{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:09:40Z","timestamp":1742980180249,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030671006"},{"type":"electronic","value":"9783030671013"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67101-3_25","type":"book-chapter","created":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T02:02:22Z","timestamp":1610503342000},"page":"310-322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid Domain Steganography for Embedding DES Encrypted QR Code Using Random Bit Binary Search"],"prefix":"10.1007","author":[{"given":"B. S.","family":"Shashikiran","sequence":"first","affiliation":[]},{"given":"K.","family":"Shaila","sequence":"additional","affiliation":[]},{"given":"K. R.","family":"Venugopal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,13]]},"reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"113","DOI":"10.6087\/kcse.2014.1.113","volume":"1","author":"JH Chang","year":"2014","unstructured":"Chang, J.H.: An introduction to QR code using scholarly journals. Sci. Ed. J. 1(2), 113\u2013117 (2014)","journal-title":"Sci. Ed. J."},{"issue":"9","key":"25_CR2","doi-asserted-by":"publisher","first-page":"4413","DOI":"10.1109\/TIP.2019.2908490","volume":"28","author":"T Yuan","year":"2019","unstructured":"Yuan, T., Wang, Y., Xu, K.: Two-layer QR codes. IEEE Trans. Image Process. 28(9), 4413\u20134428 (2019)","journal-title":"IEEE Trans. Image Process."},{"key":"25_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-20367-1_56","volume-title":"Advanced Research on Electronic Commerce, Web Application, and Communication","author":"Z Liu","year":"2011","unstructured":"Liu, Z., Zeng, Q., Wang, C., Lu, Q.: Application research of QR code barcode in validation of express delivery. In: Shen, G., Huang, X. (eds.) ECWAC 2011. CCIS, vol. 143, pp. 346\u2013351. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20367-1_56"},{"key":"25_CR4","unstructured":"Yanti, N., Surya, W.A., Akhyar, A., Frica A.A.: Implementation of Advanced Encryption Standard (AES) and QR code algorithm on digital legalization system. In: International Conference on Energy, Environment, Epidemiology and Information System (ICENIS), pp 1\u20137 (2018)"},{"issue":"4","key":"25_CR5","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TR.2019.2937214","volume":"68","author":"B Alexandre","year":"2019","unstructured":"Alexandre, B., Richard, D., Nuno, A., Nuno, L., Marco, V.: Understanding how to use static analysis tool for detecting cryptography misuse in software. IEEE Trans. Relaibility 68(4), 1384\u20131403 (2019)","journal-title":"IEEE Trans. Relaibility"},{"issue":"4","key":"25_CR6","first-page":"27","volume":"3","author":"S Suguna","year":"2016","unstructured":"Suguna, S., Dhanakoti, V., Manjupriya, R.: A study on symmetric and asymmetric key encryption algorithms. Int. Res. J. Eng. Technol. (IRJET) 3(4), 27\u201331 (2016)","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"key":"25_CR7","first-page":"31","volume":"8","author":"N Kaur","year":"2016","unstructured":"Kaur, N., Sodhi, S.: Data Encryption Standard Algorithm (DES) for secure data transmission. Int. J. Comput. Appl. 8, 31\u201337 (2016)","journal-title":"Int. J. Comput. Appl."},{"issue":"4","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1109\/TIP.2017.2657886","volume":"26","author":"Z Hang","year":"2017","unstructured":"Hang, Z., Kejiang, C., Weiming, Z., Nenghai, Y.: Comments on steganography using reversible texture synthesis. IEEE Trans. Image Process. 26(4), 1623\u20131625 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"119393","DOI":"10.1109\/ACCESS.2019.2936614","volume":"7","author":"W Jie","year":"2019","unstructured":"Jie, W., Xiaoqing, J., et al.: A cover selection HEVC video steganography based on intra prediction mode. IEEE Access 7, 119393\u2013119402 (2019)","journal-title":"IEEE Access"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Sharma, R., Sharma, N.: A more private & secure E-mail system using image steganography (EPS) and data mining. In: International Conference on Advances in Information Communication Technology and Computing, Article no 104, pp 1\u20135 (2016)","DOI":"10.1145\/2979779.2979827"},{"issue":"3","key":"25_CR11","first-page":"16","volume":"4","author":"V Lokesswara Reddy","year":"2017","unstructured":"Lokesswara Reddy, V.: Improved secure data transfer using video steganographic technique. Int. J. Rough Sets Data Anal. 4(3), 16 (2017)","journal-title":"Int. J. Rough Sets Data Anal."},{"issue":"3","key":"25_CR12","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/TIFS.2015.2506546","volume":"11","author":"T Iuliia","year":"2016","unstructured":"Iuliia, T., William, P.: Two-level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur. 11(3), 571\u2013583 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Baharav, Z., Kakarala, R.: Visually significant QR codes: image blending and statistical analysis. In: International Conference on Multimedia and Expo (ICME), pp 1\u20136 (2013)","DOI":"10.1109\/ICME.2013.6607571"},{"issue":"7","key":"25_CR14","doi-asserted-by":"publisher","first-page":"2842","DOI":"10.1109\/TIP.2014.2321501","volume":"23","author":"GR Arce","year":"2014","unstructured":"Arce, G.R., Lau, D.L., Villarreal, O.P.: QR images: optimized image embedding in QR codes. IEEE Trans. Image Process. 23(7), 2842\u20132853 (2014)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"25_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-016-0155-0","volume":"2017","author":"Pei-Yu Lin","year":"2017","unstructured":"Lin, Pei-Yu., Chen, Y.-H.: High payload secret hiding technology for QR codes. EURASIP J. Image and Video Process. 2017(1), 1\u20138 (2017). https:\/\/doi.org\/10.1186\/s13640-016-0155-0. Springer Open Access","journal-title":"EURASIP J. Image and Video Process."},{"key":"25_CR16","first-page":"59","volume":"6","author":"S Dev","year":"2012","unstructured":"Dev, S., Mondal, K., et al.: Advanced steganography algorithm using randamized intermediate QR host embedded within any encrypted secret message. Int. J. Mod. Educ. Comput. Sci. 6, 59\u201367 (2012)","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"issue":"5","key":"25_CR17","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"Guo, L., Ni, J., Shi, Y.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814\u2013825 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"25_CR18","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221\u2013234 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"25_CR19","unstructured":"Vladim\u00edr, H., Martin, B., et al.: Image steganography with using QR code and cryptography. In: Conference on Radio Elektronika, Slovak republic, pp 1\u2013 4 (2016)"},{"issue":"3","key":"25_CR20","first-page":"1111","volume":"4","author":"J Daphney","year":"2018","unstructured":"Daphney, J., Girish, S.: A method of data hiding in QR code using image steganography. Int. J. Adv. Res. Ideas Innov. Technol. 4(3), 1111\u20131113 (2018)","journal-title":"Int. J. Adv. Res. Ideas Innov. Technol."},{"issue":"1","key":"25_CR21","first-page":"9","volume":"3","author":"M Ramesh","year":"2013","unstructured":"Ramesh, M., Prabakaran, G., Bhavani, R.: QR-DWT code image steganography. Int. J. Comput. Intell. Inf. 3(1), 9\u201313 (2013)","journal-title":"Int. J. Comput. Intell. Inf."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Context-Aware Systems and Applications, and Nature of Computation and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67101-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T18:59:33Z","timestamp":1619290773000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-67101-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030671006","9783030671013"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67101-3_25","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"13 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Nature of Computation and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thai Nguyen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictcc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ictcc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"68","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID 19 pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}