{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:25:43Z","timestamp":1767626743804,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905249","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An Elucidation on Steganography and Cryptography"],"prefix":"10.1145","author":[{"given":"Sunita","family":"Chaudhary","sequence":"first","affiliation":[{"name":"Dept. of CS &amp; IT, Jagannath University, Jaipur"}]},{"given":"Meenu","family":"Dave","sequence":"additional","affiliation":[{"name":"Dept. of CS &amp; IT, Jagannath University, Jaipur"}]},{"given":"Amit","family":"Sanghi","sequence":"additional","affiliation":[{"name":"Dept. of CSE, MEC, Bikaner"}]},{"given":"Jaideep","family":"Manocha","sequence":"additional","affiliation":[{"name":"Dept. of CSE, MEC, Bikaner"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A survey of identity-based cryptography,\" presented at the Australian Unix Users Group Annual Conference","author":"Joonsang B.","year":"2004","unstructured":"B. Joonsang , N. Jan , S.-N. Reihaneh , and S. Willy , \" A survey of identity-based cryptography,\" presented at the Australian Unix Users Group Annual Conference , 2004 . B. Joonsang, N. Jan, S.-N. Reihaneh, and S. Willy, \"A survey of identity-based cryptography,\" presented at the Australian Unix Users Group Annual Conference, 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.1093\/actrade\/9780192803153.001.0001","volume-title":"Cryptography: A Very Short Introduction: Oxford University Press Publishing","author":"Piper F.","year":"2002","unstructured":"F. Piper and S. Murphy , Cryptography: A Very Short Introduction: Oxford University Press Publishing 2002 . F. Piper and S. Murphy, Cryptography: A Very Short Introduction: Oxford University Press Publishing 2002."},{"key":"e_1_3_2_1_3_1","volume-title":"Introduction to modern cryptography: principles and protocols: Chapman & Hall\/CRC","author":"Jonathan K.","year":"2007","unstructured":"K. Jonathan and L. Yehuda , Introduction to modern cryptography: principles and protocols: Chapman & Hall\/CRC , 2007 . K. Jonathan and L. Yehuda, Introduction to modern cryptography: principles and protocols: Chapman & Hall\/CRC, 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2004.245.269"},{"key":"e_1_3_2_1_5_1","first-page":"1062","volume-title":"Information hiding-a survey,\" IEEE, special issue on protection of multimedia content","author":"Fabien P.","year":"1999","unstructured":"P. Fabien , A. Ross , and K. Markus , \" Information hiding-a survey,\" IEEE, special issue on protection of multimedia content , vol. 87 , pp. 1062 -- 1078 , 1999 . P. Fabien, A. Ross, and K. Markus, \"Information hiding-a survey,\" IEEE, special issue on protection of multimedia content, vol. 87, pp. 1062--1078, 1999."},{"key":"e_1_3_2_1_6_1","first-page":"4","article-title":"Cryptography and Steganography-A Survey","volume":"2","author":"Joseph R.","year":"2011","unstructured":"R. Joseph and S. Viny , \" Cryptography and Steganography-A Survey ,\" International Journal of Computer Technology and Applications , vol. 2 , p. 4 , 2011 . R. Joseph and S. Viny, \"Cryptography and Steganography-A Survey,\" International Journal of Computer Technology and Applications, vol. 2, p. 4, 2011.","journal-title":"International Journal of Computer Technology and Applications"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.369"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS-COMSAR.2006.10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.6"},{"key":"e_1_3_2_1_12_1","first-page":"853","volume-title":"Document marking and identification using both line and word shifting,\" INFOCOM'95 Proceedings of the Fourteenth Annual Joint Conf. of the IEEE Computer and Communication Societies","author":"Low S. H.","year":"1995","unstructured":"S. H. Low , N. F. Maxemchuk , J. T. Brassil , and L. O. Gorman , \" Document marking and identification using both line and word shifting,\" INFOCOM'95 Proceedings of the Fourteenth Annual Joint Conf. of the IEEE Computer and Communication Societies , 1995 , pp. 853 -- 860 . S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O. Gorman, \"Document marking and identification using both line and word shifting,\" INFOCOM'95 Proceedings of the Fourteenth Annual Joint Conf. of the IEEE Computer and Communication Societies, 1995, pp. 853--860."