{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T14:53:38Z","timestamp":1768402418203,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T00:00:00Z","timestamp":1606953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,3]]},"DOI":"10.1145\/3440054.3440055","type":"proceedings-article","created":{"date-parts":[[2021,2,2]],"date-time":"2021-02-02T00:02:30Z","timestamp":1612224150000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["LSB Substitution Image Steganography Based on Randomized Pixel Selection and One-Time Pad Encryption"],"prefix":"10.1145","author":[{"given":"Manocher","family":"C. Alipour","sequence":"first","affiliation":[{"name":"Technological Institute of the Philippines Quezon City, Philippines"}]},{"given":"Bobby","family":"D. Gerardo","sequence":"additional","affiliation":[{"name":"West Visayas State University, Philippines"}]},{"given":"Ruji","family":"P. Medina","sequence":"additional","affiliation":[{"name":"Technological Institute of the Philippines Quezon City, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2021,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2018.08.011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2671-9"},{"key":"e_1_3_2_1_4_1","first-page":"718","volume-title":"Image Steganography Using LSB Substitution: A Comparative Analysis on Different Color Models BT - Smart Systems and IoT: Innovations in Computing","author":"Nolkha A.","year":"2020","unstructured":"A. Nolkha , S. Kumar , and V. S. Dhaka , \u201c Image Steganography Using LSB Substitution: A Comparative Analysis on Different Color Models BT - Smart Systems and IoT: Innovations in Computing ,\u201d 2020 , pp. 711\u2013 718 . A. Nolkha, S. Kumar, and V. S. Dhaka, \u201cImage Steganography Using LSB Substitution: A Comparative Analysis on Different Color Models BT - Smart Systems and IoT: Innovations in Computing,\u201d 2020, pp. 711\u2013718."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-013-4862-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.04.005"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-019-0216-0"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-018-0848-4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_2_1_10_1","first-page":"1802","volume-title":"IEEE 5th International Conference on Computer and Communications (ICCC)","author":"Deng J.","year":"2019","unstructured":"J. Deng , M. Tang , Y. Wang , and Z. Wang , \u201c LSB Color Image Embedding Steganography Based on Cyclic Chaos,\u201d in2019 IEEE 5th International Conference on Computer and Communications (ICCC) , Dec. 2019 , pp. 1798\u2013 1802 , doi: 10.1109\/ICCC47050.2019.9064335. 10.1109\/ICCC47050.2019.9064335 J. Deng, M. Tang, Y. Wang, and Z. Wang, \u201cLSB Color Image Embedding Steganography Based on Cyclic Chaos,\u201d in2019 IEEE 5th International Conference on Computer and Communications (ICCC), Dec. 2019, pp. 1798\u20131802, doi: 10.1109\/ICCC47050.2019.9064335."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2489-7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCEEE46830.2019.9071188"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04272-0"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905294"},{"key":"e_1_3_2_1_15_1","first-page":"1155","volume-title":"3rd International Congress on Image and Signal Processing","volume":"3","author":"Chen Y.","year":"2010","unstructured":"Y. Chen , Z. Han , S. Li , C. Lu , and X. Yao , \u201c An adaptive steganography algorithm based on block sensitivity vectors using HVS features,\u201d in2010 3rd International Congress on Image and Signal Processing , Oct. 2010 , vol. 3 , pp. 1151\u2013 1155 , doi: 10.1109\/CISP.2010.5646724. 10.1109\/CISP.2010.5646724 Y. Chen, Z. Han, S. Li, C. Lu, and X. Yao, \u201cAn adaptive steganography algorithm based on block sensitivity vectors using HVS features,\u201d in2010 3rd International Congress on Image and Signal Processing, Oct. 2010, vol. 3, pp. 1151\u20131155, doi: 10.1109\/CISP.2010.5646724."},{"key":"e_1_3_2_1_16_1","first-page":"755","volume-title":"International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","author":"Akhtar N.","year":"2014","unstructured":"N. Akhtar , S. Khan , and P. Johri , \u201c An improved inverted LSB image steganography,\u201d in2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) , Feb. 2014 , pp. 749\u2013 755 , doi: 10.1109\/ICICICT.2014.6781374. 10.1109\/ICICICT.2014.6781374 N. Akhtar, S. Khan, and P. Johri, \u201cAn improved inverted LSB image steganography,\u201d in2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Feb. 2014, pp. 749\u2013755, doi: 10.1109\/ICICICT.2014.6781374."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00221-8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2014.885817"},{"key":"e_1_3_2_1_20_1","volume-title":"One-Time Pad Encryption Steganography Systems","author":"Brown M.","year":"2016","unstructured":"M. Brown , M. Pelosi , and G. Kessler , \u201c One-Time Pad Encryption Steganography Systems ,\u201d 2016 . M. Brown, M. Pelosi, and G. Kessler, \u201cOne-Time Pad Encryption Steganography Systems,\u201d 2016."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.074"},{"key":"e_1_3_2_1_22_1","first-page":"536","volume-title":"32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID)","author":"Paul B.","year":"2019","unstructured":"B. Paul , A. Khobragade , S. Javvaji Sai , S. S. P. Goswami , S. Dutt , and G. Trivedi , \u201c Design and Implementation of Low-Power High-throughput PRNGs for Security Applications,\u201d in2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID) , Jan. 2019 , pp. 535\u2013 536 , doi: 10.1109\/VLSID.2019.00123. 10.1109\/VLSID.2019.00123 B. Paul, A. Khobragade, S. Javvaji Sai, S. S. P. Goswami, S. Dutt, and G. Trivedi, \u201cDesign and Implementation of Low-Power High-throughput PRNGs for Security Applications,\u201d in2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID), Jan. 2019, pp. 535\u2013536, doi: 10.1109\/VLSID.2019.00123."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.010"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2019.8986421"}],"event":{"name":"BDSIC 2020: 2020 2nd International Conference on Big-data Service and Intelligent Computation","location":"Xiamen China","acronym":"BDSIC 2020"},"container-title":["Proceedings of the 2020 2nd International Conference on Big-data Service and Intelligent Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3440054.3440055","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3440054.3440055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:17Z","timestamp":1750197737000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3440054.3440055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,3]]},"references-count":24,"alternative-id":["10.1145\/3440054.3440055","10.1145\/3440054"],"URL":"https:\/\/doi.org\/10.1145\/3440054.3440055","relation":{},"subject":[],"published":{"date-parts":[[2020,12,3]]},"assertion":[{"value":"2021-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}