{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:56:50Z","timestamp":1767117410085},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T00:00:00Z","timestamp":1576540800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T00:00:00Z","timestamp":1576540800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11277-019-07013-6","type":"journal-article","created":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T15:02:48Z","timestamp":1576594968000},"page":"21-36","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm"],"prefix":"10.1007","volume":"112","author":[{"given":"R.","family":"Geetha","sequence":"first","affiliation":[]},{"given":"T.","family":"Padmavathy","sequence":"additional","affiliation":[]},{"given":"T.","family":"Thilagam","sequence":"additional","affiliation":[]},{"given":"A.","family":"Lallithasree","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,17]]},"reference":[{"key":"7013_CR1","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1016\/j.procs.2016.02.048","volume":"78","author":"K Sapkal","year":"2016","unstructured":"Sapkal, K., & Shrawankar, U. (2016). Transliteration of secured SMS to Indian regional language. Procedia Computer Science,78, 748\u2013755.","journal-title":"Procedia Computer Science"},{"key":"7013_CR2","doi-asserted-by":"crossref","unstructured":"Jing, X., Hao, Y., Fei, H., & Li, Z. (2012). Text encryption algorithm based on natural language processing. ACM Digital library, pp. 670\u2013672.","DOI":"10.1109\/MINES.2012.216"},{"key":"7013_CR3","doi-asserted-by":"publisher","unstructured":"Hughes, J. P., Hibbard, E. A., Cole, J. L., & Anderson, C. (2011). 1619.2-2010\u2014IEEE standard for wide-block encryption for shared storage media. IEEE. https:\/\/doi.org\/10.1109\/ieeestd.2011.5729263.","DOI":"10.1109\/ieeestd.2011.5729263"},{"key":"7013_CR4","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.procs.2016.02.027","volume":"78","author":"C Baskar","year":"2016","unstructured":"Baskar, C., Balasubramani, C., & Manivannan, D. (2016). Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Computer Science,78, 165\u2013171.","journal-title":"Procedia Computer Science"},{"key":"7013_CR5","doi-asserted-by":"publisher","unstructured":"Chatterjee, R., Bonneau, J., Juels, A., & Ristenpart, T. (2015). Cracking\u2013resistant password vaults using natural language encoders. In IEEE symposium on security and privacy. https:\/\/doi.org\/10.1109\/sp.2015.36.","DOI":"10.1109\/sp.2015.36"},{"key":"7013_CR6","doi-asserted-by":"publisher","unstructured":"Kurniawan, D. H., & Munir, R. (2016). Double chaining algorithm, a secure symmetric-key encryption algorithm. In International conference on advanced informatics: concepts, theory and application (ICAICTA). https:\/\/doi.org\/10.1109\/icaicta.2016.7803097.","DOI":"10.1109\/icaicta.2016.7803097"},{"key":"7013_CR7","doi-asserted-by":"publisher","unstructured":"Ogden, W. C., & Davis, M. W. (2002). Improving cross-language text retrieval with human interactions. In Proceedings of the 33rd annual Hawaii international conference on system sciences. https:\/\/doi.org\/10.1109\/hicss.2000.926726.","DOI":"10.1109\/hicss.2000.926726"},{"key":"7013_CR8","first-page":"55","volume":"7","author":"TP Nagarhalli","year":"2016","unstructured":"Nagarhalli, T. P., Bakal, J. W., & Jain, N. (2016). A survey of Hindi text steganography. International Journal of Scientific & Engineering Research,7, 55\u201361.","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"7013_CR9","doi-asserted-by":"publisher","unstructured":"Baker, S. I. B., & Al-Hamami, A. H. (2017). Novel algorithm in symmetric encryption (NASE). In IEEE international conference on new trends in computing sciences (ICTCS). https:\/\/doi.org\/10.1109\/ictcs.2017.54.","DOI":"10.1109\/ictcs.2017.54"},{"key":"7013_CR10","doi-asserted-by":"publisher","unstructured":"Gupta, A., Semwal, S., & Johari, R. (2016). METHS: Mapping from English language to Hindi language for secure commercial transactions. In International conference on computing, communication and automation (ICCCA). https:\/\/doi.org\/10.1109\/ccaa.2016.7813700.","DOI":"10.1109\/ccaa.2016.7813700"},{"key":"7013_CR11","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1016\/j.procs.2015.02.079","volume":"46","author":"PM Vidhya","year":"2015","unstructured":"Vidhya, P. M., & Paul, V. (2015). A method for text steganography using Malayalam text. Procedia Computer Science,46, 524\u2013531.","journal-title":"Procedia Computer Science"},{"issue":"3","key":"7013_CR12","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.jksuci.2018.01.008","volume":"31","author":"M Khairullah","year":"2019","unstructured":"Khairullah, M. (2019). A novel steganography method using transliteration of Bengali text. Journal of King Saud University Computer and Information Sciences,31(3), 348\u2013366. https:\/\/doi.org\/10.1016\/j.jksuci.2018.01.008.","journal-title":"Journal of King Saud University Computer and Information Sciences"},{"key":"7013_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.07.007","author":"A Taha","year":"2018","unstructured":"Taha, A., Hammad, A. S., & Selim, M. M. (2018). A high capacity algorithm for information hiding in Arabic text. Journal of King Saud University Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2018.07.007.","journal-title":"Journal of King Saud University Computer and Information Sciences"},{"key":"7013_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.04.015","author":"AA Hamzah","year":"2019","unstructured":"Hamzah, A. A., Khattab, S., & Bayomi, H. (2019). A linguistic steganography framework using Arabic calligraphy. Journal of King Saud University Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2019.04.015.","journal-title":"Journal of King Saud University Computer and Information Sciences"},{"key":"7013_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.protcy.2013.12.349","volume":"10","author":"S Roy","year":"2013","unstructured":"Roy, S., & Venkateswaran, P. (2013). A text based steganography technique with Indian root. Procedia Technology,10, 167\u2013171.","journal-title":"Procedia Technology"},{"key":"7013_CR16","doi-asserted-by":"publisher","unstructured":"Vijaya Bharati, P., & Jyothi Prasad K. S. S. (2016). Cryptic transmission of Telugu text. In International conference on information communication and embedded systems (ICICES). https:\/\/doi.org\/10.1109\/icices.2016.7518877.","DOI":"10.1109\/icices.2016.7518877"},{"key":"7013_CR17","doi-asserted-by":"publisher","unstructured":"Changder, S., Ghosh, D., & Debnath, N. C. (2010). Linguistic approach for text steganography through Indian text. In International conference on computer technology and development. https:\/\/doi.org\/10.1109\/icctd.2010.5645862.","DOI":"10.1109\/icctd.2010.5645862"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-07013-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-07013-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-07013-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,16]],"date-time":"2020-12-16T00:47:18Z","timestamp":1608079638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-07013-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,17]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["7013"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-07013-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,17]]},"assertion":[{"value":"17 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}