{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:38Z","timestamp":1725808418005},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_7","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"57-64","source":"Crossref","is-referenced-by-count":2,"title":["Steganography with Cryptography in Android"],"prefix":"10.1007","author":[{"given":"Akshay","family":"Kandul","sequence":"first","affiliation":[]},{"given":"Ashwin","family":"More","sequence":"additional","affiliation":[]},{"given":"Omkar","family":"Davalbhakta","sequence":"additional","affiliation":[]},{"given":"Rushikesh","family":"Artamwar","sequence":"additional","affiliation":[]},{"given":"Dinesh","family":"Kulkarni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Agrawal, B., Agrawal, H.: Implementation of AES and RSA Using Chaos System. International Journal of Scientific & Engineering Research\u00a04(5) (May 2013) 1413ISSN 2229-5518 IJSER \u00a9 (2013)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Rayarikar, R., Upadhyay, S., Pimpale, P.: SMS Encryption Using AES Algorithm on Android. International Journal of Computer Applications (0975-8887)\u00a050(19) (July 2012) (\u00a9 2012 by IJCA Journal)","DOI":"10.5120\/7909-1038"},{"key":"7_CR3","unstructured":"Kota, C.M., Aissi, C.: Implementation of the RSA algorithm and its cryptanalysis. In: ASEE Gulf-Southwest Annual Conference, Session- IVB4, The University of Louisiana at Lafayette, March 20-22. American Society for Engineering Education (March 2002)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Shirli-Shahreza, M., Shirali-Shahreza, M.H.: Text Steganography in SMS. In: International Conference on Convergence Information Technology. IEEE (November 2007), doi:10.1109\/ICCIT.2007.100, ISBN: 0-7695-3038-9, INSPEC Accession Number: 9893347","DOI":"10.1109\/ICCIT.2007.100"},{"key":"7_CR5","unstructured":"Rafat, K.F.: Enhanced Text steganography, Computer, Control and Communication. In: 2nd International Conference on IC4 2009, pp. 1\u20136. IEEE (February 2009), doi:10.1109\/IC4.2009.4909228, E-ISBN: 978-1-4244-3314-8, Print ISBN: 978-1-4244-3313-1, INSPEC Accession Number: 10626971"},{"key":"7_CR6","unstructured":"Tyagi, V., Kumar, A., Patel, R., Tyagi, S., Gangwar, S.S.: Image steganography with cryptography using LSB. Journal of Global Research in Computer Science\u00a03(3) (March 2012) ISSN-2229-371X"},{"key":"7_CR7","unstructured":"Gupta, S., Gujraland, G., Aggarwal, N.: Enhanced LSB for image steganography. IJCEM International Journal of Computational Engineering & Management\u00a015(4) (July 2012) ISSN (Online): 2230-7893"},{"issue":"2","key":"7_CR8","first-page":"150","volume":"2","author":"P.H. Rughani","year":"2012","unstructured":"Rughani, P.H., Pandya, H.N.: Steganography on ANDROID based smart phones. IJMAN International Journal of Mobile & Adhoc Network\u00a02(2), 150\u2013152 (2012)","journal-title":"IJMAN International Journal of Mobile & Adhoc Network"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T23:53:27Z","timestamp":1676418807000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}