEM, MULT, STAT
  • Chang, C. Y., & Clark, S. (2012). The secret’s in the word order: Text-to-text generation for linguistic steganography. Proc. COLING 2012, 511-528.
    CODE, WORD, PHR, PERM, SYNT
  • Chuang, J. C., & Hu, Y. C. (2012). Data Hiding on Text Using Big-5 Code. Intl. Journal of Security and Its Applications, 6(2), 173-178.
    CODE, GLYPH, INS, LANG(Chinese)
  • Din, R., Tuan Muda, T. Z., Lertkrai, P., Omar, M. N., Amphawan, A., & Aziz, F. A. (2012). Text steganalysis using evolution algorithm approach. 11th WSEAS Intl. Conf. on Information Security and Privacy (ISP’12).
    DETECT, GLYPH, ML
  • Din, R., Samsudin, A., & Lertkrai, P. (2012). A Framework Components for Natural Language Steganalysis. Intl. Journal of Computer Theory and Engineering, 4(4), 641.
    DETECT, SURV
  • Dulera, S., Jinwala, D., & Dasgupta, A. (2012). Experimenting with the novel approaches in text steganography. Intl. Journal of Network Security & Its Applications (IJNSA), 3(6), 213-225.
    CODE, GLYPH, REPL, GEN,
  • Fu, Z., Sun, X., Liu, Y., & Li, B. (2012). Text split-based steganography in OOXML format documents for covert communication. Security and Communication Networks, 5(9), 957-968.
    CODE, FORM
  • Gardiner, J. (2012) StegChat: A Synonym-Substitution Based Algorithm for Text Steganography. Msc Thesis, University of Birmingham.
    CODE, WORD, REPL, SEM
  • Grosvald, M., & Orgun, C. (2012). Human-versus computer-generated text-based steganography: real-world tests of two algorithms.  Journal of Information Hiding and Multimedia Signal Processing, 3(1).
    DETECT, WORD, REPL, SEM
  • Kabetta, H., & Dwiandiyanta, B. Y. (2012). Information hiding in CSS: a secure scheme text-steganography using public key cryptosystem. Intl. Journal on Cryptography and Information Security (IJCIS), 1(1).
    CODE, FORM, MULTI, CRYPT
  • Kaleem, M. K. (2012). An overview of various forms of linguistic steganography and their applications in protecting data. Journal of Global Research in Computer Science, 3(5), 33-38.
    CODE, SURV
  • Mulunda, C. K. (2012). Using Genetic Algorithm Based Model in Text Steganography.  (Masters thesis,University of Nairobi).
    CODE, GEN, ML, MULTI
  • Odeh, A., & Elleithy, K. M. (2012). Steganography in Arabic Text Using Full Diacritics Text. scholarworks.bridgeport.edu 8/31/2018
    CODE, SYMB, REPL, GLYPH, LANG(Arabic)
  • Odeh, A., & Elleithy, K. (2012). Steganography in Arabic text using zero width and Kashidha letters. Intl. Journal of Computer Science & Information Technology, 4(3), 1.
    CODE, SYMB, REPL, GLYPH, LANG(Arabic), REV
  • Por, L. Y., Wong, K., & Chee, K. O. (2012). UniSpaCh: A text-based data hiding method using Unicode space characters. Journal of Systems and Software, 85(5), 1075-1082.
    CODE, SYMB, INS, GLYPH
  • Ren, W., Liu, Y., & Zhao, J. (2012). Provably secure information hiding via short text in social networking tools. Tsinghua Science and Technology, 17(3), 225-231.
    CODE, GLYPH, INS, FORM
  • Singh, P., Chaudhary, R., & Agarwal, A. (2012). A Novel Approach of Text Steganography based on null spaces. IOSR Journal of Computer Engineering, 3(4), 11-17.
    CODE, GLYPH, INS, FORM
  • Yang, B., Sun, X., Zhang, J., Xiang, L., Chen, X., & Li, X. (2012). A Novel Reversible Text Data Hiding Scheme. Information Technology Journal, 11(8), 1084-1090.
    CODE, FORM, WORD, REPL,

