{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T09:49:01Z","timestamp":1771494541832,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T00:00:00Z","timestamp":1548374400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11334-019-00324-8","type":"journal-article","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T12:42:19Z","timestamp":1548420139000},"page":"65-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding"],"prefix":"10.1007","volume":"15","author":[{"given":"Sunanda","family":"Jana","sequence":"first","affiliation":[]},{"given":"Arnab Kumar","family":"Maji","sequence":"additional","affiliation":[]},{"given":"Rajat Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,25]]},"reference":[{"key":"324_CR1","doi-asserted-by":"crossref","unstructured":"Ali S, Guo X, Karri R, Mukhopadhyay D (2016) Fault attacks on AES and their countermeasures. In: Secure system design and trustable computing, book part: part I, pp 163\u2013208","DOI":"10.1007\/978-3-319-14971-4_5"},{"key":"324_CR2","unstructured":"Bhaumik J, Roy Chowdhury D (2009) NMIX: an ideal candidate for key mixing. In: Proceedings of the international conference on security and cryptography, pp 285\u2013288"},{"issue":"1","key":"324_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.4304\/jcm.5.1.5-12","volume":"5","author":"C-C Chang","year":"2010","unstructured":"Chang C-C, Lin P-Y, Wang ZH, Li MC (2010) A Sudoku based secret image sharing scheme with reversibility. J Commun 5(1):5\u201312","journal-title":"J Commun"},{"issue":"3","key":"324_CR4","first-page":"2335","volume":"6","author":"KN Choudry","year":"2015","unstructured":"Choudry KN, Wanjari A (2015) A survey paper on video steganography. Int J Comput Sci Inf Technol 6(3):2335\u20132338","journal-title":"Int J Comput Sci Inf Technol"},{"key":"324_CR5","doi-asserted-by":"crossref","unstructured":"Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. In: Proceedings of IEEE image processing, pp 135\u2013149","DOI":"10.1109\/83.650120"},{"key":"324_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael. Springer, Heidelberg"},{"issue":"3","key":"324_CR7","first-page":"193","volume":"16","author":"S Das","year":"2014","unstructured":"Das S, Bhaumik J (2014) A Fault based Attack on MDS-AES. International Journal of Network Security 16(3):193\u2013198","journal-title":"International Journal of Network Security"},{"key":"324_CR8","doi-asserted-by":"crossref","unstructured":"Dey D, Bandyopadhyay A, Jana S, Maji AK, Pal RK (2017) A novel image steganographic scheme using 8\u2009\u00d7\u20098 Sudoku puzzle. In: Advanced computing and systems for security. Springer, Singapore, pp 85\u2013100","DOI":"10.1007\/978-981-10-3409-1_6"},{"issue":"7","key":"324_CR9","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1101\/gr.092957.109","volume":"19","author":"Y Erlich","year":"2009","unstructured":"Erlich Y, Chang K, Gordon A, Ronen R, Navon O, Rooks M, Hannon GJ (2009) DNA Sudoku: harnessing high-throughput sequencing for multiplexed specimen analysis. Genome Res J 19(7):1243\u20131253","journal-title":"Genome Res J"},{"issue":"3","key":"324_CR10","first-page":"635","volume":"5","author":"ES Ginni","year":"2016","unstructured":"Ginni ES, Pushpinder E (2016) A review on secure video steganography technique using LSB and MSB. Int J Adv Res Comput Commun Eng 5(3):635\u2013639","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"324_CR11","doi-asserted-by":"crossref","unstructured":"Giraud C, Thiebeauld H (2004) A survey on fault attacks. In: 6th international conference on smart card research and advanced applications (CARDIS) VI, IFIP 18th world computer congress, TC8\/WG8.8 & TC11\/WG11.2, Toulouse, France, pp 159\u2013176","DOI":"10.1007\/1-4020-8147-2_11"},{"issue":"5","key":"324_CR12","first-page":"14","volume":"10","author":"S Gupta","year":"2015","unstructured":"Gupta S, Saxena J, Singh S (2015) Design of random scan algorithm in video steganography for security purposes. IOSR J Electron Commun Eng 10(5):14\u201320","journal-title":"IOSR J Electron Commun Eng"},{"key":"324_CR13","unstructured":"Hao