{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T15:57:15Z","timestamp":1746547035387,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2021,3,21]],"date-time":"2021-03-21T00:00:00Z","timestamp":1616284800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,21]],"date-time":"2021-03-21T00:00:00Z","timestamp":1616284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-021-10705-6","type":"journal-article","created":{"date-parts":[[2021,3,21]],"date-time":"2021-03-21T04:51:30Z","timestamp":1616302290000},"page":"21899-21923","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Tree parity machine guided patients\u2019 privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4951-4729","authenticated-orcid":false,"given":"Arindam","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Moumita","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,21]]},"reference":[{"issue":"4","key":"10705_CR1","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/4233.966107","volume":"5","author":"UR Acharya","year":"2001","unstructured":"Acharya UR, Acharya D, Bhat PS, Niranjan UC (2001) Compact storage of medical images with patient information. IEEE Trans Inf Technol Biomed 5(4):320\u2013323. https:\/\/doi.org\/10.1109\/4233.966107","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"10705_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad M, Farooq O, Datta S, Sohail SS, Vyas AL, Mulvaney D (2011) Chaos-based encryption of biomedical EEG signals using random quantization technique. In: et al. (ed) 4th International Conference on Biomedical Engineering and Informatics (BMEI), vol 3, pp 1471\u20131475, DOI https:\/\/doi.org\/10.1109\/BMEI.2011.6098594","DOI":"10.1109\/BMEI.2011.6098594"},{"key":"10705_CR3","doi-asserted-by":"publisher","unstructured":"Alkhodaidi T, Gutub A (2020) Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-020-09720-w","DOI":"10.1007\/s11042-020-09720-w"},{"issue":"10","key":"10705_CR4","doi-asserted-by":"publisher","first-page":"2530","DOI":"10.1109\/tim.2010.2057652","volume":"59","author":"CD Capua","year":"2010","unstructured":"Capua CD, Meduri A, Morello R (2010) A smart ECG measurement system based on web-service-oriented architecture for telemedicine applications. IEEE Trans Instrum Meas 59(10):2530\u20132538. https:\/\/doi.org\/10.1109\/tim.2010.2057652","journal-title":"IEEE Trans Instrum Meas"},{"key":"10705_CR5","unstructured":"CDC (2020) (COVID-19) situation summary. https:\/\/www.cdc.gov\/coronavirus\/2019-ncov\/index.html"},{"key":"10705_CR6","doi-asserted-by":"publisher","unstructured":"Chattopadhyay AK, Nag A, Singh JP (2020) A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-020-09174-0","DOI":"10.1007\/s11042-020-09174-0"},{"key":"10705_CR7","unstructured":"England PH (2020) https:\/\/publichealthmatters.blog.gov.uk\/2020\/03\/04\/coronavirus-covid-19-what-is-socialdistancing\/"},{"issue":"17-18","key":"10705_CR8","doi-asserted-by":"publisher","first-page":"12183","DOI":"10.1007\/s11042-019-08454-8","volume":"79","author":"M Gupta","year":"2020","unstructured":"Gupta M, Gupta M, Deshmukh M (2020) Single secret image sharing scheme using neural cryptography. Multimedia Tools and Applications 79 (17-18):12183\u201312204. https:\/\/doi.org\/10.1007\/s11042-019-08454-8","journal-title":"Multimedia Tools and Applications"},{"key":"10705_CR9","unstructured":"HIPAA (2020) Advice for healthcare organizations on preventing and detecting human-operated ransomware attacks. https:\/\/www.hipaajournal.com\/advice-for-healthcare-organizations-on-preventing-and-detecting-human-operated-ransomware-attacks\/"},{"key":"10705_CR10","unstructured":"HIPAA (2020) CISA issues fresh alert about ongoing APT group attacks on healthcare organizations"},{"key":"10705_CR11","unstructured":"HIPAA (2020) EFF warns of privacy and security risks with google and apple\u2019s COVID-19 contact tracing