2013

  • Agarwal, M. (2013). Text steganographic approaches: a comparison. Intl. Journal of Network Security & Its Applications (IJNSA), 5(1).
    CODE, SYMB, DEL, INS, MULTI, CRYPT
  • Alabish, A., Goweder, A., & Enakoa, A. (2013). A universal lexical steganography technique. Intl. Journal of Computer and Communication Engineering, 2(2), 153.
    CODE, WORD, REPL, SEM,
  • Ali, A. A. (2013). New Text Steganography Technique by using Mixed-Case Font. Intl. Journal of Computer Applications, 62(3).
    CODE, GLYPH, REPL, SPELL
  • Amirtharajan, R., Roy, S. D., Nesakumar, N., Chandrasekar, M., Sridevi, R., & Rayappan, J. B. B. (2013). Mind game for cover steganography: A refuge. Res. Journal Inform. Technol., 5, 137-148.
    CODE, GLYPH, WORD, INS, REPL, FORM, DOM
  • Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2013). Study and Analysis of Text Steganography Tools. Intl. Journal of Computer Network and Information Security, 5(12), 45-52.
    CODE, DETECT, STAT, SURV
  • Bhattacharyya, S., Indu, P., & Sanyal, G. (2013). Hiding data in text using ASCII mapping technology (AMT). Intl. Journal of Computer Applications, 70(18).
    CODE, GLYPH, REPL, NUM, MULTI
  • Din, R., Samsudin, A., Muda, T. Z. T., Lertkrai, P., Amphawan, A., & Omar, M. N. (2013). Fitness value based evolution algorithm approach for text steganalysis model. Intl. Journal of Mathematical Models and Methods in Applied Sciences.
    DETECT, WORD, STAT, ML
  • Kataria, S., Singh, B., Kumar, T., & Shekhawat, H. S. (2013). An Efficient Text Steganography using Digit Arithmetic. In Department of Computer Engineering, Govt. Engineering College, Bikaner, India, Proc. of Intl. Conf. on Advances in Computer Science, AETACS, Elsevier.
    CODE, GLYPH, REPL, NUM
  • Majumder, A., Changder, S., & Debnath, N. C. (2013) A Novel Approach for Text Steganography through Maze. Proc. ACC 2013, 19-24.
    CODE, SYMB, REPL
  • Majumder, A., & Changder, S. (2013). A novel approach for text steganography: Generating text summary using reflection symmetry. Procedia Technology, 10, 112-120.
    CODE, SYMB, REPL, REV
  • Odeh, A., Elleithy, K., & Faezipour, M. (2013, May). Steganography in Arabic text using Kashida variation algorithm (KVA). In Systems, Applications and Technology Conf. (LISAT), 2013 IEEE Long Island (pp. 1-6). IEEE.
    CODE, SYMB, REPL, GLYPH, LANG(Arabic)
  • Odeh, A., Elleithy, K. M., & Faezipour, M. (2013, March). Text steganography using language remarks. Proc. 2013 ASEE.Northeast Section Conference
    CODE, SYMB, REPL, GLYPH, LANG(Arabic)
  • Osman, B., Din, R., Muda, Tzt., & Omar, M. N. (2013, November). A performance of embedding process for text steganography method. 6th WSEAS World Congr. Appl. Comput. Conf.(ACC’13) (pp. 115-119).
    CODE, GLYPH, REPL, NUM, PERF
  • Rani, N., & Chaudhary, J. (2013). Text steganography techniques: A review. Intl. Journal of Engineering Trends and Technology (IJETT), 4(7), 3013-3015.
    SURV, CODE, FORM, DOM
  • Roy, S., & Venkateswaran, P. (2013). A text based steganography technique with Indian root. Procedia Technology, 10, 167-171.
    CODE, GEN, NUM, LANG(India)
  • Saber, A. S. (2013). Steganography in MS Excel Document Using Unicode System Characteristics. Journal of Basrah Researches (Sciences), 39(1A), 10-19.
    CODE, SYMB, GLYPH, REPL, DOM, LANG(India)
  • Samanta, S., Dutta, S., & Sanyal, G. (2013). A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP). Intl. Journal Comput. Netw. Inf. Secur., 6(1), 55-60.
    CODE, GLYPH, FORM, NUM
  • Szarvas, G., Biemann, C., & Gurevych, I. (2013). Supervised all-words lexical substitution using delexicalized features. In Proc. 2013 Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (pp. 1131-1141).
    CODE, WORD, SUB, SEM
  • Szarvas, G., Busa-Fekete, R., & Hüllermeier, E. (2013). Learning to rank lexical substitutions. In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing (pp. 1926-1932).
    CODE, WORD, SUM, SEM
  • Szarvas, G., & Gurevych, I. (2013). Uncertainty Detection for Natural Language Watermarking. In Proc. Sixth Intl. Joint Conf. on Natural Language Processing (pp. 1188-1194).
    WATER, WORD, SUB, STAT

