{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:56:50Z","timestamp":1761897410311,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-09856-9","type":"journal-article","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T20:02:32Z","timestamp":1604520152000},"page":"8505-8540","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An integer wavelet transform and pixel value differencing based feature specific hybrid technique for 2D ECG steganography with high payload capacity"],"prefix":"10.1007","volume":"80","author":[{"given":"Neetika","family":"Soni","sequence":"first","affiliation":[]},{"given":"Indu","family":"Saini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0170-6270","authenticated-orcid":false,"given":"Butta","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"9856_CR1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.cmpb.2016.01.011","volume":"127","author":"H Al-Dmour","year":"2016","unstructured":"Al-Dmour H, Al-Ani A (2016) Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Comput Methods Prog Biomed 127:24\u201343","journal-title":"Comput Methods Prog Biomed"},{"issue":"1","key":"9856_CR2","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/TITB.2005.855554","volume":"10","author":"AS Al-Fahoum","year":"2006","unstructured":"Al-Fahoum AS (2006) Quality assessment of ECG compression techniques using a wavelet-based diagnostic measure. IEEE Trans Inf Technol Biomed 10(1):182\u2013191","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"9856_CR3","unstructured":"Algeria-Barrero E, Algeria-Ezquerra E (2008). When to perform pre-operative ECG. European Society of Cardiology 7(13)"},{"key":"9856_CR4","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.bspc.2018.03.003","volume":"43","author":"SK Berkaya","year":"2018","unstructured":"Berkaya SK, Uysal AK, Gunal ES, Ergin S, Gunal S, Gulmezoglu MB (2018) A survey on ECG analysis. Biomedical Signal Processing and Control 43:216\u2013235","journal-title":"Biomedical Signal Processing and Control"},{"issue":"3","key":"9856_CR5","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1006\/acha.1997.0238","volume":"5","author":"AR Calderbank","year":"1998","unstructured":"Calderbank AR, Daubechies I, Sweldens W (1998) Wavelet transform that maps integers to integers. Appl Comput Harmon Anal 5(3):332\u2013369","journal-title":"Appl Comput Harmon Anal"},{"issue":"6","key":"9856_CR6","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1109\/TBME.2005.863961","volume":"53","author":"HH Chou","year":"2006","unstructured":"Chou HH, Chen YJ, Shiau YC, Kuo TS (2006) An effective and efficient compression algorithm for ECG signals with irregular periods. IEEE Trans Biomed Eng 53(6):1198\u20131205","journal-title":"IEEE Trans Biomed Eng"},{"issue":"3","key":"9856_CR7","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/BF02476026","volume":"4","author":"I Daubechies","year":"1998","unstructured":"Daubechies I, Sweldens W (1998) Factoring wavelet transforms into lifting steps. J Fourier Anal Appl 4(3):247\u2013269","journal-title":"J Fourier Anal Appl"},{"key":"9856_CR8","unstructured":"English A, Summers R, Lewis J, Coleman C (2015). Confidentiality, third-party billing & the health insurance claims process: implications for title X. Accessed on 11 November 2015"},{"key":"9856_CR9","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"9856_CR10","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Idris YIB, Ho ATS, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46\u201366","journal-title":"Signal Process Image Commun"},{"issue":"12","key":"9856_CR11","doi-asserted-by":"crossref","first-page":"3322","DOI":"10.1109\/TBME.2013.2264539","volume":"60","author":"A Ibaida","year":"2013","unstructured":"Ibaida A, Khalil I (2013) Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans Biomed Eng 60(12):3322\u20133330","journal-title":"IEEE Trans Biomed Eng"},{"key":"9856_CR12","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1007\/s10916-014-0132-z","volume":"38","author":"SE Jero","year":"2014","unstructured":"Jero SE, Ramu P, Ramakrishnan S (2014) Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J Med Syst 38:132","journal-title":"J Med Syst"},{"key":"9856_CR13","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.bspc.2015.07.004","volume":"22","author":"SE Jero","year":"2015","unstructured":"Jero SE, Ramu P, Ramakrishnan S (2015) ECG steganography using curvelet transform. Biomedical Signal Processing and Control 22:161\u2013169","journal-title":"Biomedical Signal Processing and Control"},{"issue":"1","key":"9856_CR14","first-page":"123","volume":"49","author":"SE Jero","year":"2016","unstructured":"Jero SE, Ramu P, Ramakrishnan S (2016) Imperceptibility\u2014robustness tradeoff studies for ECG steganography using continuous ant colony optimization. Expert Syst Appl 49(1):123\u2013135","journal-title":"Expert Syst Appl"},{"key":"9856_CR15","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31:26\u201334","journal-title":"Computer"},{"issue":"14","key":"9856_CR16","doi-asserted-by":"crossref","first-page":"6123","DOI":"10.1016\/j.eswa.2014.04.022","volume":"41","author":"HR Kanan","year":"2014","unstructured":"Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123\u20136130","journal-title":"Expert Syst