technology. https:\/\/www.hipaajournal.com\/eff-privacy-security-risks-covid-19-contact-tracing-technology\/"},{"key":"10705_CR12","unstructured":"HIPAA (2020) FBI issues flash alert about COVID-19 phishing scams targeting healthcare providers. https:\/\/www.hipaajournal.com\/fbi-issues-flash-alert-about-covid-19-phishing-scams-targeting-healthcare-providers\/"},{"key":"10705_CR13","unstructured":"HIPAA (2020) FBI warns of increase in COVID-19 related business email compromise scams. https:\/\/www.hipaajournal.com\/fbi-warns-of-increase-in-covid-19-related-business-email-compromise-scams\/"},{"key":"10705_CR14","unstructured":"HIPAA (2020) Government healthcare agencies and COVID-19 research organizations targeted by nigerian BEC Scammers. https:\/\/www.hipaajournal.com\/government-healthcare-agencies-and-covid-19-research-organizations-targeted-by-nigerian-bec-scammers\/"},{"key":"10705_CR15","unstructured":"HIPAA (2020) Hackers target WHO, HHS, and COVID-19 research firm. https:\/\/www.hipaajournal.com\/hackers-target-who-hhs-and-covid-19-research-firm\/"},{"key":"10705_CR16","unstructured":"HIPAA (2020) INTERPOL issues warning over increase in ransomware attacks on healthcare organizations. https:\/\/www.hipaajournal.com\/interpol-issues-warning-over-increase-in-ransomware-attacks-on-healthcare-organizations\/"},{"key":"10705_CR17","unstructured":"HIPAA (2020) Scammers target healthcare buyers trying to purchase PPE and medical equipment. https:\/\/www.hipaajournal.com\/scammers-target-healthcare-buyers-looking-to-purchase-ppe-and-medical-equipment\/"},{"key":"10705_CR18","unstructured":"HIPAA (2020) Zoom security problems raise concern about suitability for medical use. https:\/\/www.hipaajournal.com\/zoom-security-problems\/"},{"key":"10705_CR19","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/S0140-6736(20)30183-5","volume":"395","author":"C Huang","year":"2020","unstructured":"Huang C, Wang Y, Li X, Ren L, Zhao J, Hu Y (2020) Clinical features of patients infected with 2019 novel coronavirus in Wuhan. China Lancet 395:497\u2013506","journal-title":"China Lancet"},{"issue":"1","key":"10705_CR20","doi-asserted-by":"publisher","first-page":"6","DOI":"10.24869\/psyd.2020.6","volume":"32","author":"M Jakovljevic","year":"2020","unstructured":"Jakovljevic M, Bjedov S, Jaksic N, Jakovljevic I (2020) COVID-19 pandemia and public and global mental health from the perspective of global health securit. Psychiatr Danub 32(1):6\u201314","journal-title":"Psychiatr Danub"},{"key":"10705_CR21","doi-asserted-by":"publisher","first-page":"17057","DOI":"10.1007\/s11042-019-7535-2","volume":"79","author":"A John Blesswin","year":"2020","unstructured":"John Blesswin A, Raj C, Sukumaran R, et al. (2020) Enhanced semantic visual secret sharing scheme for the secure image communication. Multimed Tools Appl 79:17057\u201317079. https:\/\/doi.org\/10.1007\/s11042-019-7535-2","journal-title":"Multimed Tools Appl"},{"key":"10705_CR22","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.procs.2016.09.056","volume":"98","author":"RM Liaqat","year":"2016","unstructured":"Liaqat RM, Mehboob B, Saqib NA, Khan MA (2016) A framework for clustering cardiac patient\u2019s records using unsupervised learning techniques. Procedia Computer Science 98:368\u2013373. https:\/\/doi.org\/10.1016\/j.procs.2016.09.056","journal-title":"Procedia Computer Science"},{"issue":"3","key":"10705_CR23","first-page":"1","volume":"40","author":"F Lin","year":"2016","unstructured":"Lin F (2016) Chaotic visual cryptosystem using empirical mode decomposition algorithm for clinical EEG signals. J Med Syst 40(3):1\u201310","journal-title":"J Med Syst"},{"issue":"5","key":"10705_CR24","first-page":"1","volume":"38","author":"F Lin","year":"2014","unstructured":"Lin F, Shih SH, Zhu JD (2014) Chaos based encryption system for encrypting electroencephalogram signals. J Med Syst 38(5):1\u201310","journal-title":"J Med Syst"},{"key":"10705_CR25","unstructured":"Lindell