{"id":"https://openalex.org/W2041278284","doi":"https://doi.org/10.1109/iscc.2008.4625605","title":"Pseudo-space Persian/Arabic text steganography","display_name":"Pseudo-space Persian/Arabic text steganography","publication_year":2008,"publication_date":"2008-07-01","ids":{"openalex":"https://openalex.org/W2041278284","doi":"https://doi.org/10.1109/iscc.2008.4625605","mag":"2041278284"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2008.4625605","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2008.4625605","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE Symposium on Computers and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109581803","display_name":"Mohammad Shirali-Shahreza","orcid":null},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammad Shirali-Shahreza","raw_affiliation_strings":["Computer Science Department, Sharif University of Technology, Tehran, Iran","Comput. Sci. Dept., Sharif Univ. of Technol., Tehran"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"Comput. Sci. Dept., Sharif Univ. of Technol., Tehran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5109581803"],"corresponding_institution_ids":["https://openalex.org/I133529467"],"apc_list":null,"apc_paid":null,"fwci":0.3568,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.63316704,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"1","issue":null,"first_page":"864","last_page":"868"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8645910024642944},{"id":"https://openalex.org/keywords/unicode","display_name":"Unicode","score":0.7887767553329468},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7041193842887878},{"id":"https://openalex.org/keywords/character","display_name":"Character (mathematics)","score":0.6453373432159424},{"id":"https://openalex.org/keywords/character-encoding","display_name":"Character encoding","score":0.6442618370056152},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6110286712646484},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.54777991771698},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.5340619683265686},{"id":"https://openalex.org/keywords/persian","display_name":"Persian","score":0.4962354302406311},{"id":"https://openalex.org/keywords/ascii","display_name":"ASCII","score":0.47884130477905273},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.4511980414390564},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.430530309677124},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.42839640378952026},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.416611909866333},{"id":"https://openalex.org/keywords/arabic","display_name":"Arabic","score":0.4112704396247864},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4078487753868103},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.39825698733329773},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2924942374229431},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22681710124015808},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.18501627445220947},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16341400146484375},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15743517875671387},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11891263723373413}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8645910024642944},{"id":"https://openalex.org/C500551929","wikidata":"https://www.wikidata.org/wiki/Q8819","display_name":"Unicode","level":2,"score":0.7887767553329468},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7041193842887878},{"id":"https://openalex.org/C2780861071","wikidata":"https://www.wikidata.org/wiki/Q1062934","display_name":"Character (mathematics)","level":2,"score":0.6453373432159424},{"id":"https://openalex.org/C32717103","wikidata":"https://www.wikidata.org/wiki/Q184759","display_name":"Character encoding","level":3,"score":0.6442618370056152},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6110286712646484},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.54777991771698},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.5340619683265686},{"id":"https://openalex.org/C2776527531","wikidata":"https://www.wikidata.org/wiki/Q9168","display_name":"Persian","level":2,"score":0.4962354302406311},{"id":"https://openalex.org/C196832560","wikidata":"https://www.wikidata.org/wiki/Q8815","display_name":"ASCII","level":2,"score":0.47884130477905273},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.4511980414390564},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.430530309677124},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.42839640378952026},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.416611909866333},{"id":"https://openalex.org/C96455323","wikidata":"https://www.wikidata.org/wiki/Q13955","display_name":"Arabic","level":2,"score":0.4112704396247864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4078487753868103},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.39825698733329773},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2924942374229431},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22681710124015808},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.18501627445220947},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16341400146484375},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15743517875671387},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11891263723373413},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2008.4625605","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2008.4625605","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE Symposium on Computers and Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1919022003","https://openalex.org/W2125723791","https://openalex.org/W2159390040","https://openalex.org/W2168850265","https://openalex.org/W6639895702"],"related_works":["https://openalex.org/W2415401904","https://openalex.org/W3214708461","https://openalex.org/W172151579","https://openalex.org/W3125384896","https://openalex.org/W4386331007","https://openalex.org/W2227498953","https://openalex.org/W4210506626","https://openalex.org/W3125143615","https://openalex.org/W1524330646","https://openalex.org/W4392788413"],"abstract_inverted_index":{"In":[0,54,69],"recent":[1],"years":[2],"by":[3],"growing":[4],"computer":[5],"applications,":[6],"new":[7,13,58],"technologies":[8],"are":[9,15],"also":[10],"invented.":[11],"Meanwhile":[12],"issues":[14],"faced":[16],"such":[17,33,49,121],"as":[18,34,50],"security.":[19],"One":[20],"of":[21,28,42],"the":[22,40,78,83,96,100],"security":[23],"areas":[24],"is":[25,39,67,74,106,123],"hidden":[26],"exchange":[27],"information":[29],"which":[30],"contains":[31],"methods":[32],"cryptography":[35],"and":[36,64,85,98,132,135],"steganography.":[37],"Steganography":[38,61],"art":[41],"hiding":[43,77,129,140],"data":[44],"in":[45,62,108,116],"a":[46,57,93],"cover":[47],"media":[48],"image":[51],"or":[52],"sound.":[53],"this":[55,70],"paper":[56],"method":[59,71],"for":[60,76,128,139],"Persian":[63,84],"Arabic":[65,86],"texts":[66],"presented.":[68],"pseudo-space":[72,127,134],"character":[73,81,113],"used":[75,115],"data.":[79],"This":[80,112],"prevents":[82],"letters":[87],"from":[88],"joining":[89],"but":[90],"without":[91],"adding":[92],"space":[94,137],"between":[95],"two":[97],"keeps":[99],"words":[101],"closer":[102],"together.":[103],"Its":[104],"code":[105],"200C":[107],"Unicode":[109],"hex":[110],"notation.":[111],"only":[114],"some":[117],"special":[118],"words.":[119],"If":[120],"word":[122],"found,":[124],"we":[125],"use":[126,133],"bit":[130,141],"0":[131],"normal":[136],"together":[138],"1.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
