{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:36:14Z","timestamp":1761896174183},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T00:00:00Z","timestamp":1451347200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10916-015-0426-9","type":"journal-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T22:05:44Z","timestamp":1451340344000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Effective Electrocardiogram Steganography Based on Coefficient Alignment"],"prefix":"10.1007","volume":"40","author":[{"given":"Ching-Yu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Wen-Fong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"426_CR1","volume-title":"Digital watermarking and steganography","author":"IJ Cox","year":"2008","unstructured":"Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T., Digital watermarking and steganography, 2nd edition. Morgan Kaufmann, MA, 2008.","edition":"2"},{"key":"426_CR2","volume-title":"Data hiding techniques and applications specific designs","author":"A Phadikar","year":"2012","unstructured":"Phadikar, A., Data hiding techniques and applications specific designs. LAP LAMBERT Academic Publishing, Saarbrucken, 2012."},{"key":"426_CR3","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/2566590.2566610","volume":"57","author":"E Eielinska","year":"2014","unstructured":"Eielinska, E., Mazurczyk, W., and Szczypiorski, K., Trends in steganography. Commun. ACM 57:86\u201395, 2014.","journal-title":"Commun. ACM"},{"key":"426_CR4","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11042-011-0799-9","volume":"66","author":"PC Su","year":"2013","unstructured":"Su, P. C., Lu, M. T., and Wu, C. Y., A practical design of high-volume steganography in digital video files. Multimed. Tools Applic. 66:247\u2013266, 2013.","journal-title":"Multimed. Tools Applic."},{"key":"426_CR5","unstructured":"Pan, J.S., Li, W., Yang, C.S., and Yan, L., \u201cImage steganography based on subsampling and compressive sensing,\u201d. Multimed. Tools Applic.. doi: 10.10071\/s11042-014-2070-1."},{"key":"426_CR6","doi-asserted-by":"crossref","first-page":"512","DOI":"10.4218\/etrij.13.0112.0480","volume":"35","author":"CY Yang","year":"2013","unstructured":"Yang, C. Y., Robust watermarking scheme based on radius weight mean and feature-embedding technique. ETRI J. 35:512\u2013522, 2013.","journal-title":"ETRI J."},{"key":"426_CR7","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1016\/j.ins.2014.02.158","volume":"277","author":"XY Wang","year":"2014","unstructured":"Wang, X. Y., Niu, P. P., Yang, H. Y., Wang, C. P., and Wang, A. L., A new robust color image watermarking using local quaternion exponent moments. Inf. Sci. 277:731\u2013754, 2014.","journal-title":"Inf. Sci."},{"key":"426_CR8","first-page":"1264","volume":"6","author":"S Wang","year":"2015","unstructured":"Wang, S., Miyauchi, R., Unoki, M., and Kim, N. S., Tampering detection scheme for speech signals using formant enhancement based watermarking. J. Inform. Hiding Multimed. Sign. Process. 6:1264\u20131283, 2015.","journal-title":"J. Inform. Hiding Multimed. Sign. Process."},{"key":"426_CR9","author":"YH Chen","year":"2015","unstructured":"Chen, Y. H., Huang, H. C., and Lin, C. C., \u201cBlock-based reversible data hiding with multi-round estimation and difference alteration\u201d. Multimed. Tools Applic. 2015. doi: 10.1007\/s11042-015-2825-9) .","journal-title":"Multimed. Tools Applic."},{"key":"426_CR10","first-page":"882","volume":"6","author":"B Yan","year":"2015","unstructured":"Yan, B., Wang, Y. F., Song, L. Y., and Yang, H. M., Power spectrum compliant QIM watermarking for autoregressive host signals. J. Inform. Hiding Multimed. Sign. Process. 6:882\u2013888, 2015.","journal-title":"J. Inform. Hiding Multimed. Sign. Process."},{"key":"426_CR11","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1016\/j.eswa.2012.08.042","volume":"40","author":"WC Fang","year":"2013","unstructured":"Fang, W. C., Huang, H. C., and Tseng, S. Y., Design of heart rate variability processor for portable 3-lead ECG monitoring system-on-chip. Expert Syst. Applic. 40:1491\u20131504, 2013.","journal-title":"Expert Syst. Applic."},{"key":"426_CR12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","volume":"36","author":"MA Ameen","year":"2012","unstructured":"Ameen, M. A., Liu, J., and Kwak, K., Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36:93\u2013101, 2012.","journal-title":"J. Med. Syst."