{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:48:43Z","timestamp":1772808523585,"version":"3.50.1"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/cit.2010.177","type":"proceedings-article","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T17:00:03Z","timestamp":1285002003000},"page":"960-964","source":"Crossref","is-referenced-by-count":2,"title":["Hiding Short Secret Messages based on Linguistic Steganography and Manual Annotation"],"prefix":"10.1109","author":[{"given":"Alfonso","family":"Munoz","sequence":"first","affiliation":[]},{"given":"Justo","family":"Carracedo","sequence":"additional","affiliation":[]},{"given":"Irina Arg\u00fcelles","family":"\u00c1lvarez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Disappearing Cryptography, Second Edition-Information Hiding: Steganography and Watermarking","author":"wayner","year":"2002"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1117\/12.711325","article-title":"A comprehensive Bibliography of Linguistic Steganography","volume":"6505","author":"bergmair","year":"2007","journal-title":"Proc SPIE Int Conf Security Steganography and Watermarking of Multimedia Contents IX"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2008.Workshops.69"},{"key":"ref5","first-page":"11","article-title":"Hiding the hidden: A software system for concealing ciphertext in innocuous text","volume":"1334","author":"chapman","year":"1997","journal-title":"ICICS 1997"},{"key":"ref8","article-title":"PRNG based on new HCI devices entropy sources: Wii remote study case","author":"mu\u00f1oz","year":"2009","journal-title":"Euro American Conference On Telematics And Information SystemsYear of Publication"},{"key":"ref7","first-page":"26","article-title":"Improving N-Gram linguistic steganography based on templates","author":"mu\u00f1oz","year":"0","journal-title":"SECRYPT 2010"},{"key":"ref2","article-title":"The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet","author":"kahn","year":"1996","journal-title":"(Hardcover) Scribner"},{"key":"ref1","first-page":"123131","article-title":"Seguridad en Redes Telem&#x00E1;ticas","author":"carracedo","year":"2004","journal-title":"Mc-Graw Hill InterAmericana de Espa&#x00F1;a"}],"event":{"name":"2010 IEEE 10th International Conference on Computer and Information Technology (CIT)","location":"Bradford, United Kingdom","start":{"date-parts":[[2010,6,29]]},"end":{"date-parts":[[2010,7,1]]}},"container-title":["2010 10th IEEE International Conference on Computer and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5575291\/5577816\/05578477.pdf?arnumber=5578477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T10:16:32Z","timestamp":1497867392000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5578477\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/cit.2010.177","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}