{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:10:13Z","timestamp":1767705013939,"version":"3.40.4"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T00:00:00Z","timestamp":1646784000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T00:00:00Z","timestamp":1646784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11042-022-12653-1","type":"journal-article","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T05:02:35Z","timestamp":1646802155000},"page":"18829-18853","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["IEFHAC: Image encryption framework based on hessenberg transform and chaotic theory for smart health"],"prefix":"10.1007","volume":"81","author":[{"given":"Aiman","family":"Jan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5983-0912","authenticated-orcid":false,"given":"Shabir A.","family":"Parah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bilal A.","family":"Malik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,3,9]]},"reference":[{"key":"12653_CR1","unstructured":"2020 Breach Barometer: 41Mpatient Records Breached as hacking incidents escalate.(2020), https:\/\/blog.protenus.com\/2020-breach-barometer-41m-patient-records-breached-as-hacking-incidents-escalate (9-12-2010)"},{"key":"12653_CR2","doi-asserted-by":"publisher","first-page":"27569","DOI":"10.1007\/s11042-019-07852-2","volume":"78","author":"S Anwar","year":"2019","unstructured":"Anwar S, Meghana S (2019) A pixel permutation based image encryption technique using chaotic map. Springer Multimedia Tools Appl 78:27569\u201327590. https:\/\/doi.org\/10.1007\/s11042-019-07852-2","journal-title":"Springer Multimedia Tools Appl"},{"key":"12653_CR3","doi-asserted-by":"publisher","first-page":"17171","DOI":"10.1007\/s11042-015-2985-7","volume":"75","author":"AM Ayoup","year":"2016","unstructured":"Ayoup AM, Hussein AH, Attia MAA (2016) Efficient selective image encryption. Springer Multimedia Tools Appl 75:17171\u201317186. https:\/\/doi.org\/10.1007\/s11042-015-2985-7","journal-title":"Springer Multimedia Tools Appl"},{"key":"12653_CR4","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.scs.2017.02.016","volume":"31","author":"SE Bibri","year":"2017","unstructured":"Bibri SE, Krogstie J (2017) Smart sustainable cities of the future: an extensive interdisciplinary literature review. Sustain Cities Soc 31:183\u2013212","journal-title":"Sustain Cities Soc"},{"key":"12653_CR5","doi-asserted-by":"publisher","first-page":"102190","DOI":"10.1016\/j.scs.2020.102190","volume":"59","author":"SJ Cao","year":"2020","unstructured":"Cao SJ, Ding J, Ren C (2020) Sensor deployment strategy using cluster analysis of fuzzy C-means algorithm: towards online control of indoor Environment\u2019s safety and health. Elsevier Sustain Cities Soc 59:102190. https:\/\/doi.org\/10.1016\/j.scs.2020.102190","journal-title":"Elsevier Sustain Cities Soc"},{"key":"12653_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.lla.2020.03.037","volume":"601","author":"EYS Chan","year":"2020","unstructured":"Chan EYS, Corless RM, Gonzalez-Veg L, Sendra JR, Sendra J, Thornton SE (2020) Upper Hessenberg and Toeplitz Bohemians. Elsevier Linear Algebra Appl 601:72\u2013100. https:\/\/doi.org\/10.1016\/j.lla.2020.03.037","journal-title":"Elsevier Linear Algebra Appl"},{"issue":"1","key":"12653_CR7","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.cnsns.2014.11.021","volume":"23","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach, Commun. Nonlinear Sci Numer Simul 23(1):294\u2013310","journal-title":"Nonlinear Sci Numer Simul"},{"key":"12653_CR8","first-page":"329","volume":"64","author":"I Cicek","year":"2017","unstructured":"Cicek I, Pusane AE, Dundar G (2017) An integrated dual entropy Core true random number generator. IEEE Trans Circ-II 64:329\u2013333","journal-title":"IEEE Trans Circ-II"},{"key":"12653_CR9","unstructured":"Covid-19 patients image dataset is available on: https:\/\/github.com\/education454\/datasets\/tree\/master\/Data"},{"key":"12653_CR10","unstructured":"Data Breaches. Orion Sang reports data loss of patients (2020). URL https:\/\/www.databreaches.net\/oakland-country-stops-covid-19-data-leak\/ (17-04-2020)."