{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T12:38:46Z","timestamp":1762173526915,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-020-10344-3","type":"journal-article","created":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T21:07:50Z","timestamp":1620162470000},"page":"26429-26449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An improved separable reversible patient data hiding algorithm for E-healthcare"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4727-109X","authenticated-orcid":false,"given":"Rupali","family":"Bhardwaj","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,4]]},"reference":[{"key":"10344_CR1","unstructured":"Abdulla AA (2019) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Doctoral thesis University of Buckingham"},{"key":"10344_CR2","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2020) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. arXiv:2004.12467"},{"key":"10344_CR3","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.patrec.2019.06.004","volume":"125","author":"S Bhalerao","year":"2019","unstructured":"Bhalerao S, Ansari I A, Kumar A, Jain DK (2019) A reversible and multipurpose ecg data hiding technique for telemedicine applications. Pattern Recognit Lett 125:463\u2013473","journal-title":"Pattern Recognit Lett"},{"issue":"2020","key":"10344_CR4","first-page":"60","volume":"139","author":"R Bhardwaj","year":"2018","unstructured":"Bhardwaj R, Aggarwal A (2018) An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem. Pattern Recognition Letters 139(2020):60\u201368","journal-title":"Pattern Recognition Letters"},{"key":"10344_CR5","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14:253\u201313","journal-title":"IEEE Trans Image Process"},{"key":"10344_CR6","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","volume":"25","author":"Y-C Chen","year":"2014","unstructured":"Chen Y-C, Shiu C-W, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Visual Commun Image Represent 25:1164\u20131166","journal-title":"J Visual Commun Image Represent"},{"key":"10344_CR7","doi-asserted-by":"publisher","first-page":"8785","DOI":"10.1007\/s11042-017-4774-y","volume":"77","author":"L-P Chi","year":"2018","unstructured":"Chi L-P, Wu C-H, Chang H-P (2018) Reversible data hiding in dual stegano-image using an improved center folding strategy. Multimed Tools Appl 77:8785\u201318","journal-title":"Multimed Tools Appl"},{"key":"10344_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen T-S, Wu H-Y (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19:199\u20133","journal-title":"IEEE Signal Process Lett"},{"key":"10344_CR9","first-page":"2627","volume":"9","author":"Y-S Kim","year":"2015","unstructured":"Kim Y-S, Kang K, Lim D-W (2015) New reversible data hiding scheme for encrypted images using lattices. Appl Math Inform Sci 9:2627","journal-title":"Appl Math Inform Sci"},{"key":"10344_CR10","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s11235-011-9529-x","volume":"52","author":"C-F Lee","year":"2013","unstructured":"Lee C-F, Huang Y-L (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52:2237\u201310","journal-title":"Telecommun Syst"},{"key":"10344_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Visual Commun Image Represent 28:21\u201326","journal-title":"J Visual Commun Image Represent"},{"key":"10344_CR12","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.sigpro.2015.03.017","volume":"115","author":"T-C Lu","year":"2015","unstructured":"Lu T-C, Wu J-H, Huang C-C (2015) Dual-image-based reversible data hiding method using center folding strategy. Signal Process 115:195\u201318","journal-title":"Signal Process"},{"key":"10344_CR13","doi-asserted-by":"publisher","first-page":"23903","DOI":"10.1007\/s11042-016-4135-2","volume":"76","author":"T-C Lu","year":"2017","unstructured":"Lu T-C, Chi L-P, Wu C-H, Chang H-P (2017) Reversible data hiding in dual stego-images using frequency-based encoding strategy. Multimed Tools Appl 76:23903\u201326","journal-title":"Multimed Tools Appl"},{"key":"10344_CR14","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8:553\u2013559","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"10344_CR15","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s11045-018-0575-3","volume":"30","author":"RF Mansour","year":"2019","unstructured":"Mansour RF, Abdelrahim EM (2019) An evolutionary computing enriched rs attack resilient medical image steganography model for telemedicine applications. Multidimens Syst Signal Process 30(2):791\u2013814","journal-title":"Multidimens Syst Signal Process"},{"key":"10344_CR16","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16:354\u2013358","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"10344_CR17","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 223\u201315","DOI":"10.1007\/3-540-48910-X_16"},{"key":"10344_CR18","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214\u2013230","journal-title":"J Biomed Inform"},{"issue":"3","key":"10344_CR19","doi-asserted-by":"publisher","first-page":"3943","DOI":"10.1007\/s11042-016-4196-2","volume":"76","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat GM (2017) A new reversible and high capacity data hiding technique for e-healthcare applications. Multimed Tools Appl 76(3):3943\u20133975","journal-title":"Multimed Tools Appl"},{"key":"10344_CR20","doi-asserted-by":"crossref","unstructured":"Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. In: Security, forensics, steganography, and watermarking of multimedia contents X, vol 6819. International Society for Optics and Photonics, p 68191E","DOI":"10.1117\/12.766754"},{"key":"10344_CR21","doi-asserted-by":"publisher","first-page":"13749","DOI":"10.1007\/s11042-015-2760-9","volume":"75","author":"Z Qian","year":"2016","unstructured":"Qian Z, Zhang X, Ren Y, Feng G (2016) Block cipher based separable reversible data hiding in encrypted images. Multimed Tools Appl 75:13749\u201317","journal-title":"Multimed Tools Appl"},{"key":"10344_CR22","doi-asserted-by":"crossref","unstructured":"Shi YQ (2004) Reversible data hiding. In: International workshop on digital watermarking. Springer, pp 1\u201312","DOI":"10.1007\/978-3-540-31805-7_1"},{"key":"10344_CR23","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.cmpb.2017.08.015","volume":"151","author":"HJ Shiu","year":"2017","unstructured":"Shiu HJ, Lin B-S, Huang C-H, Chiang P-Y, Lei C-L (2017) Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput Methods Progr Biomed 151:159\u2013170","journal-title":"Comput Methods Progr Biomed"},{"key":"10344_CR24","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3390\/sym10010023","volume":"10","author":"W-L Tai","year":"2018","unstructured":"Tai W-L, Chang Y-F (2018) Separable reversible data hiding in encrypted signals with public key cryptography. Symmetry 10:23","journal-title":"Symmetry"},{"key":"10344_CR25","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13:890\u2013896","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"10344_CR26","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","volume":"104","author":"X Wu","year":"2014","unstructured":"Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Signal Process 104:387\u201313","journal-title":"Signal Process"},{"key":"10344_CR27","doi-asserted-by":"crossref","unstructured":"Xiao B, Ying L, Huang Y (2010) Reversible data hiding using histogram shifting in small blocks. In: 2010 IEEE International conference on communications (ICC). IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2010.5502414"},{"key":"10344_CR28","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.sigpro.2016.12.029","volume":"135","author":"H Yao","year":"2017","unstructured":"Yao H, Qin C, Tang Z, Tian Y (2017) Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels\u2019 coordinates with minimum distortion. Signal Process 135:26\u201329","journal-title":"Signal Process"},{"key":"10344_CR29","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18:255\u20133","journal-title":"IEEE Signal Process Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10344-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10344-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10344-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T06:24:42Z","timestamp":1625552682000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10344-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,4]]},"references-count":29,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10344"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10344-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,5,4]]},"assertion":[{"value":"2 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}