{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:15Z","timestamp":1750306275879,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905272","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Audio Steganography using ZDT"],"prefix":"10.1145","author":[{"given":"Shivani","family":"Sharma","sequence":"first","affiliation":[{"name":"Computer Science &amp; Engineering and ABES Engineering College, Ghaziabad, Uttar Pradesh, India"}]},{"given":"Virendra Kumar","family":"Yadav","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering and ABES Engineering College, Ghaziabad, Uttar Pradesh, India"}]},{"given":"Munesh Chandra","family":"Trivedi","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering and ABES Engineering College, Ghaziabad, Uttar Pradesh, India"}]},{"given":"Avadesh","family":"Gupta","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering and IMS College, Ghaziabad, Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"201","volume-title":"Camenisch et al., \"Steganography for Radio Amateurs--- A DSSS Based Approach for Slow Scan Television","author":"Westfeld","unstructured":"Westfeld A, J. Camenisch et al., \"Steganography for Radio Amateurs--- A DSSS Based Approach for Slow Scan Television \", Springer-Verlag Berlin Heidelberg , pp. 201 -- 215 . Westfeld A, J. Camenisch et al., \"Steganography for Radio Amateurs--- A DSSS Based Approach for Slow Scan Television\", Springer-Verlag Berlin Heidelberg, pp. 201--215."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1147\/sj.353.0313"},{"key":"e_1_3_2_1_3_1","volume-title":"Cryptography and network security: Principles and Practices","author":"Stalling William","year":"2006","unstructured":"William Stalling , Cryptography and network security: Principles and Practices ( 4 th edition), Prentice 2006 , ISBN - - 978-81-775-8774-6. William Stalling, Cryptography and network security: Principles and Practices (4th edition), Prentice 2006, ISBN -- 978-81-775-8774-6.","edition":"4"},{"unstructured":"Shivani Yadav. V. K. Batham.S \"An Approach to Image Steganography using Strength of Indexed Based Chaotic Sequence\" SSCC-2014 (Springer).  Shivani Yadav. V. K. Batham.S \"An Approach to Image Steganography using Strength of Indexed Based Chaotic Sequence\" SSCC-2014 (Springer).","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2677855.2677905"},{"key":"e_1_3_2_1_6_1","volume-title":"Elsevier ICRTC","author":"Bulk Data A Novel Approach","year":"2015","unstructured":"Shivani, Yadav.V, Batham.S, \" A Novel Approach of Bulk Data Hiding using Text Steganography\",accepted in Elsevier ICRTC 2015 , in press. Shivani, Yadav.V, Batham.S, \"A Novel Approach of Bulk Data Hiding using Text Steganography\",accepted in Elsevier ICRTC 2015, in press."},{"doi-asserted-by":"crossref","unstructured":"Aradhana Soni and Anuja Kumar Acharya \"A Novel Image Encryption Approach Using An Index Based Chaos And DNA Encoding and Its Performance Analysis\" IJCA (0975-8887) Volume 47-No. 23 June 2012.  Aradhana Soni and Anuja Kumar Acharya \"A Novel Image Encryption Approach Using An Index Based Chaos And DNA Encoding and Its Performance Analysis\" IJCA (0975-8887) Volume 47-No. 23 June 2012.","key":"e_1_3_2_1_7_1","DOI":"10.5120\/7493-9944"},{"doi-asserted-by":"crossref","unstructured":"S.Batham A. Acharya V.K. Yadav R.Paul.\"A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence\".CONFLUENCE-2013 IET digital library.  S.Batham A. Acharya V.K. Yadav R.Paul.\"A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence\".CONFLUENCE-2013 IET digital library.","key":"e_1_3_2_1_8_1","DOI":"10.1049\/cp.2013.2307"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference On Commmunication, Computing and Security(ICCCS","author":"Acharya Anuja Kumar","year":"2011","unstructured":"Anuja Kumar Acharya , \" Image Encryption Using A Chaos Base Encryption Algorithm\" , International Conference On Commmunication, Computing and Security(ICCCS 2011 ). Anuja Kumar Acharya, \"Image Encryption Using A Chaos Base Encryption Algorithm\", International Conference On Commmunication, Computing and Security(ICCCS 2011)."},{"key":"e_1_3_2_1_10_1","volume-title":"International journal of advanced research in computer science and software engineering","author":"Wadhwa Ashima","year":"2014","unstructured":"Ashima Wadhwa , \" A survey on audio steganography techniques for digital data security\" , International journal of advanced research in computer science and software engineering , vol. 4 , issue 4, April 2014 . Ashima Wadhwa, \"A survey on audio steganography techniques for digital data security\", International journal of advanced research in computer science and software engineering, vol. 4, issue 4, April 2014."},{"volume-title":"The International journal of multimedia and its applications IJMA","author":"Jayaram","unstructured":"Jayaram P, Ranganatha HR , Anupama HS, \" Information hiding using audio steganography---A survey\" , The International journal of multimedia and its applications IJMA , vol. 3 , No. 3, August 2011. Jayaram P, Ranganatha HR, Anupama HS, \"Information hiding using audio steganography---A survey\", The International journal of multimedia and its applications IJMA, vol. 3, No. 3, August 2011.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","volume-title":"International journal of computer applications","author":"Chadha Ankit","year":"2013","unstructured":"Ankit Chadha , Neha Satam , Rakshak Sood , Dattatray Bade , \" An efficient method for image and audio steganography using least significant bit substitution\" , International journal of computer applications , vol. 77 , September 2013 . Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade, \"An efficient method for image and audio steganography using least significant bit substitution\", International journal of computer applications, vol. 77, September 2013."},{"key":"e_1_3_2_1_13_1","volume-title":"Habib Hamam, \"Comparative study of digital audio steganography techniques\", springer open journal","author":"Djebbar Fatiha","year":"2012","unstructured":"Fatiha Djebbar , Beghdad Ayad , Karim Abed Meraim , Habib Hamam, \"Comparative study of digital audio steganography techniques\", springer open journal , January 2012 . Fatiha Djebbar, Beghdad Ayad, Karim Abed Meraim, Habib Hamam, \"Comparative study of digital audio steganography techniques\", springer open journal, January 2012."},{"key":"e_1_3_2_1_14_1","volume-title":"A survey on recent approaches\", world applied programming","author":"Nosrati Masoud","year":"2012","unstructured":"Masoud Nosrati , Ronak Karimi , Mehdi Harari , \" Audio steganography : A survey on recent approaches\", world applied programming , vol. (2), No. (3), pp. 202-- 205 , March 2012 . Masoud Nosrati, Ronak Karimi, Mehdi Harari, \"Audio steganography: A survey on recent approaches\", world applied programming, vol. (2), No. (3), pp. 202--205, March 2012."}],"event":{"acronym":"ICTCS '16","name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905272"}},"subtitle":["Encryption using Indexed Based Chaotic Sequence"],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":14,"alternative-id":["10.1145\/2905055.2905272","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905272","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}