{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:32:29Z","timestamp":1743060749645,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031813351"},{"type":"electronic","value":"9783031813368"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81336-8_13","type":"book-chapter","created":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T16:44:28Z","timestamp":1739292268000},"page":"155-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Text Data Security Through Hybrid Method Using Visual Cryptography and Image Steganography Algorithms"],"prefix":"10.1007","author":[{"family":"Bhawna","sequence":"first","affiliation":[]},{"given":"Sanjay Kumar","family":"Malik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,12]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Amin, M.M., Salleh, M., Ibrahim, S., Katmin, M.R., Shamsuddin, M.Z.I.: Information hiding using steganography. In: 4th National Conference of Telecommunication Technology. NCTT 2003 Proceedings, pp. 21\u201325. IEEE (2003)","DOI":"10.1109\/NCTT.2003.1188294"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76\u201382 (2004)","DOI":"10.1145\/1022594.1022597"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Juneja, M., Sandhu, P.S.: Designing of robust image steganography technique based on LSB insertion and encryption. In: 2009 International Conference on Advances in Recent Technologies in Communication and Computing, pp. 302\u2013305. IEEE (2009)","DOI":"10.1109\/ARTCom.2009.228"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Narayana, S., Prasad, G.: Two new approaches for secured image steganography using cryptographic techniques and type conversions. Sig. Image Process. Int. J. (SIPIJ) 1 (2010)","DOI":"10.5121\/sipij.2010.1206"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Marwaha, P., Marwaha, P.: Visual cryptographic steganography in images. In: 2010 Second International Conference on Computing, Communication and Networking Technologies. pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/ICCCNT.2010.5591730"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Usha, S., Kumar, G.S., Boopathybagan, K.: A secure triple level encryption method using cryptography and steganography. In: Proceedings of 2011 International Conference on Computer Science and Network Technology, vol. 2, pp. 1017\u20131020. IEEE (2011)","DOI":"10.1109\/ICCSNT.2011.6182134"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Bharti, P., Soni, R.: A new approach of data hiding in images using cryptography and steganography. Int. J. Comput. Appl. 58(18) (2012)","DOI":"10.5120\/9379-3716"},{"issue":"6","key":"13_CR8","doi-asserted-by":"publisher","first-page":"59","DOI":"10.5815\/ijmecs.2012.06.08","volume":"4","author":"S Dey","year":"2012","unstructured":"Dey, S., Mondal, K., Nath, J., Nath, A.: Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: ASA_QR algorithm. Int. J. Mod. Educ. Comput. Sci. 4(6), 59 (2012)","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Abikoye Oluwakemi, C., Adewole Kayode, S., Oladipupo Ayotunde, J.: Efficient data hiding system using cryptography and steganography. Int. J. Appl. Inf. Syst. IJAIS411 6, 11 (2012)","DOI":"10.5120\/ijais12-450763"},{"issue":"6","key":"13_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.5815\/ijmecs.2012.06.04","volume":"4","author":"S Gupta","year":"2012","unstructured":"Gupta, S., Goyal, A., Bhushan, B.: Information hiding using least significant bit steganography and cryptography. Int. J. Mod. Educ. Comput. Sci. 4(6), 27 (2012)","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"issue":"5","key":"13_CR11","first-page":"508","volume":"8","author":"MJ Saeed","year":"2013","unstructured":"Saeed, M.J.: A new technique based on chaotic steganography and encryption text in DCT domain for color image. J. Eng. Sci. Technol. 8(5), 508\u2013520 (2013)","journal-title":"J. Eng. Sci. Technol."},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Reddy, V.L., Subramanyam, A., Reddy, P.C.: A novel approach for hiding encrypted data in image, audio and video using steganography. Int. J. Comput. Appl. 69(15) (2013)","DOI":"10.5120\/11922-8131"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Saraireh, S.: A secure data communication system using cryptography and steganography. Int. J. Comput. Netw. Commun. (IJCNC) 5 (2013)","DOI":"10.5121\/ijcnc.2013.5310"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Sharma, M.H., MithleshArya, M., Goyal, M.D.: Secure image hiding algorithm using cryptography and steganography. IOSR J. Comput. Eng. (IOSR-JCE) e-ISSN 13(5), 1\u20136 (2013)","DOI":"10.9790\/0661-1350106"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Thangadurai, K., Devi, G.S.: An analysis of LSB based image steganography techniques. In: 2014 International Conference on Computer Communication and Informatics, pp. 1\u20134. IEEE (2014)","DOI":"10.1109\/ICCCI.2014.6921751"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Islam, M.R., Siddiqa, A., Uddin, M.P., Mandal, A.K., Hossain, M.D.: An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In: 2014 International Conference on Informatics, Electronics and Vision (ICIEV), pp. 1\u20136). IEEE (2014)","DOI":"10.1109\/ICIEV.2014.6850714"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Vegh, L., Miclea, L.: Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In: 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/AQTR.2014.6857845"},{"issue":"5","key":"13_CR18","first-page":"132","volume":"3","author":"J Kour","year":"2014","unstructured":"Kour, J., Verma, D.: Steganography techniques\u2013a review paper. Int. J. Emerg. Res. Manag. Technol. 