{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T01:50:55Z","timestamp":1771033855649,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,2,28]],"date-time":"2017-02-28T00:00:00Z","timestamp":1488240000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s10916-017-0698-3","type":"journal-article","created":{"date-parts":[[2017,2,28]],"date-time":"2017-02-28T08:14:10Z","timestamp":1488269650000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":60,"title":["A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine"],"prefix":"10.1007","volume":"41","author":[{"given":"M. A.","family":"Murillo-Escobar","sequence":"first","affiliation":[]},{"given":"L.","family":"Cardoza-Avenda\u00f1o","sequence":"additional","affiliation":[]},{"given":"R. M.","family":"L\u00f3pez-Guti\u00e9rrez","sequence":"additional","affiliation":[]},{"given":"C.","family":"Cruz-Hern\u00e1ndez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,28]]},"reference":[{"key":"698_CR1","unstructured":"WHO: A health telematics policy in support of WHO\u2019s Health-For-All strategy for global health development report of the WHO group consultation on health telematics. World Health Organization, 11-16 December, Geneva, Switzerland (1998)"},{"key":"698_CR2","unstructured":"Vergeles-Blanca, J. M., La telemedicina. Desarrollo, ventajas y dudas. B\u00fasqueda Bibliogr\u00e1fica. Internet y las Nuevas Tecnolog\u00edas, 59\u201361 (2011)"},{"issue":"11","key":"698_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0335-y","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S. A., Mahmood, K., Naqvi, H., Khan, M. K., An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. J Med Syst 39(11): 1\u201312, 2015.","journal-title":"J Med Syst"},{"issue":"1","key":"698_CR4","first-page":"23","volume":"34","author":"AA Torres-Garc\u00eda","year":"2013","unstructured":"Torres-Garc\u00eda, A. A., Reyes-Garc\u00eda, C. A., Villase\u0144or-Pineda, L., Ram\u00edrez-Cort\u00e9s, J. M., An\u00e1lisis de se\u0144ales electroencefalogr\u00e1ficas para la clasificaci\u00f3n de habla imaginada. Revista Mexicana de Ingenier\u00eda Biom\u00e9dica 34(1): 23\u201339, 2013.","journal-title":"Revista Mexicana de Ingenier\u00eda Biom\u00e9dica"},{"key":"698_CR5","doi-asserted-by":"crossref","unstructured":"Cui, D.: A novel fingerprint encryption algorithm based on chaotic system and fractional fourier transform. International Conference on Machine Vision and Human-machine Interface, 168\u2013171, 2010.","DOI":"10.1109\/MVHI.2010.38"},{"key":"698_CR6","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","volume":"109","author":"MA Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar, M. A., Cruz-Hern\u00e1ndez, C., Abundiz-P\u00e9rez, F., L\u00f3pez-Guti\u00e9rrez, R. M., Acosta Del Campo, O. R., A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109: 119\u2013131, 2015.","journal-title":"Signal Process"},{"key":"698_CR7","doi-asserted-by":"crossref","first-page":"8198","DOI":"10.1016\/j.eswa.2015.06.035","volume":"42","author":"MA Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar, M. A., Cruz-Hern\u00e1ndez, C., Abundiz-P\u00e9rez, F., L\u00f3pez-Guti\u00e9rrez, R. M., A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst Appl 42: 8198\u20138211, 2015.","journal-title":"Expert Syst Appl"},{"key":"698_CR8","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar, V., Pareek, N. K., Sud, K. K., A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci 14: 3056\u20133075, 2009.","journal-title":"Commun Nonlinear Sci"},{"key":"698_CR9","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou, Y., Bao, L., PhilipChen, C., New 1d chaotic system for image encryption. Signal Process 97: 172\u2013182, 2014.","journal-title":"Signal Process"},{"key":"698_CR10","doi-asserted-by":"crossref","first-page":"1749","DOI":"10.1016\/j.chaos.2005.12.015","volume":"32","author":"MK Khan","year":"2007","unstructured":"Khan, M. K., Zhang, J., Tian, L., Chaotic secure content-based hidden transmission of biometric templates. Chaos, Soliton Fract 32: 1749\u20131759, 2007.","journal-title":"Chaos, Soliton Fract"},{"key":"698_CR11","unstructured":"Murillo-Escobar, M. A., Abundiz-P\u00e9rez, F., Cruz-Hern\u00e1ndez, C., and L\u00f3pez-Guti\u00e9rrez R. M.: A novel symmetric text encryption algorithm based on logistic map. Proceedings of the International Conference on Communications, Signal Processing and Computers, 49\u201353, 2014."