2014

  • Chandragiri, A., Cooper, P. A., Liu, Y., & Liu, Q. (2014). Implementing secure communication on short text messaging. Proc. 2nd Intl. Symposium on Digital Forensics and Security, 77-80.
    CODE, GLYPH, INS, FORM
  • Chang, C. Y., & Clark, S. (2014). Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method. Computational Linguistics, 40(2), 403-448.
    CODE, WORD, REPL, SEM
  • Khairullah, M. (2014). A novel text steganography system in financial statements. Intl. Journal Database Theory Appl, 7(5), 123-132.
    CODE, GLYPH, INS, DOM
  • Koluguri, A., Gouse, S., & Reddy, P. B. (2014). Text steganography methods and its tools. Intl. Journal of Advanced Scientific and Technical Research, 2(4), 888-902.
    CODE, SURV
  • Kumar, K. A., Pabboju, S., & Desai, N. M. S. (2014). Advance text steganography algorithms: an overview. Intl. Journal of Research and Applications, 1(1), 31-35.
    CODE, SURV
  • Lwin, T., & SUWAI, P. (2014). Information Hiding System Using Text and Image Steganography. Intl. Journal of Scientific Engineering and Technology Research, 3(4), 1972-1977.
    CODE, FORM,MULTI,
  • Mohamed, A. A. (2014). An improved algorithm for information hiding based on features of Arabic text: A Unicode approach. Egyptian Informatics Journal, 15(2), 79-87.
    CODE, SYMB, REPL, GLYPH, LANG(Arabic)
  • Muñoz, A., Argüelles, I., & Sánchez, S. (2014). A formal model for the creation and evaluation of steganographic solutions based in lexical – semantic substitutions: a case applied to Spanish.
    Security and Communication Networks, 7(5), 813-832.
    CODE, WORD, REPL, SEM, LANG(Spanish)
  • Nagarhalli, T. P. (2014, June). A new approach to SMS text steganography using emoticons. Intl. Journal of Computer Applications (0975#8887) National Conf. on Role of Engineers in Nation Building (NCRENB-14).
    CODE, DOM
  • Odeh, A., Elleithy, K., & Faezipour, M. (2014, April). Steganography in text by using MS Word symbols. In American Society for Engineering Education (ASEE Zone 1), 2014 Zone 1 Conf. of the (pp. 1-5). IEEE.
    CODE, GLYPH, INS, FORM, DOM
  • Odeh, A., Elleithy, K., & Faezipour, M. (2014). A Reliable and Fast Real-Time Hardware Engine for Text Steganography. IEEE LISAT 2014 Long Island Systems, Applications and Technology, 1-6.
    CODE, GLYPH, INS, FORM, DOM, MULTI
  • Qin, C., Chang, C. C., & Wang, S. T. (2014). A novel lossless steganographic scheme for data hiding in traditional Chinese text files. Journal of Information Hiding and Multimedia Signal Processing, 5(3), 534-545.
    CODE, GLYPH, REPL, LANG(Chinese)
  • Roy, S., & Venkateswaran, P. (2014, March). Online payment system using steganography and visual cryptography. In Electrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students ‘ Conf. on (pp. 1-5). IEEE.
    CODE, CRYPT, DOM, MULTI
  • Satir, E., & Isik, H. (2014). A Huffman compression based text steganography method. Multimedia tools and applications, 70(3), 2085-2110.
    CODE, GLYPH, REPL, DOM, MULTI
  • Satir, E., Sargin, A., Kanat, T., & Okuducu, C. (2014). A High Capacity HTML Steganography Method. In Proc. 7th Intl. Conf. on Information Security and Cryptology, Istanbul (pp. 154-159).
    CODE, GLYPH, REPL, DOM, MULTI, CRYPT
  • Shah, R., & Chouhan, Y. S. (2014). Encoding of Hindi Text Using Steganography Technique. Intl. Journal of Scientific Research in Computer Science and Engineering, 2(1), 22-28.
    CODE, SYMB, REPL, SYMB, LANG(Hindia)
  • Stojanov, I., Mileva, A., & Stojanovic, I. (2014). A new property coding in text steganography of Microsoft Word documents. In Eighth Intl. Conf. on Emerging Security Information, Systems, and Technologies, 25-30.
    CODE, FORM, DOM
  • Wai, E. N. C., & Khine, M. A. (2014). Improving Confidentiality and Integrity of Syntactic Steganography by using Error Control Techniques. www.researchgate.com 8/31/2018
    CODE, WORD, PHR, PERM, SYNT, CRYPT, MULTI,
  • Wilson, A., Blunsom, P., & Ker, A. D. (2014, February). Linguistic steganography on Twitter: hierarchical language modeling with manual interaction. In Media Watermarking, Security, and Forensics 2014 (Vol. 9028, p. 902803). Intl. Society for Optics and Photonics. (Vol. 9028, p. 902803). International Society for Optics and Photonics.
    CODE, TRANS, DOM

