{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:56:22Z","timestamp":1750308982965,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,7]]},"DOI":"10.1145\/3167020.3167037","type":"proceedings-article","created":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T12:19:35Z","timestamp":1522239575000},"page":"108-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Alteration Agent for Cloud Data Security"],"prefix":"10.1145","author":[{"given":"Sara","family":"Rhazlane","sequence":"first","affiliation":[{"name":"System &amp; Data Engineering Team, ENSAT Abdelmalek Essaadi University, Tangier, Morocco"}]},{"given":"Nouria","family":"Harbi","sequence":"additional","affiliation":[{"name":"ERIC Laboratory, Lyon 2 University, Lyon, France"}]},{"given":"Nadia","family":"Kabachi","sequence":"additional","affiliation":[{"name":"ERIC Laboratory, Lyon 2 University, Lyon, France"}]},{"given":"Hassan","family":"Badir","sequence":"additional","affiliation":[{"name":"System &amp; Data Engineering Team, ENSAT Abdelmalek Essaadi University, Tangier, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Journal of Network Security and Its Applications (IJNSA) 5 (January","author":"Agarwal M.","year":"2013","unstructured":"M. Agarwal . 2013. Text steganographic approaches: A comparison . International Journal of Network Security and Its Applications (IJNSA) 5 (January 2013 ). M. Agarwal. 2013. Text steganographic approaches: A comparison. International Journal of Network Security and Its Applications (IJNSA) 5 (January 2013)."},{"key":"e_1_3_2_1_2_1","unstructured":"Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. 2011. Novel Text Steganography through Special Code Generation. (2011) 298--303.  Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. 2011. Novel Text Steganography through Special Code Generation. (2011) 298--303."},{"key":"e_1_3_2_1_3_1","unstructured":"Yves Demazeau. 1995. From Interactions To Collective Behaviour In Agent-Based Systems. (1995) 117--132.  Yves Demazeau. 1995. From Interactions To Collective Behaviour In Agent-Based Systems. (1995) 117--132."},{"key":"e_1_3_2_1_4_1","unstructured":"Jacques Ferber. 1995. Les systemes multi-agents: vers une intelligence collective. (1995).  Jacques Ferber. 1995. Les systemes multi-agents: vers une intelligence collective. (1995)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1186\/2192-113X-1-11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMT.2009.11"},{"key":"e_1_3_2_1_7_1","unstructured":"Young-Won Kim Kyung-Ae Moon and Il-Seok Oh. 2003. A text watermarking algorithm based on word classification and inter-word space statistics. (2003) 775--779.   Young-Won Kim Kyung-Ae Moon and Il-Seok Oh. 2003. A text watermarking algorithm based on word classification and inter-word space statistics. (2003) 775--779."},{"key":"e_1_3_2_1_8_1","volume-title":"International Journal of Advanced Scientific and Technical Research 2 (March-April","author":"Koluguri Abhishek","year":"2014","unstructured":"Abhishek Koluguri , Sheikh Gous , and Dr. P. Bhaskara Reddy . 2014. Text Steganography Methods and its Tools . International Journal of Advanced Scientific and Technical Research 2 (March-April 2014 ), 888--902. Abhishek Koluguri, Sheikh Gous, and Dr. P. Bhaskara Reddy. 2014. Text Steganography Methods and its Tools. International Journal of Advanced Scientific and Technical Research 2 (March-April 2014), 888--902."},{"key":"e_1_3_2_1_9_1","unstructured":"A. Nadeem and M.Y. Javed. 2005. A Performance Comparison of Data Encryption Algorithms. (2005) 84--89.  A. Nadeem and M.Y. Javed. 2005. A Performance Comparison of Data Encryption Algorithms. (2005) 84--89."},{"key":"e_1_3_2_1_10_1","first-page":"10","article-title":"Text steganographic approaches: A comparison","volume":"2","author":"Pandey Nikita","year":"2012","unstructured":"Nikita Pandey , Sayani Nandy , and Shelly Sinha Choudhury . 2012 . Text steganographic approaches: A comparison . International Journal of Scientific and Research Publications 2 , 10 (October 2012). Nikita Pandey, Sayani Nandy, and Shelly Sinha Choudhury. 2012. Text steganographic approaches: A comparison. International Journal of Scientific and Research Publications 2, 10 (October 2012).","journal-title":"International Journal of Scientific and Research Publications"},{"key":"e_1_3_2_1_11_1","first-page":"9","article-title":"Data Security Issues in Cloud Computing","volume":"1","author":"Rawat Neha","year":"2014","unstructured":"Neha Rawat , Ratnesh Srivastava , Binay Kumar Pandey , Poonam Rawat , Shikha Singh , and Awantika Sharma . 