Appl"},{"issue":"8","key":"9856_CR17","doi-asserted-by":"crossref","first-page":"10648","DOI":"10.1016\/j.eswa.2011.02.122","volume":"38","author":"TD Kieu","year":"2011","unstructured":"Kieu TD, Chang CC (2011) A steganographic scheme by fully exploiting modification directions. Expert Syst Appl 38(8):10648\u201310657","journal-title":"Expert Syst Appl"},{"issue":"12","key":"9856_CR18","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1088\/0967-3334\/28\/12\/003","volume":"28","author":"KK Kim","year":"2007","unstructured":"Kim KK, Lim YG, Kim JS, Park KS (2007) Effect of missing RR-interval data on heart rate variability analysis in the time domain. Physiol Meas 28(12):1485\u20131494","journal-title":"Physiol Meas"},{"issue":"4","key":"9856_CR19","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s10916-008-9185-1","volume":"33","author":"SS Kozat","year":"2009","unstructured":"Kozat SS, Vlachos M, Lucchese C, Herle H, Yu PS (2009) Embedding and retrieving private metadata in electrocardiograms. J Med Syst 33(4):241\u2013259","journal-title":"J Med Syst"},{"key":"9856_CR20","first-page":"1039","volume":"24","author":"CA Liji","year":"2016","unstructured":"Liji CA, Indiradevi KP, Anish Babu KK (2016) Integer-to-integer wavelet transform based ECG steganography for securing patient confidential information. International Conference on Emerging Trends in Engineering, Science and Technology, Procedia Technology 24:1039\u20131047","journal-title":"International Conference on Emerging Trends in Engineering, Science and Technology, Procedia Technology"},{"issue":"10","key":"9856_CR21","doi-asserted-by":"crossref","first-page":"2395","DOI":"10.1016\/j.jss.2012.05.032","volume":"85","author":"YK Lin","year":"2012","unstructured":"Lin YK (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. Systems and Software 85(10):2395\u20132404","journal-title":"Systems and Software"},{"issue":"2","key":"9856_CR22","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.bspc.2007.05.001","volume":"2","author":"MS Manikandan","year":"2007","unstructured":"Manikandan MS, Dandapat S (2007) Wavelet energy based diagnostic distortion measure for ECG. Biomedical Signal Processing and Control 2(2):80\u201396","journal-title":"Biomedical Signal Processing and Control"},{"key":"9856_CR23","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1016\/j.compeleceng.2015.12.005","volume":"54","author":"RF Mart\u00ednez-Gonz\u00e1lez","year":"2016","unstructured":"Mart\u00ednez-Gonz\u00e1lez RF, D\u00edaz-M\u00e9ndez JA, Palacios-Luengas L, L\u00f3pez-Hern\u00e1ndez J, V\u00e1zquez-Medina R (2016) A steganographic method using bernoulli\u2019s chaotic maps. Comput Electr Eng 54:435\u2013449","journal-title":"Comput Electr Eng"},{"key":"9856_CR24","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.cmpb.2010.08.016","volume":"104","author":"MS Nambakhsh","year":"2011","unstructured":"Nambakhsh MS, Ahmadian A, Zaidi H (2011) A contextual based double watermarking of PET images by patient ID and ECG signal. Comput Methods Prog Biomed 104:418\u2013425","journal-title":"Comput Methods Prog Biomed"},{"key":"9856_CR25","unstructured":"www.physionet.org\/cgi-bin\/atm\/ATM accessed in November 2018."},{"issue":"3","key":"9856_CR26","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TBME.1985.325532","volume":"BME-32","author":"J Pan","year":"1985","unstructured":"Pan J, Tompkins WJ (1985) A real-time QRS detection algorithm. IEEE Trans Biomed Eng BME-32(3):230\u2013236","journal-title":"IEEE Trans Biomed Eng"},{"key":"9856_CR27","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s10916-017-0830-4","volume":"41","author":"A Pandey","year":"2017","unstructured":"Pandey A, Saini BS, Singh B, Sood N (2017) An integrated approach using chaotic map & sample value difference method for electrocardiogram steganography and OFDM based secured patient information transmission. J Med Syst 41:187","journal-title":"J Med Syst"},{"issue":"2","key":"9856_CR28","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.bbe.2018.11.012","volume":"39","author":"A Pandey","year":"2019","unstructured":"Pandey A, Singh B, Saini BS, Sood N (2019) A novel fused coupled chaotic map based confidential data embedding- then\u2013encryption of electrocardiogram signal. Biocybernetics and Biomedical Engineering 39(2):282\u2013300","journal-title":"Biocybernetics and Biomedical Engineering"},{"key":"9856_CR29","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214\u2013230","journal-title":"J Biomed Inform"},{"issue":"1","key":"9856_CR30","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/s12045-016-0292-x","volume":"21","author":"V Rajaram","year":"2016","unstructured":"Rajaram V (2016) IEEE standards for floating point numbers. Resonance 21(1):11\u201330","journal-title":"Resonance"},{"issue":"3","key":"9856_CR31","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/83.908504","volume":"10","author":"J Reichel","year":"2001","unstructured":"Reichel J, Menegaz G, Nadenau MJ, Kunt M (2001) Integer wavelet transform for embedded lossy to lossless image compression. IEEE Trans Image Process 10(3):383\u2013392","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"9856_CR32","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/j.jbi.2013.05.002","volume":"46","author":"\u00d3J Rubio","year":"2013","unstructured":"Rubio \u00d3J, Alesanco \u00c1, Garc\u00eda J (2013) Secure information embedding into 1D biomedical signals based on SPIHT. J Biomed Inform 46(4):653\u2013664","journal-title":"J Biomed Inform"},{"issue":"4","key":"9856_CR33","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.jare.2012.05.007","volume":"4","author":"I Saini","year":"2013","unstructured":"Saini I, Singh D, Khosla A (2013) QRS detection using K-nearest neighbor algorithm (KNN) and evaluation on standard ECG databases. J Adv Res 4(4):331\u2013344","journal-title":"J Adv Res"},{"key":"9856_CR34","unstructured":"Leo Schamroth. An introduction to electro cardiography, Wiley, 7th edition."