2015

  • Abbasi, A. T., Naqvi, S. N., Khan, A., & Ahmad, B. (2015). Urdu text steganography: Utilizing isolated letters.Australian Information Security Management Conference, 37-46.
    CODE, SYMB, INS, GLYPH, LANG(Urdu)
  • Alotaibi, R. A., & Elrefaei, L. A. (2015). Arabic Text Watermarking: A Review. Intl. Journal of Artificial Intelligence & Applications (AJAIA) 6(4), 1-16.
    WATER, SURV, LANG(Arabic)
  • Din, R., Yusof, S. A. M., Amphawan, A., Hussain, H. S., Yaacob, H., Jamaludin, N., & Samsudin, A. (2015). Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach. Proc. Electrical Engineering Computer Science and Informatics, 2(1), 67-73.
    DETECT, PERF
  • Kabudvand, F. (2015). New Methods for Text Steganography. IJSRSET 1(5), 383-385.
    CODE, SYMB, REPL, GLYPH
  • Kadhem, S. M., & Abdulraheem, A. A. (2015). Using a parser for steganography purpose. Engineering and Technology Journal, 33(4 Part (B) Scientific), 654-667.
    CODE, SYMB, INS, GLYPH, PHR, SENT, SYNT, FORM, LANG(Arabic)
  • Kingslin, S., & Kavitha, N. (2015). Evaluative approach towards text steganographic techniques. Indian Journal of Science and Technology, 8(29).
    CODE, SURV,
  • Marlow et al (2015). U.S. Patent No. 9,160,719 B2. Washington, DC: U.S. Patent and Trademark Office. Hiding Ciphertext Using A Linguistics Algorithm with Dictionaries.
    CODE, WORD, REPL, SEM,
  • Martin, D., & Barmawi, A. M. (2015). List steganography based on syllable patterns. eProceedings of Engineering, 2(2).
    CODE, NUM, MULTI, DOM, LANG(Indonesia)
  • Mazurczyk, W., & Caviglione, L. (2015). Steganography in modern smartphones and mitigation techniques. IEEE Communications Surveys & Tutorials, 17(1), 334-357.
    CODE, SURV, DOM
  • Odeh, A., Elleithy, K., Faezipour, M., & Abdelfattah, E. (2015). Novel Steganography over HTML Code. In Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering (pp. 607-611). Springer, Berlin, Heidelberg.
    CODE, DOM, MULTI, CRYPT
  • Odeh, A. (2015). Robust Text Steganography Algorithms for Secure Data Communications. (Doctoral dissertation, University of Bridgeport).
    SURV, CODE, CRYPT, MULTI # see previous papers
  • Osman, B., Din, R., & Idrus, M. R. (2015). Capacity performance of steganography method in text based domain. ARPN Journal of Engineering and Applied Sciences, 10(3), 1345-1351.
    SURV, PERF, CODE, MULTI
  • Vidhya, P. M., & Paul, V. (2015). A method for text steganography using Malayalam text. Procedia Computer Science, 46, 524-531.
    CODE, SYMB, REPL, GLYPH, LANG(Malayalam), REV
  • Wilson, A., Blunsom, P., & Ker, A. (2015). Detection of steganographic techniques on Twitter. In Proc. 2015 Conf. on Empirical Methods in Natural Language Processing (pp. 2564-2569).
    CODE, TRANS, DOM, REV
  • Yadav, V. K., & Batham, S. (2015). A novel approach of bulk data hiding using text steganography. Procedia Computer Science, 57, 1401-1410.
