REFERENCES
Atallah, M. J., Raskin, V., Crogan, M., Hempelmann, C.,
Kerschbaum, F., Mohamed, D., and Naik, S. (2001).
Natural language watermarking: Design, analysis,
and a proof-of-concept implementation. In Proceed-
ings of the 4th International Workshop on Information
Hiding, IHW ’01, page 185–199, Berlin, Heidelberg.
Springer-Verlag.
Atallah, M. J., Raskin, V., Hempelmann, C. F., Karahan,
M., Sion, R., Topkara, U., and Triezenberg, K. E.
(2002). Natural language watermarking and tamper-
proofing. In International workshop on information
hiding, pages 196–212. Springer.
Aziz, B. (2021). A note on the problem of semantic in-
terpretation agreement in steganographic communica-
tions. Journal of Internet Services and Information
Security, 11(3):47–57.
Aziz, B., Bukhelli, A., Khusainov, R., and Mohasseb, A.
(2022). A novel method for embedding and extract-
ing secret messages in textual documents based on
paragraph resizing. In Proceedings of the 19th In-
ternational Conference on Security and Cryptography
- Volume 1: SECRYPT,, pages 714–719. INSTICC,
SciTePress.
Baawi, S. S., Mokhtar, M. R., and Sulaiman, R.
(2018). A comparative study on the advancement
of text steganography techniques in digital media.
ARPN Journal of Engineering and Applied Sciences,
13(5):1854–1863.
Baawi, S. S., Nasrawi, D. A., and Abdulameer, L. T. (2020).
Improvement of ”text steganography based on uni-
code of characters in multilingual” by custom font
with special properties. In IOP Conference Series:
Materials Science and Engineering, volume 870.
Bergmair, R. (2004). Towards linguistic steganography: A
systematic investigation of approaches, systems, and
issues. Final year thesis, B. Sc.(Hons.) in Computer
Studies, The University of Derby.
Blizard, W. D. (1988). Multiset theory. Notre Dame Journal
of Formal Logic, 30(1):36 – 66.
Chand, V. and Orgun, C. (2006). Exploiting linguistic fea-
tures in lexical steganography: Design and proof-of-
concept implementation. In Proceedings of the 39th
Annual Hawaii International Conference on System
Sciences (HICSS’06), volume 6, pages 126b–126b.
Chapman, M. and Davida, G. (1997). Hiding the hidden: A
software system for concealing ciphertext as innocu-
ous text. In International Conference on Informa-
tion and Communications Security, pages 335–345.
Springer.
Chapman, M., Davida, G. I., and Rennhard, M. (2001).
A practical and effective approach to large-scale au-
tomated linguistic steganography. In International
Conference on Information Security, pages 156–165.
Springer.
Cheddad, A., Condell, J., Curran, K., and Mc Kevitt,
P. (2010). Digital image steganography: Survey
and analysis of current methods. Signal processing,
90(3):727–752.
Church, A. (1932). A set of postulates for the foundation of
logic. Annals of Mathematics, 33(2):346–366.
Curry, H. B. and Feys, R. (1958). Combinatory Logic.
Number v. 1 in Combinatory Logic. North-Holland
Publishing Company.
Diffie, W. and Hellman, M. E. (1976). New directions in
cryptography. IEEE Transactions on Information The-
ory, IT-22(6):644–654.
Jayaram, P., Ranganatha, H., and Anupama, H. (2011). In-
formation hiding using audio steganography–a survey.
The International Journal of Multimedia & Its Appli-
cations (IJMA) Vol, 3:86–96.
Liang, O. W. and Iranmanesh, V. (2016). Information hid-
ing using whitespace technique in Microsoft word. In
Proceedings of the 2016 International Conference on
Virtual Systems and Multimedia, VSMM 2016. Insti-
tute of Electrical and Electronics Engineers Inc.
Liu, Y., Liu, S., Wang, Y., Zhao, H., and Liu, S. (2019).
Video steganography: A review. Neurocomputing,
335:238–250.
Maher, K. (1995). Texto. URL:
ftp://ftp.funet.fi/pub/crypt/steganography/texto.
tar. gz.
Moerland, T. (2003). Steganography and steganalysis. Lei-
den Institute of Advanced Computing Science.
Naharuddin, A., Wibawa, A. D., and Sumpeno, S. (2018).
A high capacity and imperceptible text steganography
using binary digit mapping on ascii characters. In Pro-
ceeding - 2018 International Seminar on Intelligent
Technology and Its Application, ISITIA 2018, pages
287–292. Institute of Electrical and Electronics Engi-
neers Inc.
Shirali-Shahreza, M. (2008). Text steganography by chang-
ing words spelling. In 2008 10th International Confer-
ence on Advanced Communication Technology, vol-
ume 3, pages 1912–1913. IEEE.
Shirali-Shahreza, M. H. and Shirali-Shahreza, M. (2006).
A new approach to persian/arabic text steganography.
In 5th IEEE/ACIS International Conference on Com-
puter and Information Science and 1st IEEE/ACIS In-
ternational Workshop on Component-Based Software
Engineering,Software Architecture and Reuse (ICIS-
COMSAR’06), volume 2006, pages 310–315.
Shirali-Shahreza, M. H. and Shirali-Shahreza, M. (2008).
A new synonym text steganography. In 2008 Interna-
tional Conference on Intelligent Information Hiding
and Multimedia Signal Processing, pages 1524–1526.
IEEE.
Taha, A., Hammad, A. S., and Selim, M. M. (2020). A
high capacity algorithm for information hiding in ara-
bic text. J. King Saud Univ. Comput. Inf. Sci., 32:658–
665.
Wilson, S. (2019). Unreal steganography: Us-
ing a vr application as a steganography car-
rier. https://www.forensicfocus.com/stable/wp-
content/uploads/2019/07/dissertation.pdf.
SECRYPT 2024 - 21st International Conference on Security and Cryptography
396