{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T06:04:20Z","timestamp":1750831460221,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030588168"},{"type":"electronic","value":"9783030588175"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58817-5_34","type":"book-chapter","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T16:46:50Z","timestamp":1601398010000},"page":"459-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Two-Layer Image-Steganography System for Covert Communication Over Enterprise Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6665-9308","authenticated-orcid":false,"given":"Arome Junior","family":"Gabriel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5524-6804","authenticated-orcid":false,"given":"Adebayo Olusola","family":"Adetunmbi","sequence":"additional","affiliation":[]},{"given":"Preye","family":"Obaila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,30]]},"reference":[{"key":"34_CR1","unstructured":"Alese, B.K., Gabriel, A.J., Olukayode, O., Daramola, O.A.: Modelling of risk management procedures for cybercrime control systems. In: Proceedings of the World Congress on Engineering (WCE 2014) London, United Kingdom. ISBN 978-988-19252-7-5"},{"issue":"2","key":"34_CR2","first-page":"53","volume":"14","author":"MN Daodu","year":"2016","unstructured":"Daodu, M.N., Gabriel, A.J., Alese, B.K., Adetunmbi, A.O.: A Data Encryption Standard (DES) based web services security architecture. Ann. Comput. Sci. Ser. Tibiscus Univ. 14(2), 53\u201358 (2016)","journal-title":"Ann. Comput. Sci. Ser. Tibiscus Univ."},{"issue":"2","key":"34_CR3","first-page":"59","volume":"25","author":"BM Kuboye","year":"2018","unstructured":"Kuboye, B.M., Gabriel, A.J., Thompson, A.F., Joseph, V.O.: Analysis of algorithms in Long Term Evolution (LTE) network. J. Comput. Sci. Appl. 25(2), 59\u201371 (2018)","journal-title":"J. Comput. Sci. Appl."},{"issue":"2","key":"34_CR4","first-page":"65","volume":"13","author":"AJ Gabriel","year":"2015","unstructured":"Gabriel, A.J., Egwuche, O.S.: Modelling the employees\u2019 activities of public service sector using production rules. Anale. Seria Informatic\u0103 13(2), 65\u201368 (2015). Vol. XIII fasc. 2 \u2013 2015 Annals. Computer Science Series, University of Timisoara, Romania","journal-title":"Anale. Seria Informatic\u0103"},{"issue":"1","key":"34_CR5","first-page":"79","volume":"8","author":"GB Iwasokun","year":"2015","unstructured":"Iwasokun, G.B., Egwuche, O.S., Gabriel, A.J.: Neural network- based health personnel monitoring system. Afr. J. Comput. ICT IEEE 8(1), 79\u201387 (2015)","journal-title":"Afr. J. Comput. ICT IEEE"},{"key":"34_CR6","first-page":"292","volume":"9","author":"AJ Gabriel","year":"2019","unstructured":"Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S., Sarumi, O.A.: Post-quantum crystography system for secure electronic voting, open computer science. DeGruyter 9, 292\u2013298 (2019)","journal-title":"DeGruyter"},{"key":"34_CR7","unstructured":"Agboola, A.H., Gabriel, A.J., Aliyu, E.O., Alese, B.K.: Development of a fuzzy logic based rainfall prediction model. Int. J. Eng. Technol. 3(4), 427\u2013435 (2013). ISSN 2049-3444"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Alabi, O., Thompson, A.F., Alese, B.K., Gabriel, A.J.: Cloud application security using hybrid encryption. Commun. Appl. Electron. 7(33) (2020)","DOI":"10.5120\/cae2020652866"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography; a combination of post-quantum cryptography and steganography. In: The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Technically Co-Sponsored by IEEE UK\/RI Computer Chapter, London, UK, pp. 454\u2013457, 9th\u201312th December 2013","DOI":"10.1109\/ICITST.2013.6750240"},{"issue":"1","key":"34_CR10","doi-asserted-by":"publisher","first-page":"351","DOI":"10.20533\/jitst.2046.3723.2015.0044","volume":"4","author":"AJ Gabriel","year":"2015","unstructured":"Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secured Trans. (JITST) 4(1), 351\u2013357 (2015)","journal-title":"J. Internet Technol. Secured Trans. (JITST)"},{"key":"34_CR11","unstructured":"Malik, A., Sikka, G., Verma, H.K.: A high capacity text steganography scheme based on LZW compression and colour coding. Eng. Sci. Technol. Int. J. 4\u201311 (2016)"},{"key":"34_CR12","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1016\/j.procs.2015.02.079","volume":"46","author":"PM Vidhya","year":"2015","unstructured":"Vidhya, P.M., Paul, V.: A method for text steganography using malayalam text. Proc. Int. J. Comput. Sci. 46, 524\u2013531 (2015)","journal-title":"Proc. Int. J. Comput. Sci."