    CODE, WORD, REPL, SEM, MULTI, PERF,

2016

  • Ahmed, H. M., & Maisa’a, A. A. (2016). Comparison of Eight Proposed Security Methods using Linguistic Steganography Text. Intl. Journal Comput. Inf. Sci, 12(2), 243-251.
    CODE, SURV, LANG(Arabic)
  • Ahmed, H. M. (2016). Arabic Language Script Steganography Based on Dynamic Random Linear Regression. College of Education, 1(1).
    CODE, FORM, NUM, LANG(Arabic)
  • Ahmed, A. P. & Maisa’a, A. A. (2016). Steganography Techniques for Arabic Language Texts Utilizing Single-Double Quotation Using RNG. Journal of the College of Basic Education, 22(95), 129-146.
    CODE, FORM, NUM, LANG(Arabic)
  • Ahmed, H. M. (2016). Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG. Iraqi Journal of Science, 57(2C), 1548-1557.
    CODE, FORM, NUM, LANG(Arabic)
  • Maisa’a, A. A., & Ahmed, H. M. (2016). Steganography Arabic Text Based on Natural Language Process Documents. Journal of College of Education /Wasit, 1(25), 457-480.
    CODE, LANG(Arabic)
  • Din, R., Ahmad, F., Hussain, H. S., Sabri, S., Khidzir, N. Z., & Musa, M. (2016). A Performance of Text Steganalytic System Using Genetic-Based Method. ARPN Journal of Engineering and Applied Sciences, 11(10), 6216-6221.
    DETECT, WORD, SENT, ML, PERF
  • Iyer, S. S., & Laktharia, K. (2016). New robust and secure alphabet pairing text steganography algorithm. Intl. Journal of Current Trends in Engineering & Research (IJCTER), 2(7), 15-21.
    CODE, BIT
  • Iyer, S., & Kamaljit, L. I. (2016) Clustering Algorithm for Text Steganography. Intl. Journal of Advanced Research in Computer and communication Engineering ISSN (O), 2278-1021.
    CODE, BIT, ML
  • Nagarhalli, T. P., Bakal, J. W., & Jain, N. (2016). A Survey of Hindi text steganography. Intl. Journal of Scientific & Engineering Research, 7(3), 55-61.
    SURV, LANG(Hindi)
  • Osman, B., Yasin, A., & Omar, M. N. (2016). An Analysis of Alphabet-based Techniques in Text Steganography. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 8(10), 109-115.
    SURV, CODE, MULTI, ML
  • Safaka, I., Fragouli, C., & Argyraki, K. (2016). Matryoshka: Hiding secret communication in plain sight . www.usenix.org 8/31/2018
    CODE, WORD, BIT, CRYPT
  • Shniperov, A. N., & Nikitina, K. A. (2016). A text steganography method based on Markov chains. Automatic Control and Computer Sciences, 50(8), 802-808.
    CODE, STAT, WORD
  • Utama, S., Din, R., & Mahmuddin, M. (2016). Critical Analysis on Steganography Technique in Text Domain. In Proc. Of the 5th Intl. Cryptology and Information Security Conf. 2016, 1-12.
    CODE, SURV
  • Wilson, A., & Ker, A. D. (2016). Avoiding detection on Twitter: embedding strategies for linguistic steganography. Electronic Imaging, 2016(8), 1-9.
    CODE, TRANS, DOM, METRIC