B, Zhao L-Y, Zhong W-D (2011) A novel steganography algorithm based on the motion vector and matrix encoding. In: Proceedings of the communication software and networks (ICCSN), pp 406\u2013409"},{"key":"324_CR14","doi-asserted-by":"crossref","unstructured":"Hong W, Chen T-S, Shiu C-W (2008) Steganography using Sudoku revisited. In: Proceedings of the 2nd international symposium on intelligent information technology application, pp 935\u2013939","DOI":"10.1109\/IITA.2008.445"},{"key":"324_CR15","unstructured":"Hu SD, Tu K (2011) A novel video steganography based on non-uniform rectangular partition. In: Proceedings of the IEEE International conference on computational science and engineering, pp 57\u201361"},{"key":"324_CR16","doi-asserted-by":"crossref","unstructured":"Jana S, Maji AK, Pal RK (2015) A novel Sudoku solving technique using column based permutation. In: Proceedings of the international symposium on advanced computing and communication (ISAAC), pp 71\u201377","DOI":"10.1109\/ISACC.2015.7377318"},{"issue":"2","key":"324_CR17","first-page":"565","volume":"7","author":"Y Liu","year":"2013","unstructured":"Liu Y, Li Z, Ma X, Liu J (2013) Robust data hiding algorithm for H. 264\/AVC video streams. J Syst Softw 7(2):565\u2013572","journal-title":"J Syst Softw"},{"key":"324_CR18","unstructured":"Maity G, Jana S, Mantri M, Bhaumik J (2018) Improving security of SPN-type block cipher against fault attack. In: Communication, devices, and computing, lecture notes in electrical engineering, vol 470. Springer, Singapore, pp 115\u2013126"},{"key":"324_CR19","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.neucom.2015.05.126","volume":"174","author":"I Mehmood","year":"2016","unstructured":"Mehmood I, Sajjad M, Rho S, Baik SW (2016) Divide-and-conquer based summarization framework for extracting affective video content. Neurocomputing 174:393\u2013403","journal-title":"Neurocomputing"},{"key":"324_CR20","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay D (2009) An improved fault based attack of the advanced encryption standard. In: AFRICACRYPT, LNCS, 5580, pp 421\u2013434","DOI":"10.1007\/978-3-642-02384-2_26"},{"issue":"3","key":"324_CR21","first-page":"314","volume":"2","author":"AP Sherly","year":"2010","unstructured":"Sherly AP, Amritha PP (2010) A compressed video steganography using TPVD. Int J Database Manag Syst 2(3):314\u2013321","journal-title":"Int J Database Manag Syst"},{"issue":"5","key":"324_CR22","first-page":"314","volume":"2","author":"A Swathi","year":"2012","unstructured":"Swathi A, Jilani SAK (2012) Video steganography by LSB substitution using different polynomial equations. Int J Comput Eng Res 2(5):314\u2013325","journal-title":"Int J Comput Eng Res"},{"issue":"6","key":"324_CR23","first-page":"206","volume":"5","author":"V Swetha","year":"2015","unstructured":"Swetha V, Prajith V, Kshema V (2015) Data hiding using video steganography\u2014a survey. Int J Sci Eng Comput Technol 5(6):206\u2013213","journal-title":"Int J Sci Eng Comput Technol"},{"issue":"3","key":"324_CR24","first-page":"72","volume":"1","author":"P Vasudev","year":"2013","unstructured":"Vasudev P, Saurabh K (2013) Video steganography using 32\u2009\u00d7\u200932 vector quantization of DCT. Int J Softw Hardw Res Eng 1(3):72\u201381","journal-title":"Int J Softw Hardw Res Eng"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11334-019-00324-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-019-00324-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-019-00324-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T19:20:15Z","timestamp":1579893615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11334-019-00324-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,25]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["324"],"URL":"https:\/\/doi.org\/10.1007\/s11334-019-00324-8","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"value":"1614-5046","type":"print"},{"value":"1614-5054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,25]]},"assertion":[{"value":"13 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}