},{"key":"698_CR12","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.micpro.2016.06.004","volume":"45","author":"MA Murillo-Escobar","year":"2016","unstructured":"Murillo-Escobar, M. A., Cruz-Hern\u00e1ndez, C., Abundiz-P\u00e9rez, F., L\u00f3pez-Guti\u00e9rrez, R. M., Implementation of an improved chaotic encryption algorithm for real-time embedded d systems by using a 32-bit microcontroller. Microprocess Microsy 45: 297\u2013309, 2016.","journal-title":"Microprocess Microsy"},{"key":"698_CR13","unstructured":"Murillo-Escobar M. A., Cardoza-Avenda\u00f1o L., L\u00f3pez-Guti\u00e9rrez R. M., and Cruz-Hern\u00e1ndez C.: Cifrado ca\u00f3tico sim\u00e9trico de ECG y EEG para aplicaciones en telemedicina. XVII CLCA Latin American Conference of Automatic Control, 612\u2013617, 2016."},{"issue":"8","key":"698_CR14","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., and Li, S., Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(8): 2129\u20132151, 2006.","journal-title":"Int J Bifurcat Chaos"},{"issue":"6","key":"698_CR15","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"H-M Chen","year":"2012","unstructured":"Chen, H.-M., Lo, J.-W., Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J Med Syst 36(6): 3907\u20133915, 2012.","journal-title":"J Med Syst"},{"issue":"2","key":"698_CR16","first-page":"1","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2): 1\u20137, 2013.","journal-title":"J Med Syst"},{"issue":"1","key":"698_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-012-9897-0","volume":"37","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J Med Syst 37(1): 1\u20138, 2013.","journal-title":"J Med Syst"},{"issue":"5","key":"698_CR18","first-page":"1","volume":"37","author":"X Yan","year":"2013","unstructured":"Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J Med Syst 37(5): 1\u20136, 2013.","journal-title":"J Med Syst"},{"issue":"3","key":"698_CR19","first-page":"1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A. K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37(3): 1\u201316, 2013.","journal-title":"J Med Syst"},{"issue":"5","key":"698_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"AK Awasthi","year":"2013","unstructured":"Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J Med Syst 37(5): 1\u20134, 2013.","journal-title":"J Med Syst"},{"key":"698_CR21","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1007\/s11277-014-1829-5","volume":"78","author":"H-Y Lin","year":"2014","unstructured":"Lin, H.-Y., Chaotic map based mobile dynamic ID authenticated key agreement scheme. Wireless Pers Commun 78: 1487\u20131494, 2014.","journal-title":"Wireless Pers Commun"},{"issue":"6","key":"698_CR22","first-page":"1","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Peng, H., Xie, D., Yang, Y., Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J Med Syst 39(6): 1\u201310, 2015.","journal-title":"J Med Syst"},{"issue":"2","key":"698_CR23","first-page":"1","volume":"37","author":"Q Xie","year":"2013","unstructured":"Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J Med Syst 37(2): 1\u20138, 2013.","journal-title":"J Med Syst"},{"issue":"6","key":"698_CR24","first-page":"1","volume":"37","author":"W-C Yau","year":"2013","unstructured":"Yau, W.-C., and Phan, R.C.-W., Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(6): 1\u20139, 2013.","journal-title":"J Med Syst"},{"issue":"4","key":"698_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9952-5","volume":"37","author":"S Kumari","year":"2013","unstructured":"Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of A privacy enhanced scheme for telecare medical information systems. J Med Syst 37(4): 1\u201311, 2013.","journal-title":"J Med Syst"},{"issue":"6","key":"698_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and improvement of Yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J Med Syst 38(6): 1\u201312, 2014.","journal-title":"J Med Syst"},{"issue":"5","key":"698_CR27","first-page":"1","volume":"38","author":"K-W Kim","year":"2014","unstructured":"Kim, K.-W., and Lee, J.