2014 . Data Security Issues in Cloud Computing . Open Journal of Mobile Computing and Cloud Computing 1 (2014), 9 -- 17 . Neha Rawat, Ratnesh Srivastava, Binay Kumar Pandey, Poonam Rawat, Shikha Singh, and Awantika Sharma. 2014. Data Security Issues in Cloud Computing. Open Journal of Mobile Computing and Cloud Computing 1 (2014), 9--17.","journal-title":"Open Journal of Mobile Computing and Cloud Computing"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sara Rhazlane Hassan Badir Nouria Harbi and Nadia Kabachi. 2016. Intelligent multi agent system based solution for data protection in the cloud. (2016) 111--122.  Sara Rhazlane Hassan Badir Nouria Harbi and Nadia Kabachi. 2016. Intelligent multi agent system based solution for data protection in the cloud. (2016) 111--122.","DOI":"10.1109\/AICCSA.2016.7945677"},{"key":"e_1_3_2_1_13_1","volume-title":"Nouria Harbi, Nadia Kabachi, and Hassan Badir.","author":"Rhazlane Sara","year":"2017","unstructured":"Sara Rhazlane , Amina El Ouazzani , Nouria Harbi, Nadia Kabachi, and Hassan Badir. 2017 . Data Alteration : A Better Approach to Securing Cloud Data with Encryption . (2017), 111--122. Sara Rhazlane, Amina El Ouazzani, Nouria Harbi, Nadia Kabachi, and Hassan Badir. 2017. Data Alteration: A Better Approach to Securing Cloud Data with Encryption. (2017), 111--122."},{"key":"e_1_3_2_1_14_1","first-page":"11","article-title":"Different Approaches to Text Steganography","volume":"3","author":"Saraswathi Vidhya","year":"2014","unstructured":"Vidhya Saraswathi and Mrs. Sumathy Kingslin . 2014 . Different Approaches to Text Steganography : A Comparison. International Journal of Emerging Research in Management and Technology 3 , 11 (November 2014). Vidhya Saraswathi and Mrs. Sumathy Kingslin. 2014. Different Approaches to Text Steganography: A Comparison. International Journal of Emerging Research in Management and Technology 3, 11 (November 2014).","journal-title":"A Comparison. International Journal of Emerging Research in Management and Technology"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Mohammad Shirali-Shahreza. 2008. Text Steganography by Changing Words Spelling. (2008).  Mohammad Shirali-Shahreza. 2008. Text Steganography by Changing Words Spelling. (2008).","DOI":"10.1109\/ICACT.2008.4494159"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Comparison of Data Encryption Algorithms","volume":"2","author":"Singh Simar Preet","year":"2011","unstructured":"Simar Preet Singh and Raman Maini . 2011 . Comparison of Data Encryption Algorithms . International Journal of Computer Science and Communication 2 , 1 (January-June 2011). Simar Preet Singh and Raman Maini. 2011. Comparison of Data Encryption Algorithms. International Journal of Computer Science and Communication 2, 1 (January-June 2011).","journal-title":"International Journal of Computer Science and Communication"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/InfRKM.2012.6205035"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Elzbieta Zielinska Wojciech Mazurczyk and Krzysztof Szczypiorski. 2014. Trends in Steganography. (2014) 86--95.  Elzbieta Zielinska Wojciech Mazurczyk and Krzysztof Szczypiorski. 2014. Trends in Steganography. (2014) 86--95.","DOI":"10.1145\/2566590.2566610"}],"event":{"name":"MEDES '17: The 9th International Conference on Management of Digital EcoSystems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Bangkok Thailand","acronym":"MEDES '17"},"container-title":["Proceedings of the 9th International Conference on Management of Digital EcoSystems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167020.3167037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167020.3167037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:06Z","timestamp":1750282866000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167020.3167037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":18,"alternative-id":["10.1145\/3167020.3167037","10.1145\/3167020"],"URL":"https:\/\/doi.org\/10.1145\/3167020.3167037","relation":{},"subject":[],"published":{"date-parts":[[2017,11,7]]},"assertion":[{"value":"2017-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}