{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:36:17Z","timestamp":1775669777298,"version":"3.50.1"},"reference-count":39,"publisher":"Informa UK Limited","issue":"2","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2024,4,2]]},"DOI":"10.1080\/24751839.2023.2285549","type":"journal-article","created":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T15:04:25Z","timestamp":1701011065000},"page":"280-300","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption"],"prefix":"10.1080","volume":"8","author":[{"given":"Dhairya","family":"Veera","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Dwarkadas J. Sanghvi College of Engineering, University of Mumbai, Mumbai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9020-0713","authenticated-orcid":false,"given":"Ramchandra","family":"Mangrulkar","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Dwarkadas J. Sanghvi College of Engineering, University of Mumbai, Mumbai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7147-6378","authenticated-orcid":false,"given":"Chetashri","family":"Bhadane","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Dwarkadas J. Sanghvi College of Engineering, University of Mumbai, Mumbai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5689-8273","authenticated-orcid":false,"given":"Kiran","family":"Bhowmick","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Ramrao Adik Institute of Technology, D. Y. Patil Deemed to be University, Navi Mumbai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1507-274X","authenticated-orcid":false,"given":"Pallavi","family":"Chavan","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Dwarkadas J. Sanghvi College of Engineering, University of Mumbai, Mumbai, India"}]}],"member":"301","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1718248"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2017.1323476"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.06.049"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.887058"},{"issue":"7","key":"e_1_3_2_7_1","first-page":"772","article-title":"Enhancing the security of Caesar Cipher using double substitution method","volume":"5","author":"Dar S. B.","year":"2014","unstructured":"Dar, S. B. (2014). Enhancing the security of Caesar Cipher using double substitution method. International Journal of Computer Science & Engineering Technology, 5(7), 772\u2013774.","journal-title":"International Journal of Computer Science & Engineering Technology"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2023.2183802"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijfgcn"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.5120\/12722-9558"},{"key":"e_1_3_2_11_1","unstructured":"Hu F. Pu C. Gao H. Tang M. & Li L. (2016). An image compression and encryption scheme based on deep learning. CoRR abs\/1608.05001."},{"key":"e_1_3_2_12_1","first-page":"1","article-title":"Batch image encryption using generated deep features based on stacked autoencoder network","volume":"2017","author":"Hu F.","year":"2017","unstructured":"Hu, F., Wang, J., Xu, X., Pu, C., & Peng, T. (2017). Batch image encryption using generated deep features based on stacked autoencoder network. Mathematical Problems in Engineering, 2017, 1\u201312.","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.048"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2015.1087074"},{"key":"e_1_3_2_15_1","doi-asserted-by":"crossref","unstructured":"Leong M.-P. Cheung O. Y. Tsoi K. H. & Leong P. H. W. (2000). A bit-serial implementation of the international data encryption algorithm idea. In Proceedings 2000 IEEE Symposium on Field-Programmable Custom Computing Machines (Cat. No. PR00871) (pp. 122\u2013131). IEEE.","DOI":"10.1109\/FPGA.2000.903399"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/09500340.2014.946565"},{"key":"e_1_3_2_17_1","doi-asserted-by":"crossref","unstructured":"Maity A. Ghosh R. & Bhadra S. (2022). Image encryption using RSA and advanced Caesar Cipher method. In 2022 International Conference on Advancements in Smart Secure and Intelligent Computing (ASSIC) (pp. 1\u20135).","DOI":"10.1109\/ASSIC55218.2022.10088329"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.103173"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103134"},{"issue":"23","key":"e_1_3_2_20_1","first-page":"13265","article-title":"A survey and analysis of the image encryption methods","volume":"12","author":"Mohammad O. F.","year":"2017","unstructured":"Mohammad, O. F., Rahim, M. S. M., Zeebaree, S. R. M., & Ahmed, F. (2017). A survey and analysis of the image encryption methods. International Journal of Applied Engineering Research, 12(23), 13265\u201313280.","journal-title":"International Journal of Applied Engineering Research"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2021.1982082"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2018.1542574"},{"key":"e_1_3_2_23_1","doi-asserted-by":"crossref","unstructured":"Qowi Z. & Hudallah N. (2021). Combining Caesar Cipher and Hill Cipher in the generating encryption key on the Vigenere Cipher Algorithm. In Journal of Physics: Conference Series (Vol. 1918 pp. 042009). IOP Publishing.","DOI":"10.1088\/1742-6596\/1918\/4\/042009"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1339\/1\/012007"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2018.094930"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119191865731"},{"issue":"5","key":"e_1_3_2_27_1","first-page":"348","article-title":"Modified Caesar Cipher and rail fence technique to enhance security","volume":"2","author":"Saini B.","year":"2015","unstructured":"Saini, B. (2015). Modified Caesar Cipher and rail fence technique to enhance security. Int J Trend Res Dev, 2(5), 348\u2013350.","journal-title":"Int J Trend Res Dev"},{"key":"e_1_3_2_28_1","doi-asserted-by":"crossref","unstructured":"Sanchez-Avila C. & Sanchez-Reillol R. (2001). The Rijndael block Cipher (AES proposal): A comparison with des. In Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No. 01CH37186) (pp. 229\u2013234). IEEE.","DOI":"10.1109\/.2001.962837"},{"key":"e_1_3_2_29_1","doi-asserted-by":"crossref","unstructured":"Seal A. Chakraborty S. & Mali K. (2017). A new and resilient image encryption technique based on pixel manipulation value transformation and visual transformation utilizing single-level haar wavelet transform. In Proceedings of the First International Conference on Intelligent Computing and Communication (pp. 603\u2013611). Springer.","DOI":"10.1007\/978-981-10-2035-3_61"},{"issue":"6","key":"e_1_3_2_30_1","article-title":"Using letters frequency analysis in Caesar Cipher with double columnar transposition technique","volume":"2","author":"Shrivastava G.","year":"2013","unstructured":"Shrivastava, G., Sharma, R., & Chouhan, M. (2013). Using letters frequency analysis in Caesar Cipher with double columnar transposition technique. International Journal of Engineering Sciences & Research Technology, 2(6): June, 2013.","journal-title":"International Journal of Engineering Sciences & Research Technology"},{"key":"e_1_3_2_31_1","doi-asserted-by":"crossref","unstructured":"Siahaan A. P. U. (2017). Rail-fence-cryptography-in-securing-information.","DOI":"10.31227\/osf.io\/h5jnz"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcis"},{"key":"e_1_3_2_33_1","doi-asserted-by":"crossref","unstructured":"Srivastava M. Srivastava U. & Srivastava S. (2023). Modified Caesar Cipher with image steganography. In 2023 6th International Conference on Information Systems and Computer Networks (ISCON) (pp. 1\u20136).","DOI":"10.1109\/ISCON57294.2023.10111954"},{"key":"e_1_3_2_34_1","first-page":"1","article-title":"Federal information processing standards publication 46","volume":"46","author":"Standard D. E.","year":"1977","unstructured":"Standard, D. E. (1977). Federal information processing standards publication 46. National Bureau of Standards, US Department of Commerce, FIPS Publication 46-3, 23, 1\u201318.","journal-title":"National Bureau of Standards, US Department of Commerce"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611190500380082"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1888-7"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2016.1272725"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2019.103241"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.07.070"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2015.1087350"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2023.2285549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T20:03:18Z","timestamp":1727208198000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2023.2285549"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4,2]]}},"alternative-id":["10.1080\/24751839.2023.2285549"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2023.2285549","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-04-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}