},{"key":"9856_CR35","doi-asserted-by":"crossref","first-page":"258","DOI":"10.3389\/fpubh.2017.00258","volume":"5","author":"F Shaffer","year":"2017","unstructured":"Shaffer F, Ginsberg JP (2017) An overview of heart rate variability metrics and norms. Front Public Health 5:258","journal-title":"Front Public Health"},{"key":"9856_CR36","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.cose.2014.07.008","volume":"48","author":"SY Shen","year":"2015","unstructured":"Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security 48:131\u2013141","journal-title":"Computers & Security"},{"key":"9856_CR37","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.cmpb.2017.08.015","volume":"151","author":"HJ Shiu","year":"2017","unstructured":"Shiu HJ, Lin BS, Huang CH, Chiang PY, Lei CL (2017) Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput Methods Prog Biomed 151:159\u2013170","journal-title":"Comput Methods Prog Biomed"},{"issue":"5","key":"9856_CR38","doi-asserted-by":"crossref","first-page":"884","DOI":"10.1080\/00207721.2010.543478","volume":"43","author":"B Singh","year":"2012","unstructured":"Singh B, Singh D, Jaryal AK, Deepak KK (2012) Ectopic beats in approximate entropy and sample entropy-based HRV assessment. Int J Syst Sci 43(5):884\u2013893","journal-title":"Int J Syst Sci"},{"issue":"4","key":"9856_CR39","doi-asserted-by":"crossref","first-page":"1221","DOI":"10.1016\/j.dsp.2009.10.017","volume":"20","author":"ZEH Slimane","year":"2010","unstructured":"Slimane ZEH, Na\u00eft-Ali A (2010) QRS complex detection using empirical mode decomposition. Digital Signal Processing 20(4):1221\u20131228","journal-title":"Digital Signal Processing"},{"issue":"1","key":"9856_CR40","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13246-018-00718-1","volume":"42","author":"N Soni","year":"2019","unstructured":"Soni N, Saini I, Singh B (2019) Morphologically robust chaotic map based approach to embed patient\u2019s confidential data securely in non-QRS regions of ECG signal. Australas Phys Eng Sci Med 42(1):111\u2013135","journal-title":"Australas Phys Eng Sci Med"},{"issue":"3","key":"9856_CR41","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1093\/oxfordjournals.eurheartj.a014868","volume":"17","author":"Task force of the European society of cardiology and the North American society of pacing and electrophysiology","year":"1996","unstructured":"Task force of the European society of cardiology and the North American society of pacing and electrophysiology (1996) Heart rate variability: standards of measurement, physiological interpretation and clinical use. Eur Heart J 17(3):354\u2013381","journal-title":"Eur Heart J"},{"key":"9856_CR42","unstructured":"The Personal Information Protection and Electronic Documents Act (PIPEDA), Office of the privacy Commissioner of Canada."},{"issue":"4","key":"9856_CR43","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1046\/j.1365-2869.2001.00263.x","volume":"10","author":"J Trinder","year":"2001","unstructured":"Trinder J, Kleiman J, Carrington M, Smith S, Breen S, Tan N, Kim Y (2001) Autonomic activity during human sleep as a function of time and sleep stage. J Sleep Res 10(4):253\u2013264","journal-title":"J Sleep Res"},{"issue":"1","key":"9856_CR44","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.jss.2007.01.049","volume":"81","author":"CM Wang","year":"2008","unstructured":"Wang CM, Wu NI, Tsai CS, Hwang MS (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81(1):150\u2013158","journal-title":"J Syst Softw"},{"issue":"3","key":"9856_CR45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0426-9","volume":"40","author":"C Yang","year":"2016","unstructured":"Yang C, Wang W (2016) Effective electrocardiogram steganography based on coefficient alignment. J Med Syst 40(3):1\u201315","journal-title":"J Med Syst"},{"key":"9856_CR46","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09856-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-09856-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09856-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T21:38:47Z","timestamp":1614634727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-09856-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9856"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09856-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"9 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The ethical principles for medical research of World Medical Association (WMA\u2019s) Declaration of Helsinki have been followed for data acquisition.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"No conflict of interest","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}