{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:33:52Z","timestamp":1730234032016,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/icccnt51525.2021.9579830","type":"proceedings-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T19:29:48Z","timestamp":1635967788000},"page":"01-07","source":"Crossref","is-referenced-by-count":0,"title":["Implementation of Encryption Technique for analysis of Image Transmission during COVID-19 Pandemic"],"prefix":"10.1109","author":[{"given":"Nitesh Kumar","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Deepesh Kumar","family":"Gautam","sequence":"additional","affiliation":[]},{"given":"M.R.","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-018-0575-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2014.02.015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7169254"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2016.1206640"},{"key":"ref14","first-page":"7","article-title":"Improving the security of images transmission","volume":"3","author":"anwar","year":"2015","journal-title":"International Journal"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2012.195"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022602019183"},{"key":"ref17","article-title":"Digital image security: Fusion of encryption, steganography and watermarking","volume":"8","author":"razzaq","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2016.7917977"},{"key":"ref19","first-page":"26","article-title":"Security enhancement system based on the integration of cryptography and steganography","volume":"19","author":"zaw","year":"2015","journal-title":"Int Journal of Computer (IJC)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7868160"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1364\/OE.21.027873"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994762"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/913476"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126616501383"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.06.032"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11517-009-0458-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2013.10.002"},{"journal-title":"medical privacy-national standards to protect the privacy of personal health information","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2013.05.005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2017.8074197"},{"key":"ref22","first-page":"1938","article-title":"A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption","volume":"9","author":"muhammad","year":"2015","journal-title":"TIIS"},{"key":"ref21","first-page":"38","article-title":"A new image encryption approach using the integration of a shifting technique and the AES algorithm","volume":"42","author":"bashir","year":"2012","journal-title":"International Journal of Computers and Applications"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2019.103300"},{"key":"ref23","first-page":"1","article-title":"Encryption-based steganography of images by multiobjective whale optimal pixel selection","author":"biradar","year":"2019","journal-title":"International Journal of Computers and Applications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05275-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-018-0386-3"}],"event":{"name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2021,7,6]]},"location":"Kharagpur, India","end":{"date-parts":[[2021,7,8]]}},"container-title":["2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579467\/9579470\/09579830.pdf?arnumber=9579830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:40Z","timestamp":1652201740000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9579830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icccnt51525.2021.9579830","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}