{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:47:54Z","timestamp":1742932074858,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493356"},{"type":"electronic","value":"9783030493363"}],"license":[{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49336-3_23","type":"book-chapter","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:05:28Z","timestamp":1597233928000},"page":"230-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Three-Layer Security for Password Protection Using RDH, AES and ECC"],"prefix":"10.1007","author":[{"given":"Nishant","family":"Kumar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Suyash","family":"Ghuge","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C. D.","family":"Jaidhar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,13]]},"reference":[{"key":"23_CR1","unstructured":"Sarkar, T., Sanyal, S.: Reversible and irreversible data hiding technique. \narXiv:1405.2684\n\n (2014)"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"YQ Shi","year":"2016","unstructured":"Shi, Y.Q., Li, X., Zhang, X., Wu, H., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Soliman, S.M., Magdy, B., El Ghany, M.A.A.: Efficient implementation of the AES algorithm for security applications. In: IEEE Conference on System-on-Chip Conference (SOCC), pp. 206\u2013210. IEEE (2016)","DOI":"10.1109\/SOCC.2016.7905466"},{"key":"23_CR4","unstructured":"Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless Recovery of an Original Image Containing Embedded Data. U.S. (2001)"},{"issue":"3\u20134","key":"23_CR5","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3\u20134), 313\u2013336 (1996)","journal-title":"IBM Syst. J."},{"key":"23_CR6","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Proceedings SPIE Security Watermarking Multimedia Contents, vol. 4314, pp. 197\u2013208. Springer (2001)"},{"issue":"8","key":"23_CR7","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1049\/el:19980545","volume":"34","author":"J Huang","year":"1998","unstructured":"Huang, J., Shi, Y.Q.: An adaptive image watermarking scheme based on visual masking. Electron. Lett. 34(8), 748\u2013750 (1998)","journal-title":"Electron. Lett."},{"key":"23_CR8","unstructured":"De Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation on histogram for reversible watermarking. In: IEEE International Multimedia Signal Processing Workshop, pp. 345\u2013350. IEEE (2001)"},{"key":"23_CR9","unstructured":"Shi, Y.Q., Ni, Z., Zou, D., Liang, C.: Lossless data hiding: fundamentals, algorithms and applications. In: IEEE International Symposium Circuits System, vol. 2, pp. 33\u201336. IEEE (2004)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Du, R.: Distortion-free data embedding. In: Proceedings 4th Information Hiding Workshop, vol. 2137, pp. 27\u201341. Springer (2001)","DOI":"10.1007\/3-540-45496-9_3"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless data embedding for all image formats. In: Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents, vol. 4675, pp. 572\u2013583 (2002)","DOI":"10.1117\/12.465317"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Lin, C.C., Shiu, P.F.: DCT-based reversible data hiding scheme. In: ICUIMC 2009, Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, vol. 5, no. 2, pp. 214\u2013224 (2010)","DOI":"10.1145\/1516241.1516298"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"1965","DOI":"10.1016\/j.jss.2013.03.083","volume":"86","author":"K Wang","year":"2013","unstructured":"Wang, K., Lu, Z.-M., Hu, Y.-J.: A high capacity lossless data hiding scheme for JPEG images. J. Syst. Softw. 86, 1965\u20131975 (2013)","journal-title":"J. Syst. Softw."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z., Chai, P., Cui, X., Tong, X.: Reversible data hiding for JPEG images based on histogram pairs. In: Proceedings International Conference on Image Analysis and Recognition, vol. 4633, pp. 715\u2013727. Springer (2007)","DOI":"10.1007\/978-3-540-74260-9_64"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Sakai, H., Kuribayashi, M., Morii, M.: Adaptive reversible data hiding for JPEG images. In: 2008 International Symposium on Information Theory and Its Applications, vol. 23, pp. 1\u20136. IEEE (2008)","DOI":"10.1109\/ISITA.2008.4895529"},{"key":"23_CR16","unstructured":"Efimushkina, T., Egiazarian, K., Gabbouj, M.: Rate-distortion based reversible water- marking for JPEG images with quality factors selection. In: European Workshop on Visual Information Processing (EUVIP), pp. 94\u201399. IEEE (2013)"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","volume":"26","author":"F Huang","year":"2016","unstructured":"Huang, F., Qu, X., Kim, H.J.: Reversible data hiding in JPEG image. IEEE Trans. Circuits Syst. Video Technol. 26, 1610\u20131621 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"18\u201319","key":"23_CR18","first-page":"799","volume":"110","author":"YR Dong","year":"2010","unstructured":"Dong, Y.R., Hahn, S.G.: On the bit security of the weak Diffie-Hellman problem. Inf. Proces. Lett. 110(18\u201319), 799\u2013802 (2010)","journal-title":"Inf. Proces. Lett."},{"issue":"2","key":"23_CR19","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/S1005-8885(09)60454-4","volume":"17","author":"YOU Lin","year":"2010","unstructured":"Lin, Y.O.U., Yong-xuan, S.A.N.G.: Effective generalized equations of secure hyperelliptic curve digital signature algorithms. J. China Univ. Posts Telecommun. 17(2), 100\u2013108 (2010)","journal-title":"J. China Univ. Posts Telecommun."},{"key":"23_CR20","unstructured":"Chia, L.W., Hu, C.H.: Modular arithmetic analyses for RSA cryptosystem. In: Proceedings of 2014 International Symposium on Computer Consume and Control IEEE Press, Taichung, Taiwan, pp. 816\u2013819. IEEE (2014)"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCAS.2002.1173133","volume":"2","author":"X Zhang","year":"2002","unstructured":"Zhang, X., Parhi, K.K.: Implementation approaches for the Advanced Encryption Standard algorithm. IEEE Circuits Syst. Mag. 2, 24\u201346 (2002)","journal-title":"IEEE Circuits Syst. Mag."},{"key":"23_CR22","first-page":"1","volume":"45","author":"G Xuan","year":"2019","unstructured":"Xuan, G., Li, X., Shi, Y.-Q.: Minimum entropy and histogram-pair based JPEG image reversible data hiding. J. Inf. Secur. Appl. 45, 1\u20139 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"23_CR23","first-page":"1115","volume":"8","author":"F Osuolale","year":"2017","unstructured":"Osuolale, F.: Secure data transfer over the internet using image cryptosteganography. Int. J. Sci. Eng. Res. 8, 1115\u20131122 (2017)","journal-title":"Int. J. Sci. Eng. Res."},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Pravalika, S.L., Sheeba Joice, C., Raj, A.N.J.: Comparison of LSB based and HS based reversible data hiding techniques. In: 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS), pp. 1\u20134. IEEE (2014)","DOI":"10.1109\/ICDCSyst.2014.6926152"}],"container-title":["Advances in Intelligent Systems and Computing","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49336-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:49:56Z","timestamp":1597236596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49336-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,13]]},"ISBN":["9783030493356","9783030493363"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49336-3_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,13]]},"assertion":[{"value":"13 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sehore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}