
2009 International Conference on Information and
Multimedia Technology, pages 230–234. IEEE.
Kamaruddin, N. S., Kamsin, A., Por, L. Y., and Rahman,
H. (2018). A review of text watermarking: Theory,
methods, and applications. IEEE Access, 6:8011–
8028.
Kerckhoffs, A. (1883). La cryptographie militaire: pp. 5-38.
J. Sciences Militaires.
Kn
¨
ochel, M. and Karius, S. (2024). Text steganography
methods and their influence in malware: A
comprehensive overview and evaluation. In P
´
erez-
Gonz
´
alez, F., Comesa
˜
na-Alfaro, P., Kr
¨
atzer, C., and
Vicky Zhao, H., editors, Proceedings of the 2024 ACM
Workshop on Information Hiding and Multimedia
Security, pages 113–124, New York, NY, USA. ACM.
Li, Y., Wang, H., and Barni, M. (2021). A survey
of deep neural network watermarking techniques.
Neurocomputing, 461:171–193.
Liu, A., Pan, L., Lu, Y., Li, J., Hu, X., Zhang, X., Wen,
L., King, I., Xiong, H., and Yu, P. (2025). A survey of
text watermarking in the era of large language models.
ACM Computing Surveys, 57(2):1–36.
Liu, T.-Y. and Tsai, W.-H. (2007). A new steganographic
method for data hiding in microsoft word documents
by a change tracking technique. IEEE Transactions
on Information Forensics and Security, 2(1):24–30.
Mitl
¨
ohner, J., Neumaier, S., Umbrich, J., and Polleres, A.
(2016). Characteristics of open data csv files. In 2016
2nd International Conference on Open and Big Data
(OBD), pages 72–79. IEEE.
NIST (2013). Digital signature standard (DSS) - FIPS 186-
4.
NIST (2023). Digital signature standard (DSS) - FIPS 186-
5.
Otto, B. (2022). The evolution of data spaces. In Otto, B.,
ten Hompel, M., and Wrobel, S., editors, Designing
Data Spaces, pages 3–15. Springer International
Publishing, Cham.
Petitcolas, F., Anderson, R. J., and Kuhn, M. G. (1999).
Information hiding-a survey. Proceedings of the IEEE,
87(7):1062–1078.
Podilchuk, C. I. and Delp, E. J. (2001). Digital
watermarking: algorithms and applications. IEEE
Signal Processing Magazine, 18(4):33–46.
Por, L. Y., Wong, K., and Chee, K. O. (2012). Unispach:
A text-based data hiding method using unicode
space characters. Journal of Systems and Software,
85(5):1075–1082.
Rani, S. and Halder, R. (2022). Comparative analysis
of relational database watermarking techniques: An
empirical study. IEEE Access, 10:27970–27989.
Rizzo, S. G., Bertini, F., and Montesi, D. (2016). Content-
preserving text watermarking through unicode
homoglyph substitution. In Desai, B. C., Toyama, M.,
Bernardino, J., and Desai, E., editors, Proceedings
of the 20th International Database Engineering &
Applications Symposium on - IDEAS ’16, pages
97–104, New York, New York, USA. ACM Press.
Rizzo, S. G., Bertini, F., and Montesi, D. (2019). Fine-grain
watermarking for intellectual property protection.
EURASIP Journal on Information Security, 2019(1).
Saltzer, J. H. and Ossanna, J. F. (1970). Remote terminal
character stream processing in multics. In Cooke,
H. L., editor, Proceedings of the May 5-7, 1970,
spring joint computer conference on - AFIPS ’70
(Spring), page 621, New York, New York, USA. ACM
Press.
Setiadi, D. R. I. M. (2021). Psnr vs ssim: imperceptibility
quality assessment for image steganography.
Multimedia Tools and Applications, 80(6):8423–
8444.
Shafranovich, Y. (2005). Rfc 4180. Accessed February
2025 at: https://www.rfc-editor.org/rfc/rfc4180.html.
Swanson, M. D., Kobayashi, M., and Tewfik, A. H. (1998).
Multimedia data-embedding and watermarking
technologies. Proceedings of the IEEE, 86(6):1064–
1087.
Taleby Ahvanooey, M., Li, Q., Hou, J., Dana Mazraeh, H.,
and Zhang, J. (2018). Aitsteg: An innovative text
steganography technique for hidden transmission of
text message via social media. IEEE Access, 6:65981–
65995.
Taylor, P. (2024). Volume of data/information created,
captured, copied, and consumed worldwide from 2010
to 2023, with forecasts from 2024 to 2028. Accessed
February 2025 at: https://www.statista.com/statistics/
871513/worldwide-data-created/.
Tian, Y. and Nogales, A. F. R. (2023). A survey
on data integrity attacks and ddos attacks in cloud
computing. In 2023 IEEE 13th Annual Computing
and Communication Workshop and Conference
(CCWC), pages 0788–0794. IEEE.
van den Burg, G. J. J., Naz
´
abal, A., and Sutton, C. (2019).
Wrangling messy csv files by detecting row and type
patterns. Data Mining and Knowledge Discovery,
33(6):1799–1820.
Vitagliano, G., Hameed, M., Jiang, L., Reisener, L., Wu,
E., and Naumann, F. (2023). Pollock: A data loading
benchmark. Proceedings of the VLDB Endowment,
16(8):1870–1882.
Wen, Q. and Wang, Y. (2013). An efficient fragile
web pages watermarking for integrity protection of
xml documents. In Hutchison, D., Kanade, T.,
Kittler, J., Kleinberg, J. M., Mattern, F., Mitchell,
J. C., Naor, M., Nierstrasz, O., Pandu Rangan, C.,
Steffen, B., Sudan, M., Terzopoulos, D., Tygar, D.,
Vardi, M. Y., Weikum, G., Shi, Y. Q., Kim, H.-
J., and P
´
erez-Gonz
´
alez, F., editors, Digital Forensics
and Watermaking, volume 7809 of Lecture Notes in
Computer Science, pages 135–144. Springer Berlin
Heidelberg, Berlin, Heidelberg.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
466