{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T10:27:57Z","timestamp":1750415277719,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319959566"},{"type":"electronic","value":"9783319959573"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95957-3_56","type":"book-chapter","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T07:31:20Z","timestamp":1530775880000},"page":"532-543","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography"],"prefix":"10.1007","author":[{"given":"Tao","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Kai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jinshan","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,6]]},"reference":[{"key":"56_CR1","doi-asserted-by":"crossref","unstructured":"Gu, Y.L., Tang, J.S.: A mobile system for skin cancer detection and monitoring. In: SPIE Mobile Multimedia\/Image Processing, Security, and Applications, Baltimore, Maryland, USA, 5\u20139 May 2014","DOI":"10.1117\/12.2046112"},{"issue":"2","key":"56_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/07421222.1999.11518247","volume":"16","author":"PJ Hu","year":"1999","unstructured":"Hu, P.J., Chau, P.Y.K., Sheng, O.R.L., et al.: Examining the technology acceptance model using physician acceptance of telemedicine technology. J. Manage. Inf. Syst. 16(2), 91\u2013112 (1999)","journal-title":"J. Manage. Inf. Syst."},{"issue":"1","key":"56_CR3","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1089\/tmj.2009.0152","volume":"16","author":"JG Conde","year":"2010","unstructured":"Conde, J.G., De, S., Hall, R.W., et al.: Telehealth innovations in health education and training. Telemed. e-Health 16(1), 103\u2013106 (2010)","journal-title":"Telemed. e-Health"},{"issue":"3","key":"56_CR4","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.amjmed.2013.09.032","volume":"127","author":"RS Weinstein","year":"2014","unstructured":"Weinstein, R.S., Lopez, A.M., Joseph, B.A., et al.: Telemedicine, telehealth, and mobile health applications that work: opportunities and barriers. Am. J. Med. 127(3), 183\u2013187 (2014)","journal-title":"Am. J. Med."},{"key":"56_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JTEHM.2015.2458870","volume":"3","author":"N Larburu","year":"2015","unstructured":"Larburu, N., Bults, R.G.A., Van Sinderen, M.J., et al.: An ontology for telemedicine systems resiliency to technological context variations in pervasive healthcare. IEEE J. Transl. Eng. Health Med. 3, 1\u201310 (2015)","journal-title":"IEEE J. Transl. Eng. Health Med."},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Meingast, M., Roosta, T., Sastry, S.: Security and privacy issues with health care information technology. In: 2006 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2006, pp. 5453\u20135458. IEEE (2006)","DOI":"10.1109\/IEMBS.2006.260060"},{"key":"56_CR7","doi-asserted-by":"crossref","unstructured":"Kamali, S.H., Shakerian, R., Hedayati, M., et al.: A new modified version of advanced encryption standard based algorithm for image encryption. In: 2010 International Conference on Electronics and Information Engineering (ICEIE), vol. 1, pp. V1-141\u2013V1-145. IEEE (2010)","DOI":"10.1109\/ICEIE.2010.5559902"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Yun-Peng, Z., Wei, L., Shui-ping, C., et al.: Digital image encryption algorithm based on chaos and improved DES. In: 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009, pp. 474\u2013479. IEEE (2009)","DOI":"10.1109\/ICSMC.2009.5346839"},{"key":"56_CR9","doi-asserted-by":"crossref","unstructured":"Nag, A., Singh, J.P., Khan, S., et al.: Image encryption using affine transform and XOR operation. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), pp. 309\u2013312. IEEE (2011)","DOI":"10.1109\/ICSCCN.2011.6024565"},{"issue":"5","key":"56_CR10","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh, S.M., Mirzakuchaki, S.: A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Sig. Process. 92(5), 1202\u20131215 (2012)","journal-title":"Sig. Process."},{"key":"56_CR11","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar, R., Abdullah, A.H., Isnin, I.F.: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 56, 83\u201393 (2014)","journal-title":"Opt. Lasers Eng."},{"key":"56_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu, L., Li, Z., Li, J., et al.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17\u201325 (2016)","journal-title":"Opt. Lasers Eng."},{"key":"56_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi, A., El-Latif, A.A.A., Diaconu, A.V., et al.: Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt. Lasers Eng. 88, 37\u201350 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"3","key":"56_CR14","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., et al.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727\u2013752 (2010)","journal-title":"Sig. Process."