{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:05:07Z","timestamp":1772301907880,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10726253","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["A Proposal to Design a LSB Based Steganographic Process through Randomization"],"prefix":"10.1109","author":[{"given":"Ayushi","family":"Chaudhary","sequence":"first","affiliation":[{"name":"GLA University,Bharthia,Uttar Pradesh,India"}]},{"given":"Ashish","family":"Sharma","sequence":"additional","affiliation":[{"name":"GLA University,Bharthia,Uttar Pradesh,India"}]}],"member":"263","reference":[{"key":"ref2","first-page":"198","article-title":"A Survey on Efficiency of an Image Encryption Techniques","volume":"5","author":"Heyshanthinipandiya Kumari","year":"2019","journal-title":"International Journal of Scientific Research in Multidisciplinary Studies"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/iccci.2014.6921751"},{"key":"ref4","first-page":"1","article-title":"Improvement of LSB Based Image Steganography","volume":"5","author":"\u00c7atalta\u015f","year":"2017"},{"issue":"3","key":"ref5","article-title":"Evaluation of LSB Based Image Steganography Technique for various File Formats","volume":"3","author":"K Thangadurai","year":"2013","journal-title":"International Journal of Computational Intelligence and Informatics"},{"key":"ref6","first-page":"68","article-title":"New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check","volume":"43","author":"CEM KASAPBAS","year":"2018","journal-title":"Indian Academy of Sciences"},{"issue":"12","key":"ref7","first-page":"2277","article-title":"Image Steganography Using LSB","volume":"8","author":"Amarendra","year":"2019","journal-title":"INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH"},{"key":"ref8","article-title":"Steganography in Images Using LSB Technique","author":"Singh","journal-title":"International Journal of Latest Trends in Engineering and Technology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/21822-5073"},{"issue":"8","key":"ref10","first-page":"5841","article-title":"Comprehensive Survey on Image Stegnography Using LSB with AES","volume":"13","author":"Agrahari","year":"2018","journal-title":"International Journal of Applied Engineering Research"},{"issue":"12","key":"ref11","first-page":"2395","article-title":"IMAGE STEGANOGRAPHY USING LSB BIT-PLANE SUBSTITUTION","volume":"03","author":"TANMAY SINHA","year":"2016","journal-title":"International Research Journal of Engineering and Technology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2946185"},{"issue":"11","key":"ref14","article-title":"A Survey on Encryption Techniques-survey Paper","volume-title":"Computer Science & Engineering","volume":"6","author":"Sahu"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2814624"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2015.07.002"},{"key":"ref18","volume-title":"New Encryption System Protects Data from Quantum Computers, by Sophie Bushwick on October 8","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography5010004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2021.01.013"},{"issue":"5","key":"ref21","first-page":"1049","article-title":"An Empirical Study of Security Issues In Encryption Techniques","volume":"14","author":"Gahan","year":"2019","journal-title":"International Journal of Applied Engineering Research"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.b1069.0782s319"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2019.8757514"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kamand, India","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10726253.pdf?arnumber=10726253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T09:37:58Z","timestamp":1732700278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10726253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10726253","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}