[1] Nor Ashila Roslan, Nur Izura Udzir, Ruzliza Mahmod, and Abdallah Gutub. Systematic literature review and analysis for arabic text steganography method practically. Egyptian Informatics Journal, 23(4):177–191, 2022.
[2] Mojtaba Taleby Ahvanooey, Qing Li, Jiarui Hou, Ameer Raza Rajput, and Yang Chen. Modern text hiding, text steganalysis, and applications: a comparative analysis. Entropy, 21(4):355, 2019.
[3] Igor Stojanov, Aneta Mileva, and Ivana Stojanovic. A new property coding in text steganography of microsoft word documents. 2014.
[4] R Din, Rafsanjani Ab Thabit, Nur Izura Udzir, and Sonny Utama. Traid-bit embedding process on arabic text steganography method. Bulletin of Electrical Engineering and Informatics, 10(1): 493–500, 2021.
[5] Marwah Alaa Majeed, Rosli Sulaiman, and Zaitun Shukur. New text steganography technique based on part-of-speech tagging and formatpreserving encryption. KSII Transactions on Internet & Information Systems, 18(1), 2024.
[6] Santosh Panwar, Manoj Kumar, and Sheetal Sharma. Text steganography based on parallel encryption using cover text (pect). In 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019: Internet of Things and Connected Technologies, pages 303–313. Springer International Publishing, 2020.
[7] R Gurunath and D Samanta. A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography. Journal of Database Management (JDM), 34(2):1–22, 2023.
[8] Lokesh Kumar Tyagi, Aayush Gupta, and Adel Mohamed. Unveiling the invisible an in-depth analysis of text steganography techniques, challenges, and advancement. In 2023 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS), pages 177–183. IEEE, 2023.
[9] Muhammad Askari, Arfan Mahmood, and Zunaira Iqbal. A novel font color and compression text steganography technique. In 2023 International Conference on Communication, Computing and Digital Systems (C-CODE), pages 1–6. IEEE, 2023.
[10] Umer Khadam, Muhammad Mubashir Iqbal, Leonardo Mostarda, and Fida Ullah. An efficient framework for text document security and privacy. In Security and Privacy in Social Networks and Big Data: 6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings 6, pages 132–140. Springer Singapore, 2020.
[11] M Shazzad-Ur-Rahman, Anik Singha, Nipa Ibne Akhtar, M Fahim Ashhab, Kaif Ali, et al. An efficient bengali text steganography method using bengali letters and whitespace characters. In Proceedings of International Conference on Trends in Computational and Cognitive Engineering: Proceedings of TCCE 2020, pages 477– 487. Springer Singapore, 2021.
[12] M Khairullah. A novel text steganography system in financial statements. IJDTA International Journal of Database Theory and Application, 7(5):123–132, 2014.
[13] Chin-Yung Chang. Transformations for linguistic steganography. PhD thesis, University of Southern California, 2023.
[14] Sven Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aneta Mileva, Jana Dittmann, Christian Kr¨atzer, J¨org Schwenk, and Sarah Zillien. A generic taxonomy for steganography methods. Authorea Preprints, 2023.
[15] Mustafa Vefa Arısoy. Lzw-cie: a high-capacity linguistic steganography based on lzw char index encoding. Neural Computing & Applications, 34 (21):19117–19145, 2022.
[16] Mohammad Shirali-Shahreza. Pseudo-space persian/arabic text steganography. In 2008 IEEE Symposium on Computers and Communications, pages 864–868. IEEE, 2008.
[17] Wei Peng, Tao Wang, Zheng Qian, Shu Li, and Xinxing Zhang. Cross-modal text steganography against synonym substitution-based text attack. IEEE Signal Processing Letters, 30:299– 303, 2023.