{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:36:55Z","timestamp":1771025815800,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,11]]},"DOI":"10.1109\/isdfs58141.2023.10131890","type":"proceedings-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:30:36Z","timestamp":1685107836000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Exploring Advanced Encryption and Steganography Techniques for Image Security"],"prefix":"10.1109","author":[{"given":"Mohak","family":"Kataria","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Center for CyberSecurity Systems and Networks,Amritapuri,India"}]},{"given":"Kurunandan","family":"Jain","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Center for CyberSecurity Systems and Networks,Amritapuri,India"}]},{"given":"Narayanan","family":"Subramanian","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Center for CyberSecurity Systems and Networks,Amritapuri,India"}]}],"member":"263","reference":[{"key":"ref13","article-title":"The Poly1305-AES message-authentication code","author":"bernstein","year":"2008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT52121.2021.9616624"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/261459a0"},{"key":"ref14","article-title":"Arnold&#x2019;s Cat Map","volume":"45","author":"peterson","year":"1997","journal-title":"Math 45 - Linear Algebra"},{"key":"ref11","first-page":"3035","article-title":"Deep learning-based image steganography using generative adversarial network","volume":"34","author":"yang","year":"2022","journal-title":"Neural Computing and Applications"},{"key":"ref10","first-page":"2050122","article-title":"Chaos-based image steganography using hyper-chaotic systems","volume":"30","author":"wang","year":"2020","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"ref2","first-page":"16","article-title":"A Study of Image Steganography Techniques","volume":"146","author":"patil","year":"2016","journal-title":"International Journal of Computer Applications"},{"key":"ref1","article-title":"Steganography","author":"kshetri","year":"2018","journal-title":"Encyclopedia of Information Science and Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8592-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.10.034"},{"key":"ref19","first-page":"1","article-title":"A new data hiding method based on chaos embedded genetic algorithm for color image","author":"chandra","year":"2021","journal-title":"Artificial Intelligence Review"},{"key":"ref18","first-page":"1","article-title":"Applications of Chaotic Systems in Steganography Algorithms","volume":"8","author":"bhattacharjee","year":"2018","journal-title":"European Journal of Technique (EJT)"},{"key":"ref24","author":"biham","year":"2020","journal-title":"Differential Cryptanalysis of DES-like Cryptosystems"},{"key":"ref23","author":"daemen","year":"2019","journal-title":"The Design of Rijndael AES - The Advanced Encryption Standard"},{"key":"ref26","author":"zhang","year":"2021","journal-title":"A Novel Spread Spectrum Steganography Algorithm Based on Discrete Cosine Transform"},{"key":"ref25","author":"thakur","year":"2021","journal-title":"Security Analysis of Image Steganography using LSB Technique"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"85","DOI":"10.23884\/ejt.2017.7.2.02","article-title":"Block based data hiding method for images","volume":"7","author":"akcayol","year":"2017","journal-title":"European Journal of Technique (EJT)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT42901.2018.9012154"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT52121.2021.9616899"},{"key":"ref8","first-page":"1225","article-title":"A lossless data compression and steganography method based on cascaded prediction in pixel domain","volume":"28","author":"zhang","year":"2018","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"ref7","first-page":"478","article-title":"An Improved Spread Spectrum Image Steganography Based on Pixel-Value Differencing and LSB Replacement Methods","volume":"6","author":"wang","year":"2015","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"ref9","first-page":"30021","article-title":"A DNA-based steganography method for hiding data in images","volume":"7","author":"li","year":"2019","journal-title":"IEEE Access"},{"key":"ref4","article-title":"Data Encryption Standard (DES)","volume":"46","year":"1977","journal-title":"Federal Information Processing Standards Publication"},{"key":"ref3","year":"2001","journal-title":"FIPS PUB 197 Advanced Encryption Standard (AES)"},{"key":"ref6","first-page":"73","article-title":"A Comparative Study on Steganography Techniques in Image File Formats","volume":"14","author":"sarkar","year":"2016","journal-title":"International Journal of Information and Computer Security"},{"key":"ref5","article-title":"ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)","year":"2018","journal-title":"RFC 8439"}],"event":{"name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","location":"Chattanooga, TN, USA","start":{"date-parts":[[2023,5,11]]},"end":{"date-parts":[[2023,5,12]]}},"container-title":["2023 11th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10131120\/10131673\/10131890.pdf?arnumber=10131890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T13:56:16Z","timestamp":1686578176000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10131890\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isdfs58141.2023.10131890","relation":{},"subject":[],"published":{"date-parts":[[2023,5,11]]}}}