{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:11:38Z","timestamp":1725909098768},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569901"},{"type":"electronic","value":"9783319569918"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-56991-8_54","type":"book-chapter","created":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T23:57:16Z","timestamp":1503359836000},"page":"755-768","source":"Crossref","is-referenced-by-count":8,"title":["Chaos-Based Audio Steganography and Cryptography Using LSB Method and One-Time Pad"],"prefix":"10.1007","author":[{"given":"Samah M. H.","family":"Alwahbani","sequence":"first","affiliation":[]},{"given":"Huwaida T. I.","family":"Elshoush","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"54_CR1","unstructured":"Bassil, Y.: A two intermediates audio steganography technique. J. Emerg. Trends Comput. Inf. Sci. (CIS) 3(11) (2012)"},{"issue":"6","key":"54_CR2","first-page":"68","volume":"1","author":"S Divya","year":"2012","unstructured":"Divya, S., Reddy, M.R.: Hiding text in audio using multiple LSB steganography and provide security using cryptography. Int. J. Sci. Technol. Res. 1(6), 68\u201370 (2012)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"54_CR3","doi-asserted-by":"crossref","unstructured":"Jayaram, P., Ranganatha, H., Anupama, H.: Information hiding using audio steganography - a survey. Int. J. Multimedia Appl. (IJMA) 3(3) (2011)","DOI":"10.5121\/ijma.2011.3308"},{"issue":"2","key":"54_CR4","first-page":"402","volume":"9","author":"G Nehru","year":"2012","unstructured":"Nehru, G., Dhar, P.: A detailed look of audio steganography techniques using LSB and genetic algorithm approach. IJCSI Int. J. Comput. Sci. Issues 9(2), 402\u2013406 (2012)","journal-title":"IJCSI Int. J. Comput. Sci. Issues"},{"issue":"3","key":"54_CR5","first-page":"8","volume":"2","author":"KP Adhiya","year":"2012","unstructured":"Adhiya, K.P., Patil, S.A.: Hiding text in audio using LSB based steganography. Inf. Knowl. Manag. IISTE 2(3), 8\u201314 (2012)","journal-title":"Inf. Knowl. Manag. IISTE"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Cvejic, N., Seppanen, T.: Increasing robustness of LSB audio steganography using a novel embedding method. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC04). IEEE (2004)","DOI":"10.1109\/ITCC.2004.1286709"},{"key":"54_CR7","first-page":"355","volume":"30","author":"M Zamani","year":"2009","unstructured":"Zamani, M., Manaf, A.A., Ahmad, R.B., Zeki, A.M., Abdullah, S.: A genetic-algorithm-based approach for audio steganography. World Acad. Sci. Eng. Technol. 30, 355\u2013358 (2009)","journal-title":"World Acad. Sci. Eng. Technol."},{"issue":"1","key":"54_CR8","first-page":"80","volume":"7","author":"C Parthasarathy","year":"2009","unstructured":"Parthasarathy, C., Srivatsa, S.K.: Increased robustness of LSB audio steganography by reduced distortion LSB coding. J. Theoret. Appl. Inf. Technol. 7(1), 80\u201386 (2009)","journal-title":"J. Theoret. Appl. Inf. Technol."},{"issue":"5","key":"54_CR9","first-page":"174","volume":"1","author":"AB Gadicha","year":"2011","unstructured":"Gadicha, A.B.: Audio wave steganography. Int. J. Soft Comput. Eng. (IJSCE) 1(5), 174\u2013176 (2011)","journal-title":"Int. J. Soft Comput. Eng. (IJSCE)"},{"key":"54_CR10","unstructured":"Bandyopadhyay, S., Datta, B.: Higher LSB layer based audio steganography technique. Int. J. Electron. Commun. Technol. 2(4) (2011)"},{"issue":"2","key":"54_CR11","first-page":"135","volume":"6","author":"DN Hmood","year":"2012","unstructured":"Hmood, D.N., Khudhiar, K.A., Altaei, M.S.: A new steganographic method for embedded image in audio file. Int. J. Comput. Sci. Secur. (IJCSS) 6(2), 135\u2013141 (2012)","journal-title":"Int. J. Comput. Sci. Secur. (IJCSS)"},{"issue":"6","key":"54_CR12","first-page":"531","volume":"1","author":"D Deepak","year":"2012","unstructured":"Deepak, D., Karthik, M.L., Manjunath, A.E.: Efficient method to increase robustness in audio steganography. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 1(6), 531\u2013536 (2012)","journal-title":"Int. J. Adv. Res. Electr. Electron. Instrum. Eng."