-D., On the security of two remote user authentication schemes for telecare medical information systems. J Med Syst 38(5): 1\u201311, 2014.","journal-title":"J Med Syst"},{"issue":"2","key":"698_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2): 1\u20138, 2014.","journal-title":"J Med Syst"},{"issue":"1","key":"698_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-023-02023-1","volume":"39","author":"Z Wang","year":"2015","unstructured":"Wang, Z., Huo, Z., Shi, W., A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. J Med Syst 39(1): 1\u20138, 2015.","journal-title":"J Med Syst"},{"key":"698_CR30","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","volume":"71","author":"C-C Lee","year":"2013","unstructured":"Lee, C.-C., and Hsu, C.-W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71: 201\u2013211, 2013.","journal-title":"Nonlinear Dyn"},{"issue":"6","key":"698_CR31","first-page":"1","volume":"38","author":"AK Das","year":"2014","unstructured":"Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J Med Syst 38(6): 1\u201319, 2014.","journal-title":"J Med Syst"},{"key":"698_CR32","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s10916-008-9176-2","volume":"33","author":"J Nayak","year":"2009","unstructured":"Nayak, J., Subbanna Bhat, P., Acharya, U. R., Sathish Kumar, M., Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. J Med Syst 33: 163\u2013171, 2009.","journal-title":"J Med Syst"},{"key":"698_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1475-925X-3-17","volume":"3","author":"J Nayak","year":"2004","unstructured":"Nayak, J., Subbanna Bhat, P., Acharya, U. R., Niranjan, U. C., Simultaneous storage of medical images in the spatial and frequency domain: a comparative study. BioMed Eng OnLine 3: 1\u201310, 2004.","journal-title":"BioMed Eng OnLine"},{"key":"698_CR34","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.cmpb.2004.02.009","volume":"76","author":"UR Acharya","year":"2004","unstructured":"Acharya, U. R., Niranjanb, U. C., Iyengarc, S. S., Kannathala, N., Mina, L. C., Simultaneous storage of patient information with medical images in the frequency domain. Comput Meth Prog Bio 76: 13\u201319, 2004.","journal-title":"Comput Meth Prog Bio"},{"key":"698_CR35","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/S0010-4825(02)00083-5","volume":"33","author":"UR Acharya","year":"2003","unstructured":"Acharya, U. R., Subbanna Bhat, P., Kumarc, S., Mina, L. C., Transmission and storage of medical images with patient information. Comput Biol Med 33: 303\u2013310, 2003.","journal-title":"Comput Biol Med"},{"issue":"4","key":"698_CR36","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/4233.966107","volume":"5","author":"UR Acharya","year":"2001","unstructured":"Acharya, U. R., Subbanna Bhat, P., Kumarc, S., Mina, L. C., Compact storage of medical images with patient information. IEEE T Inf Technol B 5(4): 320\u2013323, 2001.","journal-title":"IEEE T Inf Technol B"},{"issue":"3","key":"698_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-016-0433-5","volume":"40","author":"M Raeiatibanadkooki","year":"2016","unstructured":"Raeiatibanadkooki, M., Quchani, S. R., KhalilZade, M., Bahaadinbeigy, K., Compression and encryption of ECG signal using wavelet and chaotically huffman code in telemedicine application. J Med Syst 40(3): 1\u20138, 2016.","journal-title":"J Med Syst"},{"issue":"3","key":"698_CR38","first-page":"1","volume":"40","author":"C-F Lin","year":"2016","unstructured":"Lin, C.-F., Chaotic visual cryptosystem using empirical mode decomposition algorithm for clinical EEG signals. J Med Syst 40(3): 1\u201310, 2016.","journal-title":"J Med Syst"},{"key":"698_CR39","doi-asserted-by":"crossref","first-page":"368","DOI":"10.4236\/jbise.2014.76039","volume":"7","author":"G Kenfack","year":"2014","unstructured":"Kenfack, G., and Tiedeu, A., Chaos-based encryption of ECG signals: experimental results. J Biomed Sci Eng 7: 368\u2013379, 2014.","journal-title":"J Biomed Sci Eng"},{"issue":"5","key":"698_CR40","first-page":"1","volume":"38","author":"C-F Lin","year":"2014","unstructured":"Lin, C.-F., Shih, S.-H., Zhu, J.-D., Chaos based encryption system for encrypting electroencephalogram signals. J Med Syst 38(5): 1\u201310, 2014.","journal-title":"J Med Syst"},{"key":"698_CR41","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.ins.2012.01.016","volume":"193","author":"C-K Chen","year":"2012","unstructured":"Chen, C.-K., Lin, C.-L., Chiang, C.-T., Lin, S.