},{"key":"56_CR15","doi-asserted-by":"crossref","unstructured":"Usha, S., Kumar, G.A.S., Boopathybagan, K.: A secure triple level encryption method using cryptography and steganography. In: 2011 International Conference on Computer Science and Network Technology (ICCSNT), vol. 2, pp. 1017\u20131020. IEEE (2011)","DOI":"10.1109\/ICCSNT.2011.6182134"},{"key":"56_CR16","doi-asserted-by":"crossref","unstructured":"Thangadurai, K., Devi, G.S.: An analysis of LSB based image steganography techniques. In: 2014 International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20134. IEEE (2014)","DOI":"10.1109\/ICCCI.2014.6921751"},{"key":"56_CR17","doi-asserted-by":"crossref","unstructured":"Seethalakshmi, K.S., Usha, B.A., Sangeetha, K.N.: Security enhancement in image steganography using neural networks and visual cryptography. In: International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), pp. 396\u2013403. IEEE (2016)","DOI":"10.1109\/CSITSS.2016.7779393"},{"issue":"6","key":"56_CR18","doi-asserted-by":"publisher","first-page":"7677","DOI":"10.1007\/s11042-016-3429-8","volume":"76","author":"J He","year":"2017","unstructured":"He, J., Lan, W., Tang, S.: A secure image sharing scheme with high quality stego-images based on steganography. Multimed. Tools Appl. 76(6), 7677\u20137698 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"56_CR19","doi-asserted-by":"crossref","unstructured":"Banik, B.G., Bandyopadhyay, S.K.: Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography. In: 2015 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1147\u20131152. IEEE (2015)","DOI":"10.1109\/CICN.2015.223"},{"key":"56_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"A Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2014a steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289\u2013302. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45496-9_21"},{"key":"56_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36415-3_20","volume-title":"Information Hiding","author":"J Fridrich","year":"2003","unstructured":"Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310\u2013323. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36415-3_20"},{"issue":"4","key":"56_CR22","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T Gao","year":"2008","unstructured":"Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394\u2013400 (2008)","journal-title":"Phys. Lett. A"},{"key":"56_CR23","unstructured":"Hu, Z., Tang, J.: Cluster driven anisotropic diffusion for speckle reduction in ultrasound images. In: Proceeding of IEEE International Conference on Image Processing, Phoenix, AZ, USA"},{"key":"56_CR24","unstructured":"Hu, Z., Tang, J., Lei, L.: Comparison of several speckle reduction techniques for 3D Ultrasound Images. In: Proceeding of IEEE International Conference on System, Man, Cybernetics, Hungary (2016)"},{"key":"56_CR25","doi-asserted-by":"crossref","unstructured":"Hu, Z., Tang, J.: 3D cluster-driven trilateral filter for speckle reduction in ultrasound images. In: SPIE Mobile Multimedia\/Image Processing, Security, and Applications, Baltimore, Maryland, USA, 20 April 2015","DOI":"10.1117\/12.2176691"},{"key":"56_CR26","doi-asserted-by":"crossref","unstructured":"Guo, S., Tang, J.: Content based image retrieval from chest radiography databases. In: Proceedings of the 43rd IEEE Annual Asilomar Conference on Signals, Systems, and Computers, Asilomar, Pacific Grove, California, USA (2009)","DOI":"10.1109\/ACSSC.2009.5470194"},{"key":"56_CR27","doi-asserted-by":"crossref","unstructured":"Guo S., Tang, J., Cuadra, E., Mason, M., Sun, Q.: Normalized wavelet diffusion for speckle reduction on 3D ultrasound images. In: Zhang, F. (ed.) Proceedings of SPIE, Medical Imaging, Parallel Processing of Images, and Optimization Techniques, MIPPR 2009. vol. 7497, p. 74971R. SPIE, Bellingham (2009)","DOI":"10.1117\/12.831571"},{"key":"56_CR28","doi-asserted-by":"crossref","unstructured":"Liu, X., Tang, J., Zhang, X.: A multiscale image enhancement method for calcification detection in screening mammograms. In: Proceedings of IEEE International Conference on Image Processing, Cairo, Egypt, pp. 677\u2013680, 7\u201310 November 2009","DOI":"10.1109\/ICIP.2009.5414077"},{"key":"56_CR29","doi-asserted-by":"crossref","unstructured":"Liu, X., Tang, J.: A multiscale contrast enhancement algorithm for breast cancer detection using laplacian pyramid. In: Proceedings of IEEE International Conference on Information and Automation (2009)","DOI":"10.1109\/ICINFA.2009.5205093"},{"key":"56_CR30","doi-asserted-by":"crossref","unstructured":"Tang, J., Liu, X., Xiong, S., Liu, J.: A contrast enhancement algorithm in the DCT domain with reduced artifacts for cancer detection. In: Zhang, F. (ed.) Proceedings of SPIE, Medical Imaging, Parallel Processing of Images, and Optimization Techniques, MIPPR 2009, vol. 7497, p. 749728. SPIE, Bellingham (2009)","DOI":"10.1117\/12.833704"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95957-3_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:25:35Z","timestamp":1710325535000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95957-3_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319959566","9783319959573"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95957-3_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"6 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2018\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"LOD","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"632","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"275","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.46","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}