2017

  • Ahmed, H. M., & Maisa’a, A. A. (2017). Steganography Arabic Text Based on Natural Language Process Documents. Journal of Education College Wasit University, 1(25), 457-480.
    CODE, FORM, NUM, MULTI, LANG(Arabic)
  • Ala’a, M., & Alnihoud, O. (2017). Ameliorated Kashida-Based Approach for Arabic Text Steganography. Intl. Journal Comput. Sci. Inf. Technol.(IJCSIT), 9(2).
    CODE, SYMB, REPL, GLYPH, LANG(Arabic)
  • Aman, M., Khan, A., Ahmad, B., & Kouser, S. (2017). A hybrid text steganography approach utilizing Unicode space characters and zero-width character. Intl. Journal on Information Technologies and Security, 9(1), 85-100.
    CODE, FORM, SYMB, REPL, GLYPH, MULTI, CRYPT
  • Shakir Baawi, Salwa., Rosmadi Mokhtar, Mohd., & Sulaiman, R. (2017). New Text Steganography Technique Based on a Set of Two-Letter Words. Journal of Theoretical & Applied Information Technology, 95(22).
    CODE, FORM, SYMB, INS, GLYPH
  • Din, R., & Utama, S. (2017). Critical Review of Verification and Validation Process in Feature-Based Method Steganography. In Intl. Conf. on E-Commerce (pp. 15-19).
    CODE, SURV, PERF
  • Fang, T., Jaggi, M., & Argyraki, K. (2017). Generating Steganographic Text with LSTMs. www.arxiv.org 8/31/2018
    CODE, GEN, WORD, NNET
  • Kadhem, S. M., Ali, M., & Dhurgham, W. (2017). Proposed Hybrid Method to Hide Information in Arabic Text. Journal of Theoretical & Applied Information Technology, 95(7).
    CODE, FORM, SYMB, INS, GLYPH, LANG(Arabic, English)
  • Mahato, S., Khan, D. A., & Yadav, D. K. (2017). A modified approach to data hiding in Microsoft Word documents by change-tracking technique. Journal of King Saud University-Computer and Information Sciences. (2017), dx.doi.org/10.1016/j.jksuci.2017.08.004
    CODE, FORM, WORD, INS, DEL,
  • Mahato, S., Yadav, D. K., & Khan, D. A. (2017). Personal Characters to Bits mapping using Dot Pattern Character Encoding Scheme (DPCES). Journal of King Saud University-Computer and Information Sciences (2017) dx.doi.org/10.1016/j.jksuci.2017.08.003
    CODE, SYMB, REPL, GLYPH
  • Mansor, F. Z., Mustapha, A., & Samsudin, N. A. (2017, August). Researcher’s Perspective of Substitution Method on Text Steganography. In IOP Conf. Series: Materials Science and Engineering 226(1), p. 012092. IOP Publishing.
    CODE, REPL, SURV
  • Shaker, A. A., Ridzuan, F., & Pitchay, S. A. (2017). Text Steganography using Extensions Kashida based on the Moon and Sun Letters Concept. Intl. Journal of Advanced Computer Science and Applications 8(8) 286-290.
    CODE, SYMB, REPL, GLYPH, LANG(Arabic)
  • Sivabalan, A., Patiburn, L., Iranmanesh, V., & Teh, P. L. (2017). Text Steganography using Daily Emotions Monitoring. I.J. Education and Management Engineering (3), 1-14
    CODE, SYMB, REPL, INS, GLYPH, FORM
  • Xiang, L., Wang, X., Yang, C., & Liu, P. (2017). A novel linguistic steganography based on synonym run-length encoding. IEICE Tracsactions on Information and Systems, 100(2), 313-322.
    CODE, WORD, REPL, SEM, NUM