},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Steganography and digital watermarking","author":"Cummins J.","year":"2004","unstructured":"J. Cummins , P. Diskin , S. Lau , and R. Parlett , \" Steganography and digital watermarking ,\" School of Computer Science , 2004 , pp. 1 -- 24 . J. Cummins, P. Diskin, S. Lau, and R. Parlett, \"Steganography and digital watermarking,\" School of Computer Science, 2004, pp. 1--24.","journal-title":"School of Computer Science"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.464718"},{"key":"e_1_3_2_1_15_1","first-page":"298","volume-title":"Conf. on Systemics, Cybernetics and Informatics","author":"Banerjee I.","year":"2011","unstructured":"I. Banerjee , S. Bhattacharyya , and G. Sanyal , \" Novel text steganography through special code generation,\" Int . Conf. on Systemics, Cybernetics and Informatics , 2011 , pp. 298 -- 303 . I. Banerjee, S. Bhattacharyya, and G. Sanyal, \"Novel text steganography through special code generation,\" Int. Conf. on Systemics, Cybernetics and Informatics, 2011, pp. 298--303."},{"key":"e_1_3_2_1_16_1","first-page":"96","article-title":"A novel approach of secure text based steganography model using word mapping method","volume":"4","author":"Bhattacharyya S.","year":"2010","unstructured":"S. Bhattacharyya , I. Banerjee , and G. Sanyal , \" A novel approach of secure text based steganography model using word mapping method ,\" Int. Journal of Computer and Information Engineering , vol. 4 , pp. 96 -- 103 , 2010 . S. Bhattacharyya, I. Banerjee, and G. Sanyal, \"A novel approach of secure text based steganography model using word mapping method,\" Int. Journal of Computer and Information Engineering, vol. 4, pp. 96--103, 2010.","journal-title":"Int. Journal of Computer and Information Engineering"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.890310"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5120\/2537-3462"},{"key":"e_1_3_2_1_19_1","first-page":"13","article-title":"Information hiding in CSS: a secure scheme text steganography using public key cryptosystem","volume":"1","author":"Kabetta H.","year":"2011","unstructured":"H. Kabetta , B. Y. Dwiandiyanta , and Suyoto , \" Information hiding in CSS: a secure scheme text steganography using public key cryptosystem ,\" Int. Journal on Cryptography and Information Security , vol. 1 , pp. 13 -- 22 , 2011 . H. Kabetta, B. Y. Dwiandiyanta, and Suyoto, \"Information hiding in CSS: a secure scheme text steganography using public key cryptosystem,\" Int. Journal on Cryptography and Information Security, vol. 1, pp. 13--22, 2011.","journal-title":"Int. Journal on Cryptography and Information Security"},{"key":"e_1_3_2_1_20_1","unstructured":"sunita chaudhary p. mathur T. Kumar R. Sharma. \"A Capital alphabet shape encoding(CASE) based text steganography\"on Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) published by atlantise press p.p. 120--124.  sunita chaudhary p. mathur T. Kumar R. Sharma. \"A Capital alphabet shape encoding(CASE) based text steganography\"on Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) published by atlantise press p.p. 120--124."},{"key":"e_1_3_2_1_21_1","volume-title":"Published on IPCSIT","author":"Hitesh Singh Mr.","year":"2014","unstructured":"Mr. Hitesh Singh , Mr. Anirudra Diwakar , and Ms. Shailja Upadhyaya , \" A noval approach to text steganography\" , Published on IPCSIT vol. 59 ( 2014 ) IACSIT Press , Singapore . Mr. Hitesh Singh, Mr. Anirudra Diwakar, and Ms. Shailja Upadhyaya, \"A noval approach to text steganography\", Published on IPCSIT vol. 59 (2014) IACSIT Press, Singapore."},{"issue":"4","key":"e_1_3_2_1_22_1","first-page":"871","article-title":"A review of text steganography research and development","volume":"5","author":"Latika Ms.","year":"2015","unstructured":"Ms. Latika , Y. Gulati , \" A review of text steganography research and development ,\" International Journal of Advanced Research in Computer Science and Software Engineering 5 ( 4 ) April - 2015 , pp. 871 -- 874 . Ms. Latika, Y. Gulati, \"A review of text steganography research and development,\"International Journal of Advanced Research in Computer Science and Software Engineering 5(4)April-2015, pp. 871--874.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905249","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905249"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":21,"alternative-id":["10.1145\/2905055.2905249","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905249","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}