{"id":"https://openalex.org/W2128129611","doi":"https://doi.org/10.1109/tifs.2010.2063024","title":"Identifying and Resolving Hidden Text Salting","display_name":"Identifying and Resolving Hidden Text Salting","publication_year":2010,"publication_date":"2010-08-05","ids":{"openalex":"https://openalex.org/W2128129611","doi":"https://doi.org/10.1109/tifs.2010.2063024","mag":"2128129611"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2010.2063024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2010.2063024","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075796989","display_name":"Marie\u2010Francine Moens","orcid":"https://orcid.org/0000-0002-3732-9323"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Marie-Francine Moens","raw_affiliation_strings":["Department of Computer Science, Katholieke Universiteit Leuven, Heverlee, Belgium"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Katholieke Universiteit Leuven, Heverlee, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029692765","display_name":"Jan De Beer","orcid":null},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I4210131585","display_name":"IBM (Belgium)","ror":"https://ror.org/03bjbem32","country_code":"BE","type":"company","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210131585"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Jan De Beer","raw_affiliation_strings":["IBM, Brussels, Belgium","Katholieke Universiteit Leuven, Heverlee, Belgium"],"affiliations":[{"raw_affiliation_string":"IBM, Brussels, Belgium","institution_ids":["https://openalex.org/I4210131585"]},{"raw_affiliation_string":"Katholieke Universiteit Leuven, Heverlee, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027110400","display_name":"Erik Boiy","orcid":null},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Erik Boiy","raw_affiliation_strings":["Department of Computer Science, Katholieke Universiteit Leuven, Heverlee, Belgium"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Katholieke Universiteit Leuven, Heverlee, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046679722","display_name":"Juan Carlos G\u00f3mez","orcid":"https://orcid.org/0000-0002-0862-7612"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I98461037","display_name":"Tecnol\u00f3gico de Monterrey","ror":"https://ror.org/03ayjn504","country_code":"MX","type":"education","lineage":["https://openalex.org/I98461037"]}],"countries":["BE","MX"],"is_corresponding":false,"raw_author_name":"Juan Carlos Gomez","raw_affiliation_strings":["ITESM, Monterrey, Mexico","Katholieke Universiteit Leuven, Heverlee, Belgium"],"affiliations":[{"raw_affiliation_string":"ITESM, Monterrey, Mexico","institution_ids":["https://openalex.org/I98461037"]},{"raw_affiliation_string":"Katholieke Universiteit Leuven, Heverlee, Belgium","institution_ids":["https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075796989"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":1.3874,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.88661428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5","issue":"4","first_page":"837","last_page":"847"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8892933130264282},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.7392538785934448},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5381117463111877},{"id":"https://openalex.org/keywords/optical-character-recognition","display_name":"Optical character recognition","score":0.5185178518295288},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.44281649589538574},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4356689155101776},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.4302794337272644},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33366984128952026},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.11748862266540527}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8892933130264282},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.7392538785934448},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5381117463111877},{"id":"https://openalex.org/C546480517","wikidata":"https://www.wikidata.org/wiki/Q167555","display_name":"Optical character recognition","level":3,"score":0.5185178518295288},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.44281649589538574},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4356689155101776},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.4302794337272644},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33366984128952026},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.11748862266540527}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2010.2063024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2010.2063024","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/268432","is_oa":false,"landing_page_url":"https://lirias.kuleuven.be/bitstream/123456789/268432/1/Moensetal-IEEE-TISF.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, vol. 5 (4), Art.No. 4, (837-847)","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322308","display_name":"KU Leuven","ror":"https://ror.org/05f950310"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W185714120","https://openalex.org/W194448979","https://openalex.org/W1653142114","https://openalex.org/W1811872306","https://openalex.org/W1987508326","https://openalex.org/W1992419399","https://openalex.org/W1997564913","https://openalex.org/W2021559701","https://openalex.org/W2026843999","https://openalex.org/W2033314190","https://openalex.org/W2035305892","https://openalex.org/W2066055909","https://openalex.org/W2070228428","https://openalex.org/W2072853501","https://openalex.org/W2074635765","https://openalex.org/W2104290684","https://openalex.org/W2118137541","https://openalex.org/W2124969208","https://openalex.org/W2131906261","https://openalex.org/W2132605240","https://openalex.org/W2134750673","https://openalex.org/W2140050211","https://openalex.org/W2160343382","https://openalex.org/W2161255891","https://openalex.org/W2335888457","https://openalex.org/W2520948221","https://openalex.org/W2537815723","https://openalex.org/W3000705115","https://openalex.org/W4232208315","https://openalex.org/W4241862532","https://openalex.org/W6607592258","https://openalex.org/W6607936437","https://openalex.org/W6638380030","https://openalex.org/W6675789689","https://openalex.org/W6677723693","https://openalex.org/W6680754219"],"related_works":["https://openalex.org/W291250033","https://openalex.org/W2035757446","https://openalex.org/W2008385118","https://openalex.org/W880955280","https://openalex.org/W2106647072","https://openalex.org/W4246858109","https://openalex.org/W54172855","https://openalex.org/W2170209930","https://openalex.org/W2046782623","https://openalex.org/W4205838854"],"abstract_inverted_index":{"Hidden":[0],"salting":[1,126],"in":[2,139,154],"digital":[3,29],"media":[4],"involves":[5],"the":[6,15,36,57,62,69,107,117,134,159],"intentional":[7],"addition":[8],"or":[9],"distortion":[10],"of":[11,17,27,54,68,124,136,161],"content":[12,18,155],"patterns":[13],"with":[14],"purpose":[16],"filtering.":[19],"We":[20,145],"propose":[21],"a":[22,28,44,48,78,147,150],"method":[23,52,138],"to":[24,35,65,149],"detect":[25],"portions":[26,67],"text":[30,71,85,96],"source":[31,70],"which":[32,73,113],"are":[33,41],"invisible":[34,76],"end":[37],"user,":[38],"when":[39],"they":[40],"rendered":[42],"on":[43,84,129],"visual":[45],"medium":[46],"(like":[47],"computer":[49],"monitor).":[50],"The":[51,120],"consists":[53],"\u201ctapping\u201d":[55],"into":[56],"rendering":[58,63,103,118],"process":[59],"and":[60,87,105,122,133],"analyzing":[61],"commands":[64,104],"identify":[66],"(plaintext)":[72],"will":[74],"be":[75],"for":[77],"human":[79],"reader,":[80],"using":[81],"criteria":[82],"based":[83],"character":[86,108],"background":[88],"colors,":[89],"font":[90],"size,":[91],"overlapping":[92],"characters,":[93],"etc.":[94],"Moreover,":[95],"deemed":[97],"visible":[98],"(covertext)":[99],"is":[100,111,127,143],"reconstructed":[101],"from":[102,116],"then":[106],"reading":[109],"order":[110],"identified,":[112],"could":[114],"differ":[115],"order.":[119],"detection":[121],"resolution":[123],"hidden":[125],"evaluated":[128],"two":[130],"e-mail":[131],"corpora,":[132],"effectiveness":[135],"this":[137],"spam":[140],"filtering":[141,156],"task":[142],"assessed.":[144],"provide":[146],"solution":[148],"relevant":[151],"open":[152],"problem":[153],"applications,":[157],"namely":[158],"presence":[160],"tricks":[162],"aimed":[163],"at":[164],"circumventing":[165],"automatic":[166],"filters.":[167]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