},{"key":"12653_CR11","unstructured":"Data Breaches. Dimitris Kouimtsidis reports data loss of patients including a politician (2020). URL https:\/\/www.databreaches.net\/teenage-hacker-arrested-in-madrid-for-hacking-medical-data-and-leaking-information-on-a-politician-positive-for-covid-19\/ (18-04-2020)."},{"key":"12653_CR12","doi-asserted-by":"publisher","unstructured":"Dogan S (2017) A data hiding scheme based on chaotic map and pixel pairs. J Digital Forensics Secur Law 12(4). https:\/\/doi.org\/10.15394\/jdfsl.2017.1456","DOI":"10.15394\/jdfsl.2017.1456"},{"key":"12653_CR13","doi-asserted-by":"publisher","unstructured":"Ghebleh M, Kanso A, Stevanovi\u2019c D (2018) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation, Springer Multimedia Tools Appl 77:7305\u20137326, https:\/\/doi.org\/10.1007\/s11042-017-4634-9.","DOI":"10.1007\/s11042-017-4634-9"},{"key":"12653_CR14","doi-asserted-by":"publisher","unstructured":"Hamza R, Yan Z, Muhammad K, Bellavista P (2019) A privacy-preserving cryptosystem for IOT e-healthcare. Elsevier Inform Sci. https:\/\/doi.org\/10.1016\/j.ins.2019.01.070","DOI":"10.1016\/j.ins.2019.01.070"},{"key":"12653_CR15","doi-asserted-by":"publisher","unstructured":"He J, Ying Q, Qian Z, Feng G, Zhang X (2020) Semi-structured data protection scheme based on robust watermarking. Springer EURASIP J Image Video Processing 2020. https:\/\/doi.org\/10.1186\/s13640-020-00500-y","DOI":"10.1186\/s13640-020-00500-y"},{"key":"12653_CR16","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hu","year":"2016","unstructured":"Hu Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"12653_CR17","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D logistic-sine-coupling map for image encryption. Elsevier Signal Process 149:148\u2013161","journal-title":"Elsevier Signal Process"},{"key":"12653_CR18","doi-asserted-by":"publisher","unstructured":"Hussain I, Anees A, Aslam M, Ahmed R, Siddiqui N (2018) A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps. Eur Phys J Plus 133(167). https:\/\/doi.org\/10.1140\/epjp\/i2018-11987-x","DOI":"10.1140\/epjp\/i2018-11987-x"},{"key":"12653_CR19","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.optcom.2016.11.066","volume":"387","author":"S Jiao","year":"2017","unstructured":"Jiao S, Zou W, Li X (2017) QR code noise-free optical encryption and decryption of a gray scale image. Elsevier Optics Commun 387:235\u2013240. https:\/\/doi.org\/10.1016\/j.optcom.2016.11.066","journal-title":"Elsevier Optics Commun"},{"key":"12653_CR20","doi-asserted-by":"publisher","first-page":"56730","DOI":"10.1109\/ACCESS.2020.2981670","volume":"8","author":"J Jin","year":"2020","unstructured":"Jin J, Sun W, Al-Turjman F, Bilal K, Xiaodong Y (2020) Activity pattern Mining for Healthcare. IEEE Access 8:56730\u201356738. https:\/\/doi.org\/10.1109\/ACCESS.2020.2981670","journal-title":"IEEE Access"},{"issue":"6","key":"12653_CR21","doi-asserted-by":"publisher","first-page":"10420","DOI":"10.15680\/IJIRCCE.2016.0406028","volume":"4","author":"N Kaushik","year":"2016","unstructured":"Kaushik N, Sheokand K (2016) A steganography technique based on chaotic LSB and DWT. Int J Innov Res Comput Commun Eng 4(6):10420\u201310426. https:\/\/doi.org\/10.15680\/IJIRCCE.2016.0406028","journal-title":"Int J Innov Res Comput Commun Eng"},{"key":"12653_CR22","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.measurement.2018.11.074","volume":"135","author":"G Ke","year":"2019","unstructured":"Ke G, Wang H, Zhou S, Zhang H (2019) Encryption of medical image with most significant bit and high capacity in piecewise linear Chaos graphics. Elsevier Measurement 135:385\u2013391. https:\/\/doi.org\/10.1016\/j.measurement.2018.11.074","journal-title":"Elsevier