{"id":"https://openalex.org/W4386250125","doi":"https://doi.org/10.1109/icit58056.2023.10225957","title":"Blockchain Based Identity Management System Using Cryptography and Steganography","display_name":"Blockchain Based Identity Management System Using Cryptography and Steganography","publication_year":2023,"publication_date":"2023-08-09","ids":{"openalex":"https://openalex.org/W4386250125","doi":"https://doi.org/10.1109/icit58056.2023.10225957"},"language":"en","primary_location":{"id":"doi:10.1109/icit58056.2023.10225957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit58056.2023.10225957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Information Technology (ICIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050887721","display_name":"Praditi Rede","orcid":null},"institutions":[{"id":"https://openalex.org/I218573567","display_name":"Universidad Nacional Experimental Sim\u00f3n Rodr\u00edguez","ror":"https://ror.org/03951zg45","country_code":"VE","type":"education","lineage":["https://openalex.org/I218573567"]}],"countries":["VE"],"is_corresponding":true,"raw_author_name":"Praditi Rede","raw_affiliation_strings":["Fr. Conceicao Rodrigues COE,Computer Engineering Department,Mumbai,India","Computer Engineering Department, Fr. Conceicao Rodrigues COE, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Fr. Conceicao Rodrigues COE,Computer Engineering Department,Mumbai,India","institution_ids":["https://openalex.org/I218573567"]},{"raw_affiliation_string":"Computer Engineering Department, Fr. Conceicao Rodrigues COE, Mumbai, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091802407","display_name":"Sahaana Iyer","orcid":null},"institutions":[{"id":"https://openalex.org/I218573567","display_name":"Universidad Nacional Experimental Sim\u00f3n Rodr\u00edguez","ror":"https://ror.org/03951zg45","country_code":"VE","type":"education","lineage":["https://openalex.org/I218573567"]}],"countries":["VE"],"is_corresponding":false,"raw_author_name":"Sahaana Iyer","raw_affiliation_strings":["Fr. Conceicao Rodrigues COE,Computer Engineering Department,Mumbai,India","Computer Engineering Department, Fr. Conceicao Rodrigues COE, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Fr. Conceicao Rodrigues COE,Computer Engineering Department,Mumbai,India","institution_ids":["https://openalex.org/I218573567"]},{"raw_affiliation_string":"Computer Engineering Department, Fr. Conceicao Rodrigues COE, Mumbai, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103120120","display_name":"Sheetal Sharma","orcid":"https://orcid.org/0000-0002-9439-034X"},"institutions":[{"id":"https://openalex.org/I218573567","display_name":"Universidad Nacional Experimental Sim\u00f3n Rodr\u00edguez","ror":"https://ror.org/03951zg45","country_code":"VE","type":"education","lineage":["https://openalex.org/I218573567"]}],"countries":["VE"],"is_corresponding":false,"raw_author_name":"Sheetal Sharma","raw_affiliation_strings":["Fr. Conceicao Rodrigues COE,Computer Engineering Department,Mumbai,India","Computer Engineering Department, Fr. Conceicao Rodrigues COE, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Fr. Conceicao Rodrigues COE,Computer Engineering Department,Mumbai,India","institution_ids":["https://openalex.org/I218573567"]},{"raw_affiliation_string":"Computer Engineering Department, Fr. Conceicao Rodrigues COE, Mumbai, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018912315","display_name":"Sujata Deshmukh","orcid":"https://orcid.org/0000-0001-9893-6947"},"institutions":[{"id":"https://openalex.org/I218573567","display_name":"Universidad Nacional Experimental Sim\u00f3n Rodr\u00edguez","ror":"https://ror.org/03951zg45","country_code":"VE","type":"education","lineage":["https://openalex.org/I218573567"]}],"countries":["VE"],"is_corresponding":false,"raw_author_name":"Sujata Deshmukh","raw_affiliation_strings":["Fr. Conceicao Rodrigues COE,Computer Engineering Department,Mumbai,India","Computer Engineering Department, Fr. Conceicao Rodrigues COE, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Fr. Conceicao Rodrigues COE,Computer Engineering Department,Mumbai,India","institution_ids":["https://openalex.org/I218573567"]},{"raw_affiliation_string":"Computer Engineering Department, Fr. Conceicao Rodrigues