{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:16:43Z","timestamp":1730323003197,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,26]]},"DOI":"10.1145\/3440749.3442644","type":"proceedings-article","created":{"date-parts":[[2021,5,13]],"date-time":"2021-05-13T21:44:37Z","timestamp":1620942277000},"page":"1-5","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Robust Double Layer Steganography Technique Based on DNA Sequences"],"prefix":"10.1145","author":[{"given":"Omnia Abdullah","family":"Alharbi","sequence":"first","affiliation":[{"name":"University of Jeddah"}]},{"given":"Asia Othman","family":"Aljhadli","sequence":"additional","affiliation":[{"name":"University of Jeddah"}]},{"given":"Azizah Abdul","family":"Manaf","sequence":"additional","affiliation":[{"name":"University of Jeddah"}]}],"member":"320","published-online":{"date-parts":[[2021,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Security analysis of AES and enhancing its security by modifying S-box with an additional byte","volume":"9","author":"Al-Mamun Abdullah","year":"2017","journal-title":"International Journal of Computer Networks & Communications (IJCNC)"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2012.25"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.103"},{"key":"e_1_3_2_1_4_1","unstructured":"Mansoor Ebrahim Shujaat Khan and Umer\u00a0Bin Khalid. 2014. Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398(2014). Mansoor Ebrahim Shujaat Khan and Umer\u00a0Bin Khalid. 2014. Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398(2014)."},{"volume-title":"Digital steganography and watermarking for digital images: a review of current research directions","year":"2020","author":"Evsutin O","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","first-page":"139","article-title":"A new data hiding scheme based on DNA sequence","volume":"8","author":"Guo Cheng","year":"2012","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2016.7822003"},{"key":"e_1_3_2_1_8_1","first-page":"2094","article-title":"An overview on hiding information technique in images","volume":"10","author":"Hmood K","year":"2010","journal-title":"JApSc"},{"key":"e_1_3_2_1_9_1","unstructured":"Mehdi Hussain and Mureed Hussain. 2013. A survey of image steganography techniques. (2013). Mehdi Hussain and Mureed Hussain. 2013. A survey of image steganography techniques. (2013)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IndiaCom.2014.6828087"},{"key":"e_1_3_2_1_11_1","article-title":"A comparative study of symmetric cryptography mechanism on DES, AES and EB64 for information security","volume":"8","author":"Logunleko KB","year":"2020","journal-title":"Int. J. Sci. Res. in Computer Science and Engineering"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.151"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-016-1172-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Samiha Abdelrahman\u00a0Mohammed Marwan Ahmed Shawish and Khaled Nagaty. 2017. Utilizing DNA Strands for Secured Data-Hiding with High Capacity. International Journal of Interactive Mobile Technologies (iJIM) 11 2(2017) 88\u201398. Samiha Abdelrahman\u00a0Mohammed Marwan Ahmed Shawish and Khaled Nagaty. 2017. Utilizing DNA Strands for Secured Data-Hiding with High Capacity. International Journal of Interactive Mobile Technologies (iJIM) 11 2(2017) 88\u201398.","DOI":"10.3991\/ijim.v11i2.6565"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8i22\/68626"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.030"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/518\/5\/052003"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2015.10.005"},{"volume-title":"Computational Vision and Bio Inspired Computing","author":"Vinodhini RE","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2017.8014670"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2825930"}],"event":{"name":"ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems","acronym":"ICFNDS '20","location":"St.Petersburg Russian Federation"},"container-title":["The 4th International Conference on Future Networks and Distributed Systems (ICFNDS)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3440749.3442644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T14:43:56Z","timestamp":1673534636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3440749.3442644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,26]]},"references-count":21,"alternative-id":["10.1145\/3440749.3442644","10.1145\/3440749"],"URL":"https:\/\/doi.org\/10.1145\/3440749.3442644","relation":{},"subject":[],"published":{"date-parts":[[2020,11,26]]},"assertion":[{"value":"2021-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}