Y, Katz J (2014) Introduction to modern cryptography. Chapman and Hall\/CRC"},{"issue":"9","key":"10705_CR26","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1001\/jama.2016.0904","volume":"315","author":"DR Lucey","year":"2016","unstructured":"Lucey DR, Gostin LO (2016) The emerging zika pandemic: enhancing preparedness. JAMA 315(9):865\u2013871","journal-title":"JAMA"},{"key":"10705_CR27","doi-asserted-by":"publisher","unstructured":"McKibbin WJ, Fernando R (2020) The global macroeconomic impacts of COVID-19: seven scenarios. SSRN Electronic Journal. https:\/\/doi.org\/10.2139\/ssrn.3547729","DOI":"10.2139\/ssrn.3547729"},{"issue":"8","key":"10705_CR28","first-page":"55","volume":"16","author":"F Meneses","year":"2016","unstructured":"Meneses F, Fuertes W, Sancho J (2016) RSA encryption algorithm optimization to improve performance and security level of network messages. IJCSNS 16(8):55\u201355","journal-title":"IJCSNS"},{"issue":"1","key":"10705_CR29","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.11591\/ijeei.v7i1.937","volume":"7","author":"IH Mulyadi","year":"2019","unstructured":"Mulyadi IH, Nelmiawati N, Supriyanto E (2019) Improving accuracy of derived 12-lead electrocardiography by waveform segmentation. Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 7(1):2089\u20133272. https:\/\/doi.org\/10.11591\/ijeei.v7i1.937","journal-title":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)"},{"issue":"4","key":"10705_CR30","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10916-017-0698-3","volume":"41","author":"MA Murillo-Escobar","year":"2017","unstructured":"Murillo-Escobar MA, Cardoza-Avenda\u00f1o L, L\u00f3pez-Guti\u00e9rrez R M, Cruz-Hern\u00e1ndez C (2017) A double chaotic layer encryption algorithm for clinical signals in telemedicine. J Med Syst 41(4):59\u201359. https:\/\/doi.org\/10.1007\/s10916-017-0698-3","journal-title":"J Med Syst"},{"key":"10705_CR31","doi-asserted-by":"crossref","unstructured":"Nab\u0131yev V, Uluta\u015f M, Uluta\u015f G (2010) Secret sharing scheme to implement medical image security. In: 2010 IEEE 18th signal processing and communications applications conference, Diyarbakir, pp 820\u2013823","DOI":"10.1109\/SIU.2010.5653474"},{"key":"10705_CR32","doi-asserted-by":"publisher","first-page":"16219","DOI":"10.1007\/s11042-019-07807-7","volume":"79","author":"A Nag","year":"2020","unstructured":"Nag A, Singh JP, Singh AK (2020) An efficient Boolean based multi-secret image sharing scheme. Multimed Tools Appl 79:16219\u201316243","journal-title":"Multimed Tools Appl"},{"key":"10705_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1475-925X-3-17","volume":"3","author":"J Nayak","year":"2004","unstructured":"Nayak J, Bhat PS, Acharya UR, Niranjan UC (2004) Simultaneous storage of medical images in the spatial and frequency domain: a comparative study. BioMed Eng OnLine 3:1\u201310","journal-title":"BioMed Eng OnLine"},{"issue":"3","key":"10705_CR34","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10916-008-9176-2","volume":"33","author":"J Nayak","year":"2009","unstructured":"Nayak J, Bhat PS, M Sathish Kumar RAU (2009) Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. J Med Syst 33(3):163\u2013171. https:\/\/doi.org\/10.1007\/s10916-008-9176-2","journal-title":"J Med Syst"},{"key":"10705_CR35","unstructured":"NIST (2020) NIST statistical test. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/stats_tests.html"},{"key":"10705_CR36","unstructured":"PhysioBank (2020) Physiobank ATM. Online. https:\/\/physionet.org\/"},{"key":"10705_CR37","unstructured":"Priya S (2020) https:\/\/www.opengovasia.com\/singapore-government-launches-covid-19-chatbot\/"},{"issue":"3","key":"10705_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0433-5","volume":"40","author":"M Raeiatibanadkooki","year":"2016","unstructured":"Raeiatibanadkooki M, Quchani SR, KhalilZade M, Bahaadinbeigy K (2016) Compression and encryption of ECG signal using wavelet and chaotically huffman code in telemedicine application. J Med Syst 40(3):1\u20138. https:\/\/doi.org\/10.1007\/s10916-016-0433-5","journal-title":"J Med Syst"},{"issue":"3","key":"10705_CR39","doi-asserted-by":"publisher","first-page":"3851","DOI":"10.1007\/s11042-016-4012-z","volume":"76","author":"S Shivani","year":"2017","unstructured":"Shivani S, Rajitha B, Agarwal S (2017) XOR based continuous-tone multi secret sharing for store-and-forward telemedicine. Multimedia Tools and Applications 76(3):3851\u20133870. https:\/\/doi.org\/10.1007\/s11042-016-4012-z","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"10705_CR40","doi-asserted-by":"publisher","first-page":"34","DOI":"10.7748\/nm.2019.e1806","volume":"26","author":"A Spencer","year":"2019","unstructured":"Spencer A, Patel S (2019) Applying the data protection act 2018 and general data protection regulation principles in healthcare settings. Nurs Manag 26(1):34\u201340. https:\/\/doi.org\/10.7748\/nm.2019.e1806","journal-title":"Nurs Manag"},{"issue":"4","key":"10705_CR41","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/s0010-4825(02)00083-5","volume":"33","author":"U RA","year":"2003","unstructured":"RA U, Bhat PS, Kumar S, Min LC (2003) Transmission and storage of medical images with patient information. Comput Biol Med 33(4):303\u2013310. https:\/\/doi.org\/10.1016\/s0010-4825(02)00083-5","journal-title":"Comput Biol Med"},{"issue":"1","key":"10705_CR42","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.cmpb.2004.02.009","volume":"76","author":"RAU UC Niranjan","year":"2004","unstructured":"UC Niranjan RAU, Iyengar SS, Kannathal N, Min LC (2004) Simultaneous storage of patient information with medical images in the frequency domain. Comput Methods Prog Biomed 76(1):13\u201319. https:\/\/doi.org\/10.1016\/j.cmpb.2004.02.009","journal-title":"Comput Methods Prog Biomed"},{"key":"10705_CR43","unstructured":"WHO (2020) WHO director-general\u2019s opening remarks at the media briefing on COVID. https:\/\/www.who.int\/dg\/speeches\/detail\/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-"},{"key":"10705_CR44","unstructured":"WHO (2020) World Health Organization. Critical preparedness, readiness and response actions for COVID-19. https:\/\/www.who.int\/publications-detail\/critical-preparedness-readiness-and-response-actions-for-covid-19"},{"key":"10705_CR45","doi-asserted-by":"publisher","first-page":"11","DOI":"10.21037\/mhealth.2018.04.03","volume":"4","author":"AM Williams","year":"2018","unstructured":"Williams AM, Bhatti UF, Alam HB, Nikolian VC (2018) The role of telemedicine in postoperative care. mHealth 4:11\u201311. https:\/\/doi.org\/10.21037\/mhealth.2018.04.03","journal-title":"mHealth"},{"key":"10705_CR46","unstructured":"Woodley M (2020) https:\/\/www1.racgp.org.au\/newsgp\/clinical\/chief-medical-officer-flags-coronavirus-telehealth"},{"key":"10705_CR47","unstructured":"Worldometer (2020) https:\/\/www.worldometers.info\/coronavirus\/"},{"key":"10705_CR48","unstructured":"Zhu N, Zhang D, Wang W, Li X, Yang B, Song J (2019) A novel coronavirus from patients with pneumonia in China. New England J Med"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10705-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10705-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10705-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T05:19:32Z","timestamp":1621919972000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10705-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,21]]},"references-count":48,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10705"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10705-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,3,21]]},"assertion":[{"value":"15 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Competing interests"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}