COE, Mumbai, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050887721"],"corresponding_institution_ids":["https://openalex.org/I218573567"],"apc_list":null,"apc_paid":null,"fwci":2.2944,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.90469636,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"173","last_page":"177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7841147184371948},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7229999303817749},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.6995936632156372},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5837565660476685},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5813530087471008},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5798349380493164},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5655098557472229},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5519629120826721},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5214835405349731},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4924717843532562},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4807312488555908},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4779803156852722},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.46459031105041504},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4541246294975281},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3738454580307007},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08361974358558655}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7841147184371948},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7229999303817749},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.6995936632156372},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5837565660476685},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5813530087471008},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5798349380493164},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5655098557472229},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5519629120826721},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5214835405349731},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4924717843532562},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4807312488555908},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4779803156852722},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.46459031105041504},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4541246294975281},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3738454580307007},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08361974358558655},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icit58056.2023.10225957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit58056.2023.10225957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Information Technology (ICIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1523678667","https://openalex.org/W2132658462","https://openalex.org/W2152167937","https://openalex.org/W2742047516","https://openalex.org/W2895983177","https://openalex.org/W2898512050","https://openalex.org/W2953063160","https://openalex.org/W3003288901","https://openalex.org/W3033451189","https://openalex.org/W3035518953","https://openalex.org/W3110503366","https://openalex.org/W3139727179","https://openalex.org/W3167290409","https://openalex.org/W4211024096","https://openalex.org/W4312511590","https://openalex.org/W6792070270","https://openalex.org/W6796431637"],"related_works":["https://openalex.org/W2374086689","https://openalex.org/W3176279093","https://openalex.org/W2373945265","https://openalex.org/W2370203001","https://openalex.org/W1912565424","https://openalex.org/W4246410201","https://openalex.org/W1968505275","https://openalex.org/W2921504876","https://openalex.org/W2959939328","https://openalex.org/W2385081216"],"abstract_inverted_index":{"Identity":[0],"documents":[1,79],"(ID)":[2],"are":[3,16,80],"susceptible":[4],"to":[5,37,67],"various":[6],"theft":[7],"and":[8,13,52,83,101,118],"hacking.":[9],"Government":[10],"institutions,":[11],"banks,":[12],"credit":[14],"agencies":[15],"the":[17,21,48,85,91,110],"weakest":[18],"spots":[19],"in":[20],"present":[22],"identity":[23,78],"management":[24],"system.":[25],"The":[26,93],"current":[27],"centralized":[28],"system":[29],"is":[30],"neither":[31],"trustworthy":[32],"nor":[33],"secure.":[34],"One":[35],"needs":[36],"provide":[38],"identification":[39,70],"at":[40],"every":[41],"stage":[42],"using":[43,65,112],"multiple":[44],"IDs":[45],"recognized":[46],"by":[47],"government.":[49],"Privacy":[50],"issues":[51],"data":[53],"breaches":[54],"result":[55],"from":[56],"sharing":[57,109],"different":[58],"IDs.":[59],"We":[60],"have":[61],"proposed":[62,94],"a":[63,97,113],"solution":[64,95],"blockchain":[66],"achieve":[68],"self-sovereign":[69],"through":[71],"decentralized":[72],"networks,":[73],"which":[74],"ensures":[75],"privacy":[76],"where":[77],"secured,":[81],"authenticated,":[82],"only":[84],"participants":[86],"with":[87],"permission":[88],"can":[89,106],"access":[90],"documents.":[92],"includes":[96],"novel":[98],"security":[99,103],"framework":[100],"addresses":[102],"vulnerabilities":[104],"that":[105],"arise":[107],"while":[108],"hash":[111],"blend":[114],"of":[115],"cutting-edge":[116],"techniques-steganography":[117],"cryptography":[119],"methods.":[120]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