},{"key":"426_CR13","doi-asserted-by":"crossref","unstructured":"Liu, J., Tang, G, and Sun, Y., \u201cA secure steganography for privacy protection in healthcare system,\u201d J. Med. Syst. 2013. doi: 10.1007\/s10916-012-9918-z .","DOI":"10.1007\/s10916-012-9918-z"},{"key":"426_CR14","doi-asserted-by":"crossref","unstructured":"Ibaida, A., Khalil, I. and Al-Shammary, D.,\u201cEmbedding patients confidential data in ECG signal for healthcare information systems,\u201d 32nd Ann. Int. Conf. the IEEE EMBS Buenos Aires, Argentina, Aug. 31\u2013Sept. 4, pp. 3897\u20133894, 2010.","DOI":"10.1109\/IEMBS.2010.5627671"},{"key":"426_CR15","first-page":"393","volume":"38","author":"A Ibaida","year":"2011","unstructured":"Ibaida, A., Khalil, I., and Schynde, R. V., A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system. Comput. Cardiol. 38:393\u2013396, 2011.","journal-title":"Comput. Cardiol."},{"key":"426_CR16","doi-asserted-by":"crossref","first-page":"3322","DOI":"10.1109\/TBME.2013.2264539","volume":"60","author":"A Ibaida","year":"2013","unstructured":"Ibaida, A., and Khalil, I., Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE T. Biomed. Eng. 60:3322\u20133330, 2013.","journal-title":"IEEE T. Biomed. Eng."},{"key":"426_CR17","first-page":"12","volume":"105","author":"AS Shekhawat","year":"2014","unstructured":"Shekhawat, A. S., Jain, A., and Patil, D., A study of ECG steganography for securing patient\u2019s confidential data based on wavelet transformation. Int. J. Comput. App. 105:12\u201316, 2014.","journal-title":"Int. J. Comput. App."},{"key":"426_CR18","doi-asserted-by":"crossref","unstructured":"Jero, S.E., Ramu, P. and Ramakrishnan, S.,\u201cDiscrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission,\u201d J. Med. Syst.38, doi: s10916-014-0132-z, 2014.","DOI":"10.1007\/s10916-014-0132-z"},{"key":"426_CR19","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s10916-008-9185-1","volume":"33","author":"SS Kozat","year":"2009","unstructured":"Kozat, S. S., Vlachos, M., and Lucchese, C., Embedding and retrieving private metadata in electrocardiograms. J. Med. Syst. 33:241\u2013259, 2009.","journal-title":"J. Med. Syst."},{"key":"426_CR20","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10916-008-9172-6","volume":"33","author":"F Sufi","year":"2009","unstructured":"Sufi, F., and Khalil, I., A new feature detection mechanism and its application in secured ECG transmission with noise masking. J. Med. Syst. 33:121\u2013132, 2009.","journal-title":"J. Med. Syst."},{"key":"426_CR21","doi-asserted-by":"crossref","first-page":"2379","DOI":"10.1007\/s10916-011-9705-2","volume":"36","author":"S Dogan","year":"2011","unstructured":"Dogan, S., Tuncer, T., Avci, E., and Gulten, A., A new watermarking system based on discrete cosine transform (DCT) in color biometric images. J. Med. Syst. 36:2379\u20132385, 2011.","journal-title":"J. Med. Syst."},{"key":"426_CR22","doi-asserted-by":"crossref","first-page":"3721","DOI":"10.3390\/s140203721","volume":"14","author":"KK Tseng","year":"2014","unstructured":"Tseng, K. K., He, X., Kung, W. M., Chen, S. T., Liao, M. H., and Huang, H. N., Wavelet-based watermarking and compression for ECG signals with verification evaluation. Sensors 14:3721\u20133736, 2014.","journal-title":"Sensors"},{"key":"426_CR23","unstructured":"Chen, S.T., Guo, Y.J. and Huang, H.N., \u201cHiding patients confidential data in the ECG signal via a transform-domain quantization scheme,\u201d J. Med. Syst. doi: s10916-014-0054-9, 2014."},{"key":"426_CR24","doi-asserted-by":"crossref","unstructured":"Zheng, K.M. and Qian, X.,\u201cReversible data hiding for electrocardiogram signal based on wavelet transform,\u201d Int. Conf. Comput. Intelli. Sec. 13\u201317 Dec. Suzhou, China, p. 295\u2013299, 2008.","DOI":"10.1109\/CIS.2008.71"},{"key":"426_CR25","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s10916-008-9176-2","volume":"33","author":"J Nayak","year":"2009","unstructured":"Nayak, J., Bhat, P. S., Achaya, U. R., and Kumar, M. S., Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. J. Med. Syst. 33:163\u2013171, 2009.","journal-title":"J. Med. Syst."},{"key":"426_CR26","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/51.932724","volume":"20","author":"GB Moody","year":"2001","unstructured":"Moody, G. B., and Mark, R. G., The impact of the MIT-BIH arrhythmia database. IEEE Eng. Med. Biol. 20:45\u201350, 2001.","journal-title":"IEEE Eng. Med. Biol."},{"key":"426_CR27","unstructured":"PhysioNet, \u201cThe creighton university ventricular tachyarrhythmia database,\u201d http:\/\/www.physionet.org\/physiobank ."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0426-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0426-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0426-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T20:44:11Z","timestamp":1567457051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0426-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,29]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["426"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0426-9","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,29]]},"article-number":"66"}}