},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.pisc.2016.04.093","volume":"8","author":"M Jain","year":"2016","unstructured":"Jain, M., Kumar, S.: Adaptive circular queue image steganography with RSA cryptosystem. Elsevier Perspect. Sci. 8, 417\u2013420 (2016)","journal-title":"Elsevier Perspect. Sci."},{"issue":"87","key":"34_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.procs.2016.05.127","volume":"2016","author":"P Sethi","year":"2016","unstructured":"Sethi, P., Kapoor, V.: A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography. Proc. Comput. Sci. 2016(87), 61\u201366 (2016)","journal-title":"Proc. Comput. Sci."},{"issue":"14","key":"34_CR15","doi-asserted-by":"publisher","first-page":"3561","DOI":"10.1016\/j.eswa.2013.10.060","volume":"41","author":"S Cheong","year":"2014","unstructured":"Cheong, S., Ling, H., Teh, P.: Encrypted steganography graphical password scheme for near field communication smartphone access control system. Elsevier Expert Syst. Appl. 41(14), 3561\u20133568 (2014)","journal-title":"Elsevier Expert Syst. Appl."},{"issue":"93","key":"34_CR16","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1016\/j.procs.2016.07.270","volume":"2016","author":"P Malathi","year":"2016","unstructured":"Malathi, P., Gireeshkumar, T.: Relating the embedding efficiency of LSB steganography. Elsevier Proc. Comput. Sci. 2016(93), 878\u2013885 (2016)","journal-title":"Elsevier Proc. Comput. Sci."},{"key":"34_CR17","doi-asserted-by":"publisher","unstructured":"Snasel, V., Kromer, P., Safarik, J., Platos, J.: JPEG steganography with particle swarm optimization accelerated by AVX. Special Issue Paper (2019). https:\/\/doi.org\/10.1002\/cpe.544. Wiley; https:\/\/onlinelibrary.wiley.com","DOI":"10.1002\/cpe.544"},{"key":"34_CR18","doi-asserted-by":"publisher","unstructured":"Chatterjee, A., Ghosal, S.K., Sarkar, R.: LSB based steganography with OCR: an intelligent amalgamation. Multimed Tools Appl. 79, 11747\u201311765 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08472-6","DOI":"10.1007\/s11042-019-08472-6"},{"key":"34_CR19","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1007\/978-3-030-30577-2_97","volume-title":"Proceedings of ICETIT 2019","author":"O Rachael","year":"2020","unstructured":"Rachael, O., Misra, S., Ahuja, R., Adewumi, A., Ayeni, F., Mmaskeliunas, R.: Image steganography and steganalysis based on Least Significant Bit (LSB). In: Singh, P.K., Panigrahi, B.K., Suryadevara, N.K., Sharma, S.K., Singh, A.P. (eds.) Proceedings of ICETIT 2019. LNEE, vol. 605, pp. 1100\u20131111. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-30577-2_97"},{"key":"34_CR20","doi-asserted-by":"publisher","unstructured":"Balgurgi, P.P., Jagtap, S.K.: Audio steganography used for secure data transmission. In: Kumar, M.A., Selvarani, R., Kumar, T. (eds.) Proceedings of International Conference on Advances in Computing. Advances in Intelligent Systems and Computing, vol. 174. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-81-322-0740-5_83","DOI":"10.1007\/978-81-322-0740-5_83"},{"issue":"41","key":"34_CR21","doi-asserted-by":"publisher","first-page":"46","DOI":"10.5120\/ijca2020919","volume":"177","author":"OT Adeboje","year":"2020","unstructured":"Adeboje, O.T., Adetunmbi, A.O., Gabriel, A.J.: Embedding text in audio steganography system using advanced encryption standard and spread spectrum. Int. J. Comput. Appl. (0975\u20138887) 177(41), 46\u201351 (2020). https:\/\/doi.org\/10.5120\/ijca2020919","journal-title":"Int. J. Comput. Appl. (0975\u20138887)"},{"key":"34_CR22","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1016\/j.measurement.2015.05.038","volume":"73","author":"S Wang","year":"2015","unstructured":"Wang, S., Sang, J., Song, X., Niu, X.: Least Significant Qubit (LSQb) information hiding algorithm for quantum for quantum image. Measurement 73, 352\u2013359 (2015)","journal-title":"Measurement"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58817-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T14:32:42Z","timestamp":1619188362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58817-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030588168","9783030588175"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58817-5_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cyber chair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1450","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}