Measurement"},{"key":"12653_CR23","doi-asserted-by":"publisher","first-page":"102018","DOI":"10.1016\/j.scs.2020.102018","volume":"55","author":"FA Khan","year":"2020","unstructured":"Khan FA, Asif M, Ahmad A, Alharbi M, Aljuaid H (2020) Blockchain technology, improvement suggestions, security challenges on the smart grid and its application in healthcare for sustainable development. Sustain Cities Soc 55:102018 ISSN 2210-6707","journal-title":"Sustain Cities Soc"},{"issue":"4\u20136","key":"12653_CR24","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1080\/19393555.2016.1248582","volume":"25","author":"RR Kumar","year":"2016","unstructured":"Kumar RR, Jayasudha S, Pradeep S (2016) Efficient and secure data hiding in encrypted images: a new approach using Chaos. Taylor & Francis Inform Security J: Global Perspective 25(4\u20136):235\u2013246. https:\/\/doi.org\/10.1080\/19393555.2016.1248582","journal-title":"Taylor & Francis Inform Security J: Global Perspective"},{"key":"12653_CR25","doi-asserted-by":"crossref","unstructured":"Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms, springer 3D. Research 8(37)","DOI":"10.1007\/s13319-017-0148-5"},{"key":"12653_CR26","doi-asserted-by":"publisher","first-page":"102023","DOI":"10.1016\/j.scs.2020.102023","volume":"55","author":"J Laufs","year":"2020","unstructured":"Laufs J, Borrion H, Bradford B (2020) Security and the Smart City: a systematic review. Sustain Cities Soc 55:102023","journal-title":"Sustain Cities Soc"},{"issue":"6","key":"12653_CR27","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1109\/TCSI.2018.2888688","volume":"66","author":"C Li","year":"2019","unstructured":"Li C, Feng B, Li S, Kurths J, Chen G (2019) Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Trans Circ Systems-I: Regular Papers 66(6):2322\u20132335. https:\/\/doi.org\/10.1109\/TCSI.2018.2888688","journal-title":"IEEE Trans Circ Systems-I: Regular Papers"},{"key":"12653_CR28","doi-asserted-by":"publisher","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encryption image based on compressive sensing and discrete Fourier transform. Springer Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-016-3971-4","DOI":"10.1007\/s11042-016-3971-4"},{"key":"12653_CR29","doi-asserted-by":"publisher","first-page":"20511","DOI":"10.1007\/s11042-018-6824-5","volume":"78","author":"Z Lin","year":"2019","unstructured":"Lin Z, Liu J, Lian J, Ma Y, Zhang X (2019) A novel fast image encryption algorithm for embedded systems. Springer Multimedia Tools Appl 78:20511\u201320531. https:\/\/doi.org\/10.1007\/s11042-018-6824-5","journal-title":"Springer Multimedia Tools Appl"},{"key":"12653_CR30","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Trans Inform Secur Solut Telemed Appl 6:19876\u201319897. https:\/\/doi.org\/10.1109\/ACCESS.2018.2808172","journal-title":"IEEE Trans Inform Secur Solut Telemed Appl"},{"key":"12653_CR31","doi-asserted-by":"publisher","first-page":"2023","DOI":"10.1007\/s11042-019-7453-3","volume":"78","author":"Y Luo","year":"2019","unstructured":"Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Springer Multimedia Tools Appl 78:2023\u201322043. https:\/\/doi.org\/10.1007\/s11042-019-7453-3","journal-title":"Springer Multimedia Tools Appl"},{"key":"12653_CR32","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-030-36468-7_14","volume":"22","author":"T Lyche","year":"2020","unstructured":"Lyche T (2020) Numerical Eigenvalue Problems. Springer Cham Numerical Linear Algebra Matrix Factorizations, Comput Sci Eng 22:317\u2013334. https:\/\/doi.org\/10.1007\/978-3-030-36468-7_14","journal-title":"Springer Cham Numerical Linear Algebra Matrix Factorizations, Comput Sci Eng"},{"key":"12653_CR33","doi-asserted-by":"crossref","unstructured":"Merchant F, Vatwani T, Chattopadhyay A, Raha S, Nandy SK (2018) Efficient Reliazation of Household Transform Through Algorithm-Architecture Co-Design for Acceleration of QR Factorization IEEE Transection on Parallel and Distribution Systems 