{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:59:35Z","timestamp":1761897575068},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"21-23","license":[{"start":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T00:00:00Z","timestamp":1626652800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T00:00:00Z","timestamp":1626652800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11042-021-10892-2","type":"journal-article","created":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T16:03:13Z","timestamp":1626710593000},"page":"31687-31703","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An efficient reversible and secure patient data hiding algorithm for E-healthcare"],"prefix":"10.1007","volume":"80","author":[{"given":"Rupali","family":"Bhardwaj","sequence":"first","affiliation":[]},{"given":"Anjali","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,19]]},"reference":[{"key":"10892_CR1","doi-asserted-by":"crossref","unstructured":"Yun\u00a0Q Shi. Reversible data hiding. In Int. workshop on digital watermarking, pages 1\u201312. Springer, 2004","DOI":"10.1007\/978-3-540-31805-7_1"},{"key":"10892_CR2","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"Jun Tian","year":"2003","unstructured":"Tian Jun (2003) Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13:890\u20136","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10892_CR3","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Zhicheng Ni","year":"2006","unstructured":"Ni Zhicheng, Shi Yun-Qing, Ansari Nirwan, Wei Su (2006) Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16:354\u20138","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10892_CR4","doi-asserted-by":"crossref","unstructured":"B\u00a0Xiao, Lizhi Ying, and Yongfeng Huang. Reversible data hiding using histogram shifting in small blocks. In Communications (ICC), 2010 IEEE Int. Conf on, pages 1\u20136. IEEE, 2010","DOI":"10.1109\/ICC.2010.5502414"},{"key":"10892_CR5","doi-asserted-by":"crossref","unstructured":"Mehmet\u00a0Utku Celik, Gaurav Sharma, A\u00a0Murat Tekalp, and Eli Saber. Lossless generalized-lsb data embedding. IEEE Trans. Image Process., 14:253\u201313, 2005","DOI":"10.1109\/TIP.2004.840686"},{"key":"10892_CR6","doi-asserted-by":"publisher","first-page":"13749","DOI":"10.1007\/s11042-015-2760-9","volume":"75","author":"Zhenxing Qian","year":"2016","unstructured":"Qian Zhenxing, Zhang Xinpeng, Ren Yanli, Feng Guorui (2016) Block cipher based separable reversible data hiding in encrypted images. Multimed Tools Appl 75:13749\u201317","journal-title":"Multimed Tools Appl"},{"key":"10892_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"Xinpeng Zhang","year":"2011","unstructured":"Zhang Xinpeng (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett. 18:255\u20133","journal-title":"IEEE Signal Process Lett."},{"key":"10892_CR8","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","volume":"104","author":"Wu Xiaotian","year":"2014","unstructured":"Xiaotian Wu, Sun Wei (2014) High-capacity reversible data hiding in encrypted images by prediction error. Signal Process. 104:387\u201313","journal-title":"Signal Process."},{"key":"10892_CR9","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"Wien Hong","year":"2012","unstructured":"Hong Wien, Chen Tung-Shou, Han-Yan Wu (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett. 19:199\u20133","journal-title":"IEEE Signal Process Lett."},{"key":"10892_CR10","first-page":"2627","volume":"9","author":"Young-Sik Kim","year":"2015","unstructured":"Kim Young-Sik, Kang Kyungjun, Lim Dae-Woon (2015) New reversible data hiding scheme for encrypted images using lattices. Appl Math Inform Sci 9:2627","journal-title":"Appl Math Inform Sci"},{"key":"10892_CR11","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"Kede Ma","year":"2013","unstructured":"Ma Kede, Zhang Weiming, Zhao Xianfeng, Nenghai Yu, Li Fenghua (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8:553\u20139","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10892_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"Xin Liao","year":"2015","unstructured":"Liao Xin, Shu Changwen (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Visual Commun. Image Represent. 28:21\u20136","journal-title":"J. Visual Commun. Image Represent."},{"key":"10892_CR13","doi-asserted-by":"crossref","unstructured":"Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 223\u201315. Springer, 1999","DOI":"10.1007\/3-540-48910-X_16"},{"key":"10892_CR14","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","volume":"25","author":"Yu-Chi Chen","year":"2014","unstructured":"Chen Yu-Chi, Shiu Chih-Wei, Horng Gwoboa (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J. Visual Commun. Image Represent. 25:1164\u20136","journal-title":"J. Visual Commun. Image Represent."