{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:59:31Z","timestamp":1743004771665,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750992"},{"type":"electronic","value":"9783030751005"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75100-5_41","type":"book-chapter","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T09:08:37Z","timestamp":1619168917000},"page":"472-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancement of Medical Information Security Through Lightweight Cryptography and Steganography in the Platform of Cloud-IoT Ecosystem"],"prefix":"10.1007","author":[{"given":"Humayra Binte","family":"Arfan","sequence":"first","affiliation":[]},{"given":"Zinia Anzum","family":"Tonni","sequence":"additional","affiliation":[]},{"given":"Saria Jahin","family":"Taluckder","sequence":"additional","affiliation":[]},{"given":"Rashed","family":"Mazumder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,24]]},"reference":[{"issue":"11","key":"41_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-1053-z","volume":"42","author":"T Avudaiappan","year":"2018","unstructured":"Avudaiappan, T., Balasubramanian, R., Pandiyan, S.S., Saravanan, M., Lakshmanaprabu, S.K., Shankar, K.: Medical image security using dual encryption with oppositional based optimization algorithm. J. Med. Syst. 42(11), 1\u201311 (2018)","journal-title":"J. Med. Syst."},{"key":"41_CR2","unstructured":"Patel, N.: Internet of things in healthcare: applications, benefits, and challenges. Internet: https:\/\/www.peerbits.com\/blog\/internet-of-things-healthcare-applications-benefits-andchallenges. html. Accessed 21 March 2019"},{"key":"41_CR3","doi-asserted-by":"publisher","first-page":"22313","DOI":"10.1109\/ACCESS.2017.2757844","volume":"5","author":"HA Al Hamid","year":"2017","unstructured":"Al Hamid, H.A., Rahman, S.M.M., Hossain, M.S., Almogren, A., Alamri, A.: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5, 22313\u201322328 (2017)","journal-title":"IEEE Access"},{"issue":"2","key":"41_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/bdcc2020010","volume":"2","author":"HF Atlam","year":"2018","unstructured":"Atlam, H.F., Walters, R.J., Wills, G.B.: Fog computing and the internet of things: a review. Big Data Cogn. Comput. 2(2), 10 (2018)","journal-title":"Big Data Cogn. Comput."},{"key":"41_CR5","doi-asserted-by":"publisher","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","volume":"6","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny, M., Ram\u00edrez-Gonz\u00e1lez, G., Abu-Elnasr, O.M., Shawkat, S.A., Arunkumar, N., Farouk, A.: Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6, 20596\u201320608 (2018)","journal-title":"IEEE Access"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Bhardwaj, I., Kumar, A., Bansal, M.: A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 504\u2013509. IEEE, September 2017","DOI":"10.1109\/ISPCC.2017.8269731"},{"issue":"2","key":"41_CR7","doi-asserted-by":"publisher","first-page":"293","DOI":"10.3390\/sym11020293","volume":"11","author":"S Rajesh","year":"2019","unstructured":"Rajesh, S., Paul, V., Menon, V.G., Khosravi, M.R.: A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2), 293 (2019)","journal-title":"Symmetry"},{"issue":"3","key":"41_CR8","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan, C.K., Ng, J.C., Xu, X., Poh, C.L., Guan, Y.L., Sheah, K.: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J. Digit Imaging 24(3), 528\u2013540 (2011)","journal-title":"J. Digit Imaging"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Usman, M.A., Usman, M.R.: Using image steganography for providing enhanced medical data security. In: 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1\u20134. IEEE, January 2018","DOI":"10.1109\/CCNC.2018.8319263"},{"key":"41_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1016\/j.procs.2015.02.105","volume":"46","author":"D Baby","year":"2015","unstructured":"Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. Procedia Comput. Sci. 46, 612\u2013618 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"Sharma, M.H., MithleshArya, M., Goyal, M.D.: Secure image hiding algorithm using cryptography and steganography. IOSR J. Comput. Eng. (IOSR-JCE) (2013). e-ISSN, 2278-0661","DOI":"10.9790\/0661-1350106"},{"issue":"4","key":"41_CR12","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.irbm.2017.06.007","volume":"38","author":"S Haddad","year":"2017","unstructured":"Haddad, S., Coatrieux, G., Cozic, M., Bouslimi, D.: Joint watermarking and lossless JPEG-LS compression for medical image security. Irbm 38(4), 198\u2013206 (2017)","journal-title":"Irbm"},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Al-Haj, A., Abdel-Nabi, H.: Digital image security based on data hiding and cryptography. In 2017 3rd International Conference on Information Management (ICIM), pp. 437-440. IEEE, April 2017","DOI":"10.1109\/INFOMAN.2017.7950423"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Chinnasamy, P., Deepalakshmi, P.: Design of secure storage for health-care cloud using hybrid cryptography. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 1717\u20131720. IEEE, April 2018","DOI":"10.1109\/ICICCT.2018.8473107"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Ardiansyah, G., Sari, C.A., Rachmawanto, E.H.: Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm. In: 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), pp. 249-254. IEEE, November 2017","DOI":"10.1109\/ICITISEE.2017.8285505"},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Tseng, K.K., Jiang, J.M., Pan, J.S., Tang, L.L., Hsu, C.Y., Chen, C.C.: Enhanced Huffman coding with encryption for wireless data broadcasting system. In: 2012 International Symposium on Computer, Consumer and Control, pp. 622\u2013625. IEEE, June 2012","DOI":"10.1109\/IS3C.2012.162"},{"issue":"1","key":"41_CR17","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s10278-007-9068-x","volume":"22","author":"FJ McEvoy","year":"2009","unstructured":"McEvoy, F.J., Svalastoga, E.: Security of patient and study data associated with DICOM images when transferred using compact disc media. J. Digit Imaging 22(1), 65\u201370 (2009)","journal-title":"J. Digit Imaging"},{"issue":"6","key":"41_CR18","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1148\/rg.256055072","volume":"25","author":"T Hacklander","year":"2005","unstructured":"Hacklander, T., Martin, J., Kleber, K.: An open source framework for modification and communication of DICOM objects. Radiographics 25(6), 1709\u20131721 (2005)","journal-title":"Radiographics"},{"issue":"3","key":"41_CR19","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1167\/iovs.14-15457","volume":"56","author":"H Rabbani","year":"2015","unstructured":"Rabbani, H., Allingham, M.J., Mettu, P.S., Cousins, S.W., Farsiu, S.: Fully automatic segmentation of fluorescein leakage in subjects with diabetic macular edema. Invest. Ophthalmol. Vis. Sci. 56(3), 1482\u20131492 (2015)","journal-title":"Invest. Ophthalmol. Vis. Sci."}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75100-5_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T11:56:18Z","timestamp":1619178978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75100-5_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750992","9783030751005"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75100-5_41","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"24 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}