3(5), 132\u2013135 (2014)","journal-title":"Int. J. Emerg. Res. Manag. Technol."},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Joshi, K., Yadav, R.: A new LSB-S image steganography method blend with Cryptography for secret communication. In: 2015 Third International Conference on Image Information Processing (ICIIP), pp. 86\u201390. IEEE (2015)","DOI":"10.1109\/ICIIP.2015.7414745"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Mishra, R., Bhanodiya, P.: A review on steganography and cryptography. In: 2015 International Conference on Advances in Computer Engineering and Applications, pp. 119\u2013122. IEEE (2015)","DOI":"10.1109\/ICACEA.2015.7164679"},{"key":"13_CR21","unstructured":"Dubey, R., Saxena, A., Gond, S.: An innovative data security techniques using cryptography and steganographic techniques. IJCSIT: Int. J. Comput. Sci. Inf. Technol. 6(3), 2175\u20132182 (2015)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"GNDU RC, J.: Dual layer security of data using LSB Image steganography method and AES encryption algorithm. Int. J. Sig. Process. Image Process. Pattern Recogn. 8(5), 259\u2013266 (2015)","DOI":"10.14257\/ijsip.2015.8.5.27"},{"issue":"2","key":"13_CR23","first-page":"10","volume":"1","author":"RK Sheth","year":"2015","unstructured":"Sheth, R.K., Tank, R.M.: Image steganography techniques. Int. J. Comput. Eng. Sci. 1(2), 10\u201315 (2015)","journal-title":"Int. J. Comput. Eng. Sci."},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Saleh, M.E., Aly, A.A., Omara, F.A.: Data security using cryptography and steganography techniques. Int. J. Adv. Comput. Sci. Appl. 7(6) (2016)","DOI":"10.14569\/IJACSA.2016.070651"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Saritha, M., Khadabadi, V.M., Sushravya, M.: Image and text steganography with cryptography using MATLAB. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), pp. 584\u2013587. IEEE (2016)","DOI":"10.1109\/SCOPES.2016.7955506"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Das, R., Das, I.: Secure data transfer in IoT environment: adopting both cryptography and steganography techniques. In: 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp. 296\u2013301. IEEE (2016)","DOI":"10.1109\/ICRCICN.2016.7813674"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Sajisha, K.S., Mathew, S.: An encryption based on DNA cryptography and steganography. In: 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 162\u2013167. IEEE (2017)","DOI":"10.1109\/ICECA.2017.8212786"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Bangera, K.N., Reddy, N.S., Paddambail, Y., Shivaprasad, G.: Multilayer security using RSA cryptography and dual audio steganography. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (RTEICT), pp. 492\u2013495. IEEE (2017)","DOI":"10.1109\/RTEICT.2017.8256645"},{"issue":"4","key":"13_CR29","first-page":"13","volume":"10","author":"AK Saxena","year":"2018","unstructured":"Saxena, A.K., Sinha, S., Shukla, P.: Design and development of image security technique by using cryptography and steganography: a combine approach. Int. J. Image Graph. Sig. Process. 10(4), 13 (2018)","journal-title":"Int. J. Image Graph. Sig. Process."},{"key":"13_CR30","doi-asserted-by":"publisher","unstructured":"Yahya, A.: Introduction to steganography. In: Yahya, A. (ed.) Steganography Techniques for Digital Images, pp. 1\u20137. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-78597-4_1","DOI":"10.1007\/978-3-319-78597-4_1"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Sharma, K., Aggarwal, A., Singhania, T., Gupta, D., Khanna, A.: Hiding data in images using cryptography and deep neural network. arXiv preprint arXiv:1912.10413 (2019)","DOI":"10.33969\/AIS.2019.11009"},{"key":"13_CR32","doi-asserted-by":"publisher","unstructured":"Liu, M., Song, T., Luo, W., Zheng, P., Huang, J.: Adversarial steganography embedding via Stego generation and Selection. In: IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 3, pp. 2375\u20132389, 1 May\u2013June 2023 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3182041","DOI":"10.1109\/TDSC.2022.3182041"},{"key":"13_CR33","doi-asserted-by":"publisher","unstructured":"Zhang, J., Chen, K., Li, W., Zhang, W., Yu, N.: Steganography with generated images: leveraging volatility to enhance security. IEEE Trans. Depend. Secure Comput. (2023) https:\/\/doi.org\/10.1109\/TDSC.2023.3341427","DOI":"10.1109\/TDSC.2023.3341427"},{"key":"13_CR34","unstructured":"Navtej, P., Medini, H., Mamisha, P.: Blockchain technology based image steganography. In: 3 IJCRT, vol. 11 (2023). ISSN 2320-2882"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence in Communications and Business Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81336-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T16:44:50Z","timestamp":1739292290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81336-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031813351","9783031813368"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81336-8_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"12 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICBA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Intelligence in Communications and Business Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Patna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicba2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cicba.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}