{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:39Z","timestamp":1750306179025,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2980258.2980264","type":"proceedings-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T12:22:17Z","timestamp":1478089337000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Enhancement using a modified AES algorithm"],"prefix":"10.1145","author":[{"given":"R.","family":"Bala","sequence":"first","affiliation":[{"name":"Bharathiar University, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N. P.","family":"Gopalan","sequence":"additional","affiliation":[{"name":"NIT, Trichy, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture","author":"Lu W.","year":"2015","unstructured":"Feng, W. Lu , and W. Sun . \" Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture \", IEEE transactions on Information Forensics and Security , 2015 . Feng, W. Lu, and W. Sun. \"Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture\", IEEE transactions on Information Forensics and Security, 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2014.6850714"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2246179"},{"key":"e_1_3_2_1_4_1","volume-title":"Graph. Appl","author":"Otori H.","year":"2009","unstructured":"H. Otori and S. Kuriyama . \" Texture synthesis for mobile data communications,\" IEEE Comput . Graph. Appl , 2009 . H. Otori and S. Kuriyama. \"Texture synthesis for mobile data communications,\" IEEE Comput. Graph. Appl, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1360612.1360650"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2669594.2669596"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1888-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIE.2010.5559902"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"P. Deshmukh V. Kolhe. \"Modified AES based algorithm for MPEG video encryption Information\" IEEE International Conference on Communication and Embedded Systems (ICICES) 2014.  P. Deshmukh V. Kolhe. \"Modified AES based algorithm for MPEG video encryption Information\" IEEE International Conference on Communication and Embedded Systems (ICICES) 2014.","DOI":"10.1109\/ICICES.2014.7033928"},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE Transactions on Image Processing","author":"Wang Chung-Ming","year":"2015","unstructured":"Wu, Kuo-Chen, and Chung-Ming Wang . \" Steganography Using Reversible Texture Synthesis\" , IEEE Transactions on Image Processing , 2015 . Wu, Kuo-Chen, and Chung-Ming Wang. \"Steganography Using Reversible Texture Synthesis\", IEEE Transactions on Image Processing, 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2013.877541"},{"key":"e_1_3_2_1_13_1","unstructured":"www.sersc.org  www.sersc.org"},{"key":"e_1_3_2_1_14_1","unstructured":"www.ijarcst.com  www.ijarcst.com"},{"key":"e_1_3_2_1_15_1","volume-title":"International Conference on advances in communication and computing Technologues(ICACACT 2014)","author":"Khan S.","year":"2014","unstructured":"Garja,Nikhil,Shamsuddin. S. Khan ,and Pradnya Rane . \" Private cloud Security : Secured user aouthentication by using enhanced hybrid algorithm \", International Conference on advances in communication and computing Technologues(ICACACT 2014) , 2014 . Garja,Nikhil,Shamsuddin.S.Khan,and Pradnya Rane. \"Private cloud Security: Secured user aouthentication by using enhanced hybrid algorithm\", International Conference on advances in communication and computing Technologues(ICACACT 2014), 2014."},{"key":"e_1_3_2_1_16_1","unstructured":"research.ijcaonline.org  research.ijcaonline.org"},{"key":"e_1_3_2_1_17_1","unstructured":"data.conferenceworld.in  data.conferenceworld.in"}],"event":{"name":"ICIA-16: International Conference on Informatics and Analytics","acronym":"ICIA-16","location":"Pondicherry India"},"container-title":["Proceedings of the International Conference on Informatics and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2980258.2980264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:57Z","timestamp":1750218597000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":17,"alternative-id":["10.1145\/2980258.2980264","10.1145\/2980258"],"URL":"https:\/\/doi.org\/10.1145\/2980258.2980264","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}