{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:57Z","timestamp":1750220157989,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T00:00:00Z","timestamp":1659571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,4]]},"DOI":"10.1145\/3549206.3549207","type":"proceedings-article","created":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T19:26:28Z","timestamp":1666639588000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Web Application Based Text Encryption"],"prefix":"10.1145","author":[{"given":"Rashmi","family":"Kushwah","sequence":"first","affiliation":[{"name":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"}]},{"given":"Rishabh","family":"Rajpurohit","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"}]},{"given":"Paul","family":"Jonathan","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"}]},{"given":"Gaurav","family":"Kumar","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2022,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2014.7030724"},{"issue":"7","key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","article-title":"A novel reversible data hiding scheme based on two-dimensional difference-histogram modification","volume":"38","author":"Li Xiaolong","year":"2013","unstructured":"[ 2 ] Xiaolong Li , Weiming Zhang , Xinlu Gui and Bin Yang . 2013 . A novel reversible data hiding scheme based on two-dimensional difference-histogram modification . IEEE Transactions on Information Forensics and Security , 38 , 7 , 1091 - 1100 . [2] Xiaolong Li, Weiming Zhang, Xinlu Gui and Bin Yang. 2013. A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Transactions on Information Forensics and Security, 38, 7, 1091-1100.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"volume-title":"Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group","author":"Xiang Shijun","key":"e_1_3_2_1_3_1","unstructured":"[ 3 ] Shijun Xiang and Xinrong Luo . 2017. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group . IEEE transactions on circuits and systems for video technology, 28, 11, 3099-3110. [3] Shijun Xiang and Xinrong Luo. 2017. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE transactions on circuits and systems for video technology, 28, 11, 3099-3110."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v19.i2.pp766-774"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"International Conference on Innovative and Creative Information Technology","author":"Kusuma E. J.","year":"2017","unstructured":"[ 5 ] E. J. Kusuma , O. R. Indriani , C. A. Sari , E. H. Rachmawanto, \u201dAn imperceptible LSB image hiding on edge region using DES encryption \u201d, In International Conference on Innovative and Creative Information Technology pp. 1 - 6 , 2017 . [5] E. J. Kusuma, O. R. Indriani, C. A. Sari, E. H. Rachmawanto, \u201dAn imperceptible LSB image hiding on edge region using DES encryption\u201d, In International Conference on Innovative and Creative Information Technology pp. 1-6, 2017."},{"key":"e_1_3_2_1_6_1","unstructured":"[\n  6\n  ]  Vikram Pasham and Steve Trimberger. 2001. High-speed DES and triple DES encryptor\/decryptor. Xilinx Application Notes.  [6] Vikram Pasham and Steve Trimberger. 2001. High-speed DES and triple DES encryptor\/decryptor. Xilinx Application Notes."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.402.0253"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311315"},{"issue":"3","key":"e_1_3_2_1_9_1","first-page":"141","article-title":"An enhanced Vigenere cipher for data security","volume":"5","author":"Soofi Aized Amin","year":"2016","unstructured":"[ 9 ] Aized Amin Soofi , Irfan Riaz and Umair Rasheed . 2016 . An enhanced Vigenere cipher for data security . Int. J. Sci. Technol. Res , 5 , 3 , 141 - 145 . [9] Aized Amin Soofi, Irfan Riaz and Umair Rasheed. 2016. An enhanced Vigenere cipher for data security. Int. J. Sci. Technol. Res, 5, 3, 141-145.","journal-title":"Int. J. Sci. Technol. Res"},{"key":"e_1_3_2_1_10_1","unstructured":"[\n  10\n  ]  R. Toemeh and S. Arumugam. 2007. Breaking transposition cipher with genetic algorithm. Elektronika ir Elektrotechnika 79 7 75-78.  [10] R. Toemeh and S. Arumugam. 2007. Breaking transposition cipher with genetic algorithm. Elektronika ir Elektrotechnika 79 7 75-78."}],"event":{"name":"IC3-2022: 2022 Fourteenth International Conference on Contemporary Computing","acronym":"IC3-2022","location":"Noida India"},"container-title":["Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549206.3549207","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3549206.3549207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:22Z","timestamp":1750186822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549206.3549207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,4]]},"references-count":10,"alternative-id":["10.1145\/3549206.3549207","10.1145\/3549206"],"URL":"https:\/\/doi.org\/10.1145\/3549206.3549207","relation":{},"subject":[],"published":{"date-parts":[[2022,8,4]]},"assertion":[{"value":"2022-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}