{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:34:03Z","timestamp":1766158443594,"version":"3.41.2"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/indin41052.2019.8972175","type":"proceedings-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:16:43Z","timestamp":1580429803000},"page":"1358-1363","source":"Crossref","is-referenced-by-count":11,"title":["Pixel Value Difference Based Image Steganography with One Time Pad Encryption"],"prefix":"10.1109","author":[{"given":"Giridhar","family":"Maji","sequence":"first","affiliation":[{"name":"Asansol Polytechnic,Department of Electrical Engineering,Asansol,India"}]},{"given":"Sharmistha","family":"Mandal","sequence":"additional","affiliation":[{"name":"Kanyapur Polytechnic,Department of Computer Science and Technology,Asansol,India"}]},{"given":"Narayan C.","family":"Debnath","sequence":"additional","affiliation":[{"name":"Eastern International University,School of Computing and Information Technology,Vietnam"}]},{"given":"Soumya","family":"Sen","sequence":"additional","affiliation":[{"name":"University of Calcutta,A. K. Choudhury School of Information Technology,Kolkata,India"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SIGTELCOM.2018.8325806"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926097"},{"key":"ref12","first-page":"452","article-title":"Improved lsb based steganography techniques for color images in spatial domain","volume":"16","author":"juneja","year":"2014","journal-title":"IJ Network Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"ref14","first-page":"22 051","article-title":"Digital image steganography combining lsb substitution with five way pvd in 2&#x00D7; 3 pixel blocks","volume":"8","author":"pradhan","year":"2016","journal-title":"International Journal of Pharmacy and Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.174"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20059022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2010.08.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5815\/ijigsp.2015.04.08"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v2.i3.pp712-719"},{"key":"ref4","first-page":"1","article-title":"Fast and efficient image watermarking algorithm using discrete tchebichef transform","author":"sutojo","year":"2017","journal-title":"Cyber and IT Service Management (CITSM) 2017 5th International Conference on IEEE"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICITACEE.2017.8257703"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ECS.2015.7125033"},{"key":"ref5","first-page":"2828","article-title":"Secure and robust image steganography using a reference image as key","volume":"8","author":"maji","year":"2019","journal-title":"International Journal of Innovative Technology and Exploring Engineering (IJITEE)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCIoT.2015.7380614"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2013.85"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.33633\/jais.v2i1.1330","article-title":"Secure image steganography algorithm based on dct with otp encryption","volume":"2","author":"rachmawanto","year":"2017","journal-title":"Applied Intelligent Systems"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"2431","DOI":"10.1109\/TIP.2006.875238","article-title":"A novel high-capacity data-embedding system","volume":"15","author":"lan","year":"2006","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CAST.2016.7914975"},{"key":"ref20","article-title":"Dna vernam cipher","author":"cornea","year":"2011","journal-title":"Dream International Conference on E-Health and Bioengineering"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2003.10.014"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIRA.2013.40"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2937-2"}],"event":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2019,7,22]]},"location":"Helsinki, Finland","end":{"date-parts":[[2019,7,25]]}},"container-title":["2019 IEEE 17th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8961950\/8972012\/08972175.pdf?arnumber=8972175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:45:04Z","timestamp":1753901104000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8972175\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/indin41052.2019.8972175","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}