-L., Personalized information encryption using ECG signals with chaotic functions. Inform Sciences 193: 125\u2013140, 2012.","journal-title":"Inform Sci"},{"key":"698_CR42","first-page":"147","volume":"1","author":"C-F Lin","year":"2012","unstructured":"Lin, C.-F., and Chang, C.-Y., Implementation of a chaos-based encryption software for electroencephalogram signals. Advances in ECWAC 1: 147\u2013150, 2012.","journal-title":"Advances in ECWAC"},{"key":"698_CR43","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1002\/sec.226","volume":"4","author":"F Sufi","year":"2011","unstructured":"Sufi, F., Han, F., Khalil, I., Hu, J., A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Security Comm Networks 4: 515\u2013524, 2011.","journal-title":"Security Comm Networks"},{"key":"698_CR44","doi-asserted-by":"crossref","unstructured":"Ahmad, M., Farooq, O., Datta, S., Sohail, S. S., Vyas A. L., and Mulvaney D.: 4th International Conference on Biomedical Engineering and Informatics, 1471\u20131475 (2011)","DOI":"10.1109\/BMEI.2011.6098594"},{"issue":"6","key":"698_CR45","first-page":"666","volume":"19","author":"CF Lin","year":"2011","unstructured":"Lin, C. F., and Wang, B. S. H., A 2D chaos-based visual encryption scheme for clinical EEG signals. J Mar Sci Technol 19(6): 666\u2013672, 2011.","journal-title":"J Mar Sci Technol"},{"key":"698_CR46","doi-asserted-by":"crossref","unstructured":"Parveen, S., Parashar, S., Izharuddin: Technique for providing security in medical signals, International Conference on Multimedia, Signal Processing and Communication Technologies, 68\u201371 (2011)","DOI":"10.1109\/MSPCT.2011.6150438"},{"issue":"2","key":"698_CR47","first-page":"49","volume":"7","author":"C-F Lin","year":"2008","unstructured":"Lin, C.-F., Chung, C.-H., Chen, Z.-L., Song, C.-J., Wang, Z.-X., A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. WSEAS Transaction on Systems 7(2): 49\u201355, 2008.","journal-title":"WSEAS Transaction on Systems"},{"key":"698_CR48","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"RM May","year":"1976","unstructured":"May, R. M., Simple mathematical models with very complicated dynamics. Nature 261: 459\u2013467, 1976.","journal-title":"Nature"},{"key":"698_CR49","doi-asserted-by":"crossref","unstructured":"Wolf, A.: Quantifying chaos with Lyapunov exponents. Princeton University Press, Ch. 13, pp. 273\u2013289 (1986)","DOI":"10.1515\/9781400858156.273"},{"key":"698_CR50","doi-asserted-by":"crossref","unstructured":"Sprott, J. C.: Lyapunov exponents. Chaos and time-series analysis Oxford University Press, Ch. 5 (2003)","DOI":"10.1093\/oso\/9780198508397.001.0001"},{"key":"698_CR51","unstructured":"Arroyo, D., Alvarez, G., and Fernandez, V.: On the inadequacy of the logistic map for cryptographic applications. X Reuni\u00f3n Espa\u00f1ola sobre Criptolog\u00eda y Seguridad de la Informaci\u00f3n, 77\u201382, 2008."},{"key":"698_CR52","first-page":"219","volume":"52","author":"R Cristian-Iulian","year":"2007","unstructured":"Cristian-Iulian, R., and Vasile-Gabriel, I., Aspects regarding chaotic maps hardware implementations. Revue Roumaine Des Sciences Techniques 52: 219\u2013227, 2007.","journal-title":"Revue Roumaine Des Sciences Techniques"},{"key":"698_CR53","unstructured":"Physionet.org (2016). PhysioBank ATM. Online, available on: https:\/\/physionet.org\/cgi-bin\/atm\/ATM [visited on May 2016]"},{"key":"698_CR54","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication 800\u201322 (2001)","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"2","key":"698_CR55","first-page":"121","volume":"19","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Lu, L., Bovik, A. C., Video quality assessment based on structural distortion measurement. Signal Process: Image Commun 19(2): 121\u2013132, 2004.","journal-title":"Signal Process: Image Commun."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0698-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-017-0698-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0698-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T20:58:31Z","timestamp":1750021111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-017-0698-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,28]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["698"],"URL":"https:\/\/doi.org\/10.1007\/s10916-017-0698-3","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,28]]},"article-number":"59"}}