29(8):1707\u20131720.","DOI":"10.1109\/TPDS.2018.2803820"},{"key":"12653_CR34","doi-asserted-by":"publisher","unstructured":"Njitacke ZT, Isaac SD, Nestor T, Kengne J (2020) Window of multistability and control in a simple 3D Hopfield neural network: application to biomedical image encryption. Springer Neural Comput Appl:1\u201320. https:\/\/doi.org\/10.1007\/s00521-020-05451-z","DOI":"10.1007\/s00521-020-05451-z"},{"key":"12653_CR35","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Elsevier Signal Processing 138:129\u2013137. https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.011","journal-title":"Elsevier Signal Processing"},{"key":"12653_CR36","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1007\/s11071-018-4299-6","volume":"93","author":"SA Parah","year":"2018","unstructured":"Parah SA, Loan NA, Shah AA, Sheikh JA, Bhat GM (2018) A new secure and robust watermarking technique based on logistic map and modification of DC coefficients. Springer Nonlinear Dynam 93:1933\u20131951. https:\/\/doi.org\/10.1007\/s11071-018-4299-6","journal-title":"Springer Nonlinear Dynam"},{"key":"12653_CR37","doi-asserted-by":"publisher","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","volume":"75","author":"Z Parvin","year":"2016","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Springer Multimedia Tools Appl 75:10631\u201310648. https:\/\/doi.org\/10.1007\/s11042-014-2115-y","journal-title":"Springer Multimedia Tools Appl"},{"key":"12653_CR38","doi-asserted-by":"publisher","first-page":"12959","DOI":"10.1007\/s11042-019-08470-8","volume":"79","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Acharya B (2020) A novel multi-dimensional multiple image encryption technique. Springer Multimedia Tools Appl 79:12959\u201312994. https:\/\/doi.org\/10.1007\/s11042-019-08470-8","journal-title":"Springer Multimedia Tools Appl"},{"key":"12653_CR39","doi-asserted-by":"publisher","first-page":"12959","DOI":"10.1007\/s11042-019-08470-8","volume":"79","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Acharya B (2020) A novel multi-dimensional multiple image encryption technique. Springer Multimedia Tools Appl 79:12959\u201312994. https:\/\/doi.org\/10.1007\/s11042-019-08470-8","journal-title":"Springer Multimedia Tools Appl"},{"key":"12653_CR40","doi-asserted-by":"crossref","unstructured":"Ping P, Fan J, Mao Y, Xu F, Gao Z (2019) a Chaos-based image encryption scheme using digit-level permutation and block diffusion, IEEE transaction article in press.","DOI":"10.1109\/ACCESS.2018.2879565"},{"key":"12653_CR41","doi-asserted-by":"publisher","unstructured":"Prasad S, Pal AK (2019) Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement. Springer Emerging Technologies in Data MiningInform Security Advances Intell Syst Comput. https:\/\/doi.org\/10.1007\/978-981-13-1501-5_17","DOI":"10.1007\/978-981-13-1501-5_17"},{"key":"12653_CR42","doi-asserted-by":"publisher","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2017","unstructured":"Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography based on DCT and chaotic map. Springer Multimedia Tools and Appl 76:13493\u201313510. https:\/\/doi.org\/10.1007\/s11042-016-3722-6","journal-title":"Springer Multimedia Tools and Appl"},{"key":"12653_CR43","doi-asserted-by":"crossref","unstructured":"Sankpal PR, Vijaya PA (2014) Image encryption using chaotic maps: a survey, Fifth International Conference on Signals and Image Processing.","DOI":"10.1109\/ICSIP.2014.80"},{"key":"12653_CR44","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.scs.2018.01.053","volume":"38","author":"BN Silva","year":"2018","unstructured":"Silva BN, Khan M, Han K (2018) Towards sustainable smart cities: a review of trends, Architectures, Components, and Open Challenges in Smart Cities. Sustainable Cities Soc 38:697\u2013713","journal-title":"Sustainable Cities Soc"},{"key":"12653_CR45","doi-asserted-by":"publisher","unstructured":"Su Q, Wang G, Lv G, Zhang X, Deng G, Chen B (2016) A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition. 