2018

  • Adamu, I.A. & Souley, Boukari. (2018). Performance analysis of Text and Image Steganography with RSA Algorithm in Cloud Computing.
    Intl. Journal of Software Engineering & Applications (IJSEA), 9(1), 65-76.IN REVIEW
  • Alhamami, W.A. & Ahmadi, M.R. (2018). A Proposed Text Steganography Method to Enhance E-Government Security Systems.
    Intl. Journal of Computer Science & Engineering Technology (IJSET) 9(5), 59-64.IN REVIEW
  • Alotaibi, R. A., & Elrefaei, L. A. (2018). Improved capacity Arabic text watermarking methods based on open word space. Journal of King Saud University-Computer and Information Sciences, 30(2), 236-248.CODE, SYMB, INS, GLYPH, FORM
  • Din, R., & Utama, S. (2018). Analysis Review of Feature-Based Method in Term of Verification and Validation Performance. 
    Journal of Telecommunication, Electronic and Computer Engineering (JTEC),  10(2-4), 173-177.IN REVIEW
  • Ji, H., & Knight, K. (2018). Creative Language Encoding under Censorship. In  Proceedings of the First Workshop on Natural Language Processing for Internet Freedom  (pp. 23-33). IN REVIEW
  • Joshi, K. (2018).
    A New Approach of Text Steganography Using ASCII Values.  International Journal of Engineering and Technical Research,  7, 490-493.
    IN REVIEW
  • Kaur, A., Kaur, S., & Sethi, G. (2018). A Study on Text Based Steganography Using Email Platform and Color Mapping. 
    International Journal of Computer (IJC),  29(1), 1-12. IN REVIEW
  • Khairullah, M., & Ratul, M. A. S. (2018). Steganography in Bengali Unicode text. SUST Journal Sci. Technol. 27(1), 71-80. CODE, SYMB, INS, REPL, GLYPH, LANG(Bengali)
  • Khairullah, M. (2018). A novel steganography method using transliteration of Bengali text. Journal of King Saud University-Computer and Information Sciences. (2018), doi.org/10.1016/j.jksuci.2018.01.008
    CODE, SYMB, INS, GLYPH, FORM, LANG(Bengali)
  • Kumar, K. A., & Pabboju, S. (2018). An Optimized Text Steganography Approach Using Differently Spelt English Words. Intl. Journal of Pure and Applied Mathematics 118(16), 653-666.
    CODE, WORD, REPL, SPELL, LANG(English)
  • Lagarde, M. J. (2018). Detecting Steganography. www.epfl.ch 8/31/2018 DETECT, DOM, ML
  • Mandal, K. K., Koley, S., & Mondal, S. (2018). Number System Oriented Text Steganography in English Language for Short Messages: A Decimal Approach. In  Intelligent Computing and Information and Communication (pp. 183-193). Springer, Singapore. IN REVIEW
  • Muñoz, A., Argüelles, I., & Sánchez, S. (2014). A formal model for the creation and evaluation of steganographic solutions based in lexical–semantic substitutions: a case applied to Spanish.  Security and Communication Networks,  7(5), 813-832. IN REVIEW
  • Ng, K. Y., Feldman, A., & Leberknight, C. (2018, July). Detecting Censorable Content on Sina Weibo: A Pilot Study.