},{"key":"54_CR13","unstructured":"Olanrewaju, R.F., Khalifa, O., Abdul Rahman, H.: Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Appl. Sci. J. (Math. Appl. Eng.) 21, 79\u201383 (2013)"},{"key":"54_CR14","unstructured":"Priyanka, R.B., Vrushabh, R.K., Komal, K.P., Pingle, S.M., Sanghavi Mahesh, R.: Audio steganography using LSB. In: 1st International Conference on Recent Trends in Engineering and Technology, Special Issue of International Journal of electronics, Communication and Soft Computing Science and Engineering, pp. 90\u201392, March 2012"},{"issue":"4","key":"54_CR15","first-page":"177","volume":"2","author":"G Padmashree","year":"2012","unstructured":"Padmashree, G., Venugopala, P.S.: Audio stegnography and cryptography: using LSB algorithm at 4th and 5th LSB layers. Int. J. Eng. Innov. Technol. (IJEIT) 2(4), 177\u2013181 (2012)","journal-title":"Int. J. Eng. Innov. Technol. (IJEIT)"},{"key":"54_CR16","unstructured":"Patil, B.A., Chakkarwar, V.A.: Review of an improved audio steganographic technique over LSB through random based approach. IOSR J. Comput. Eng. (IOSR-JCE) 9(1), 30\u201334 (2013)"},{"issue":"3","key":"54_CR17","first-page":"507","volume":"13","author":"M Sheikhan","year":"2011","unstructured":"Sheikhan, M., Asadollahi, K., Shahnazi, R.: Improvement of embedding capacity and quality of DWT-based audio steganography systems. World Appl. Sci. J. 13(3), 507\u2013516 (2011)","journal-title":"World Appl. Sci. J."},{"issue":"6","key":"54_CR18","first-page":"40","volume":"40","author":"AV Prabu","year":"2012","unstructured":"Prabu, A.V., Srinivasarao, S., Apparao, T., Rao, M.J., Rao, K.B.: Audio encryption in handsets. Int. J. Comput. Appl. 40(6), 40\u201345 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"54_CR19","unstructured":"Zameer, F., Tarun, K.: Audio steganography using DES algorithm. In: Proceedings of the 5th National Conference, New Delhi, India (2011)"},{"issue":"6","key":"54_CR20","first-page":"363","volume":"2","author":"AR Dengre","year":"2013","unstructured":"Dengre, A.R., Gawande, A.D., Deshmukh, A.B.: Effect of audio steganography based on LSB insertion with image watermarking using AVI video. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2(6), 363\u2013370 (2013)","journal-title":"Int. J. Appl. Innov. Eng. Manag. (IJAIEM)"},{"key":"54_CR21","doi-asserted-by":"crossref","unstructured":"Sathishkumar, G., Bhoopathy, K., Sriraam, N.: Image encryption based on diffusion and multiple chaotic maps. Int. J. Netw. Secur. Appl. (IJNSA) 3(2) (2011)","DOI":"10.5121\/ijnsa.2011.3214"},{"key":"54_CR22","unstructured":"Hung, K.: A study on efficient chaotic image encryption schemes, Department of Electronic Engineering, City University of Hong Kong, Master thesis (2007)"},{"key":"54_CR23","volume-title":"Cryptography and Network Security Principles and Practice","author":"W Stallings","year":"2011","unstructured":"Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Prentice Hall, Boca Raton (2011)","edition":"5"},{"key":"54_CR24","doi-asserted-by":"crossref","unstructured":"Andrade, J., Campos, M., Apolinario, J.: Speech privacy for modern mobile communication systems. In: Proceedings of IEEE Conference on Acoustics, Speech, and Signal Processing, pp. 1777\u20131780. IEEE Press, Nevada (2008)","DOI":"10.1109\/ICASSP.2008.4517975"},{"key":"54_CR25","unstructured":"Awad, A., Saadane, A.: New chaotic permutation methods for image encryption. IAENG Int. J. Comput. Sci. 37(4), 14\u201321 (2010)"},{"key":"54_CR26","doi-asserted-by":"crossref","unstructured":"Zielinska, E., Mazurczyk, W., Szczypiorski, K.: Trends in steganography. Commun. ACM 57(3), 86\u201395 (2014)","DOI":"10.1145\/2566590.2566610"},{"key":"54_CR27","unstructured":"Sinha, N., Bhowmick, A., Kishore, B.: Encrypted information hiding using audio steganography and audio cryptography. Int. J. Comput. Appl. 112(5) (2015)"},{"issue":"1","key":"54_CR28","first-page":"39","volume":"2","author":"S Krishnan","year":"2016","unstructured":"Krishnan, S., Abdullah, M.S.: Enhanced security audio steganography by using higher least significant bit. J. Adv. Res. Comput. Appl. 2(1), 39\u201354 (2016)","journal-title":"J. Adv. Res. Comput. Appl."}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56991-8_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T13:04:50Z","timestamp":1570021490000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56991-8_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319569901","9783319569918"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56991-8_54","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}