76:8781\u20138801. https:\/\/doi.org\/10.1007\/s11042-016-3522-z","DOI":"10.1007\/s11042-016-3522-z"},{"key":"12653_CR46","doi-asserted-by":"publisher","unstructured":"Tsafack N, Kengne J et al (2019) Design and development of a simple dynamical 4-D chaotic circuit with applications in image encryption. Elsevier Inform Sci. https:\/\/doi.org\/10.1016\/j.ins.2019.10.070","DOI":"10.1016\/j.ins.2019.10.070"},{"key":"12653_CR47","doi-asserted-by":"publisher","first-page":"137731","DOI":"10.1109\/ACCESS.2020.3010794","volume":"8","author":"N Tsafack","year":"2020","unstructured":"Tsafack N, Sankar S et al (2020) A new chaotic map with dynamic analysis and encryption application in internet of health things. IEEE Special Section on Lightweight Secur Provence Int Health Things 8:137731\u2013137744. https:\/\/doi.org\/10.1109\/ACCESS.2020.3010794","journal-title":"IEEE Special Section on Lightweight Secur Provence Int Health Things"},{"key":"12653_CR48","doi-asserted-by":"publisher","unstructured":"Turjman FA (2019) Smart-city medium access for smart mobility applications in internet of things. Wiley: Special Issue Article Trans Emerging Tel Tech. https:\/\/doi.org\/10.1002\/ett.3723","DOI":"10.1002\/ett.3723"},{"key":"12653_CR49","doi-asserted-by":"publisher","first-page":"107463","DOI":"10.1016\/j.anucene.2020.107463","volume":"143","author":"W Wu","year":"2020","unstructured":"Wu W, Yu Y, Luo Q, Yao D, Li Q, Chai X (2020) Calculation of higher Eigen-modes of the forward and Adjoint neutron diffusion equations using IRAM algorithm based on domain decomposition. Ann Nucl Energy 143:107463","journal-title":"Ann Nucl Energy"},{"key":"12653_CR50","doi-asserted-by":"crossref","unstructured":"Www.Covidvisualizer.com, accessed on 17-01-2021.","DOI":"10.12957\/childphilo.2021.56968"},{"key":"12653_CR51","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"12653_CR52","doi-asserted-by":"publisher","first-page":"102822","DOI":"10.1016\/j.jvcir.2020.102822","volume":"71","author":"J Yang","year":"2020","unstructured":"Yang J, Liao X (2020) An embedding strategy on fusing multiple image features for data hiding in multiple images. Elsevier J Vis Commun Image R 71:102822. https:\/\/doi.org\/10.1016\/j.jvcir.2020.102822","journal-title":"Elsevier J Vis Commun Image R"},{"key":"12653_CR53","doi-asserted-by":"publisher","first-page":"058104:1\u2013058104","DOI":"10.1007\/s11432-017-9191-x","volume":"61","author":"G Ye","year":"2018","unstructured":"Ye G, Huang X (2018) Spatial image encryption algorithm based on chaotic map and pixel frequency. Sci China Inform Sci 61:058104:1\u2013058104. https:\/\/doi.org\/10.1007\/s11432-017-9191-x","journal-title":"Sci China Inform Sci"},{"key":"12653_CR54","doi-asserted-by":"publisher","unstructured":"Zhou L, Feng G, Shen L, Zhang X (2019) On security enhancement of steganography via generative adversarial image. IEEE Trans Signal Process Lett. https:\/\/doi.org\/10.1109\/LSP.2019.2963180","DOI":"10.1109\/LSP.2019.2963180"},{"key":"12653_CR55","doi-asserted-by":"publisher","unstructured":"Zou N, Liang S, He D (2020) Issues and challenges of user and data interaction in healthcare-related IoT: a systematic review, Emerald Library Hi-Tech, ISSN: 0737-8831, https:\/\/doi.org\/10.1108\/LHT-09-2019-0177.","DOI":"10.1108\/LHT-09-2019-0177"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12653-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12653-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12653-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T11:33:04Z","timestamp":1744198384000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12653-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,9]]},"references-count":55,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["12653"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12653-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,3,9]]},"assertion":[{"value":"17 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}