},{"key":"10892_CR15","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jvcir.2016.09.005","volume":"41","author":"Wu Xiaotian","year":"2016","unstructured":"Xiaotian Wu, Chen Bing, Weng Jian (2016) Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. Journal of Visual Communication and Image Representation 41:58\u201364","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"10892_CR16","unstructured":"Bhardwaj Rupali, Aggarwal Ashutosh (2018) An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem. Pattern Recognit. Lett"},{"key":"10892_CR17","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.sigpro.2015.03.017","volume":"115","author":"Lu Tzu-Chuen","year":"2015","unstructured":"Tzu-Chuen Lu, Jhih-Huei Wu, Huang Chun-Chih (2015) Dual-image-based reversible data hiding method using center folding strategy. Signal Process. 115:195\u201318","journal-title":"Signal Process."},{"key":"10892_CR18","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.sigpro.2016.12.029","volume":"135","author":"Heng Yao","year":"2017","unstructured":"Yao Heng, Qin Chuan, Tang Zhenjun, Tian Ying (2017) Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels\u2019 coordinates with minimum distortion. Signal Process. 135:26\u20139","journal-title":"Signal Process."},{"key":"10892_CR19","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s11235-011-9529-x","volume":"52","author":"Chin-Feng Lee","year":"2013","unstructured":"Lee Chin-Feng, Huang Yu-Lin (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52:2237\u201310","journal-title":"Telecommun Syst"},{"key":"10892_CR20","doi-asserted-by":"publisher","first-page":"8785","DOI":"10.1007\/s11042-017-4774-y","volume":"77","author":"Li-Pin Chi","year":"2018","unstructured":"Chi Li-Pin, Chang-Han Wu, Chang Hsung-Pin (2018) Reversible data hiding in dual stegano-image using an improved center folding strategy. Multimed Tools Appl 77:8785\u201318","journal-title":"Multimed Tools Appl"},{"key":"10892_CR21","doi-asserted-by":"publisher","first-page":"23903","DOI":"10.1007\/s11042-016-4135-2","volume":"76","author":"Lu Tzu-Chuen","year":"2017","unstructured":"Tzu-Chuen Lu, Chi Li-Pin, Chang-Han Wu, Chang Hsung-Pin (2017) Reversible data hiding in dual stego-images using frequency-based encoding strategy. Multimed Tools Appl 76:23903\u201326","journal-title":"Multimed Tools Appl"},{"key":"10892_CR22","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.cmpb.2017.08.015","volume":"151","author":"Hung-Jr Shiu","year":"2017","unstructured":"Shiu Hung-Jr, Lin Bor-Sing, Huang Chien-Hung, Chiang Pei-Ying, Lei Chin-Laung (2017) Preserving privacy of online digital physiological signals using blind and reversible steganography. Computer methods and programs in biomedicine 151:159\u2013170","journal-title":"Computer methods and programs in biomedicine"},{"key":"10892_CR23","doi-asserted-by":"crossref","unstructured":"Shabir\u00a0A Parah, Farhana Ahad, Javaid\u00a0A Sheikh, and Ghulam\u00a0Mohiuddin Bhat. Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. Journal of biomedical informatics, 66:214\u2013230, 2017","DOI":"10.1016\/j.jbi.2017.01.006"},{"key":"10892_CR24","doi-asserted-by":"crossref","unstructured":"Shabir\u00a0A Parah, Farhana Ahad, Javaid\u00a0A Sheikh, Nazir\u00a0A Loan, and Ghulam\u00a0Mohiuddin Bhat. A new reversible and high capacity data hiding technique for e-healthcare applications. Multimedia Tools and Applications, 76(3):3943\u20133975, 2017","DOI":"10.1007\/s11042-016-4196-2"},{"key":"10892_CR25","doi-asserted-by":"crossref","unstructured":"Siddharth Bhalerao, Irshad\u00a0Ahmad Ansari, Anil Kumar, and Deepak\u00a0Kumar Jain. A reversible and multipurpose ecg data hiding technique for telemedicine applications. Pattern Recognition Letters, 125:463\u2013473, 2019","DOI":"10.1016\/j.patrec.2019.06.004"},{"key":"10892_CR26","doi-asserted-by":"crossref","unstructured":"Romany\u00a0F Mansour and Elsaid\u00a0M Abdelrahim. An evolutionary computing enriched rs attack resilient medical image steganography model for telemedicine applications. Multidimensional Systems and Signal Processing, 30(2):791\u2013814, 2019","DOI":"10.1007\/s11045-018-0575-3"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10892-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10892-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10892-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T04:36:45Z","timestamp":1633840605000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10892-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,19]]},"references-count":26,"journal-issue":{"issue":"21-23","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["10892"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10892-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,19]]},"assertion":[{"value":"30 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}