    In  Proceedings of the 10th Hellenic Conference on Artificial Intelligence  (p. 41). ACM. IN REVIEW
  • Ng, K. Y., Feldman, A., Peng, J., & Leberknight, C. (2018). Linguistic Characteristics of Censorable Language on SinaWeibo. 
    arXiv preprint arXiv:1807.03654. IN REVIEW
  • Romanova, A., & Toliupa, S. (2018). Steganography methods used in attacks on information and communication systems. 
    Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie ?rodowiska,  8, 24-27. IN REVIEW
  • Siahaan, R. F., Zarlis, M., & Nasution, B. B. (2018, September). Performance analysis of steganography alphanumeric text in the text based on Indonesian linguistic. In  IOP Conference Series: Materials Science and Engineering (Vol. 420, No. 1, p. 012123). IOP Publishing. IN REVIEW
  • Win, T. Z., & Oo, A. W. Data Hiding Process with Indexes Based on Whitespace Method. Intl. Journal of Engineering Trends and Applications (IJETA) ,5(4), 32-35. IN REVIEW
  • Xiang, L., Yu, J., Yang, C., Zeng, D., & Shen, X. (2018). A Word-Embedding-Based Steganalysis Method for Linguistic Steganography via Synonym Substitution.  IEEE Access,  6, 64131-64141. IN REVIEW
  • Xiang, L. Y., Li, Y., Hao, W., Yang, P., & Shen, X. (2018). Reversible natural language watermarking using synonym substitution and arithmetic coding. CMC: Computers, Materials & Continua, 55(3), 541-559.
    WATER, WORD, REPL, SEM, NUM
  • Yang, Z., Wei, N., Sheng, J., Huang, Y., & Zhang, Y. J. (2018). TS-CNN: Text Steganalysis from Semantic Space Based on Convolutional Neural Network.  arXiv preprint arXiv:1810.08136. IN REVIEW
  • Nag, A. (2019). Low-Tech Steganography for Covert Operations. Intl. Journal of Mathematical Sciences and Computing, 1, 18-30.
    IN REVIEW
  • Annotation Key

    Application of steganography

    • CODE — encoding message by sender, decoding message by receiver
    • DETECT — detecting steganography in a document (steganalysis)
    • WATER — watermarking — encoding and decoding message by same party

    Level at which the operations are performed:

    • FORM — formatting, SYMB — symbol, WORD — word
    • PHR — phrase, SENT — sentence, ERR — errors

    Operation performed by algorithm:

    INS — insert; DEL — delete; REPL — replace; PERM — permute

    Linguistics area:

    • PHON — sound (phonetics)
    • GLYPH — writing
    • SPELL — spelling
    • SYNT — syntax
    • SEM — meaning (semantics)

    Methodology:

    • TRANS — translation from one language to another
    • SUM — summarization
    • GEN — text generation from templates or calculations
    • NUM — numeric computations from
    • STAT — statistical analysis
    • ML — machine learning

    Miscellany:

    • SURV — literature survey
    • REV — revision of previous paper
    • LANG — language dependent, with languages specified
    • DOM — document or application domain specific
    • MULTI — multiple techniques used
    • CRYPT — encryption techniques used