{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T10:21:57Z","timestamp":1769077317254,"version":"3.49.0"},"reference-count":90,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02147-w","type":"journal-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T00:58:46Z","timestamp":1762217926000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["StegoSec-EHR: A blockchain-enabled IoTFramework for secure HER sharing via steganography in genetic disease diagnosis"],"prefix":"10.1007","volume":"18","author":[{"given":"Varun","family":"Malik","sequence":"first","affiliation":[]},{"given":"Mudassir","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Punam","family":"Bhoyar","sequence":"additional","affiliation":[]},{"given":"Kimmi","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Mohammed Ashfaq","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Kavita","family":"Arora","sequence":"additional","affiliation":[]},{"given":"Barga Mohammed","family":"Mujahid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"2147_CR1","doi-asserted-by":"crossref","unstructured":"Hsieh TYJ, Wei JCC, Collier AR (2025) Investigation of maternal outcomes following respiratory syncytial virus vaccination in the third trimester: insights from a real-world US electronic health records database. Am J Obstet Gynecol","DOI":"10.1016\/j.ajog.2025.04.067"},{"key":"2147_CR2","doi-asserted-by":"crossref","unstructured":"Rubenstein JH, Burns J, Arasim ME, Evans RR (2025) Validation of tools using the electronic health record for predicting barrett\u2019s esophagus with high grade dysplasia. Clin Gastroenterol Hepatol","DOI":"10.1016\/j.cgh.2025.03.005"},{"key":"2147_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnc.2025.02.007","author":"A Ercole","year":"2025","unstructured":"Ercole A, Wung SF, Muzzy A, Prim L (2025) Electronic health records, best practice advisory alerts, and the user interface in the intensive care unit. Crit Care Nurs Clin North Am. https:\/\/doi.org\/10.1016\/j.cnc.2025.02.007","journal-title":"Crit Care Nurs Clin North Am"},{"key":"2147_CR4","doi-asserted-by":"publisher","DOI":"10.2196\/59024","volume":"27","author":"Y Shen","year":"2025","unstructured":"Shen Y, Yu J, Zhou J, Hu G (2025) Twenty-five years of evolution and hurdles in electronic health records and interoperability in medical research: comprehensive review. J Med Internet Res 27:e59024","journal-title":"J Med Internet Res"},{"key":"2147_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnur.2024.12.005","author":"AA Dwyer","year":"2025","unstructured":"Dwyer AA, Somanadhan S (2025) Nursing\u2019s role in advancing care for rare genetic diseases. Nurs Clin North Am. https:\/\/doi.org\/10.1016\/j.cnur.2024.12.005","journal-title":"Nurs Clin North Am"},{"key":"2147_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2025.117797","author":"M Akrich","year":"2025","unstructured":"Akrich M, Paterson F, Rabeharisoa V (2025) Living with the rare late-onset genetic disease CADASIL: Improvising \u201ctactics\u201d to appropriate biomedical knowledge and technology. Soc Sci Med. https:\/\/doi.org\/10.1016\/j.socscimed.2025.117797","journal-title":"Soc Sci Med"},{"key":"2147_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.lanwpc.2025.101473","author":"WKJ Lam","year":"2025","unstructured":"Lam WKJ, Lau CS, Luk HM, Au LWC, Chan GC, Chan WYH, Cheng SSW, Cheng THT, Cheung LL, Cheung YF, Chong JSC (2025) The implementation of genome sequencing in rare genetic diseases diagnosis: a pilot study from the Hong Kong genome project. The Lancet Regional Health. https:\/\/doi.org\/10.1016\/j.lanwpc.2025.101473","journal-title":"The Lancet Regional Health"},{"key":"2147_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.gim.2025.101398","author":"R Pandey","year":"2025","unstructured":"Pandey R, Brennan NF, Trachana K, Katsandres S, Bodamer O, Belmont J, Veenstra DL, Peng S (2025) A meta-analysis of diagnostic yield and clinical utility of genome and exome sequencing in pediatric rare and undiagnosed genetic diseases. Genet Med. https:\/\/doi.org\/10.1016\/j.gim.2025.101398","journal-title":"Genet Med"},{"key":"2147_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s10943-025-02318-2","author":"MAD Chiong","year":"2025","unstructured":"Chiong MAD, Basas AA (2025) Theological and ethical perspectives on gene editing and the sanctity of life: rare genetic diseases in the Philippines as a model. J Relig Health. https:\/\/doi.org\/10.1007\/s10943-025-02318-2","journal-title":"J Relig Health"},{"key":"2147_CR10","doi-asserted-by":"crossref","unstructured":"Bikku T, Sivakumar S, Chinthamani SAM, Patro P (2025) IoT\u2010based renewable energy management systems in apartment. In: Sustainable Smart Homes and Buildings with Internet of Things, pp 35\u201352","DOI":"10.1002\/9781394231522.ch3"},{"key":"2147_CR11","doi-asserted-by":"crossref","unstructured":"Singamaneni KK, Budati AK, Bikku T (2024) An efficient Q-KPABE framework to enhance cloud-based IoT security and privacy. In: Wireless Personal Communications, pp 1\u201329","DOI":"10.1007\/s11277-024-10908-8"},{"issue":"7","key":"2147_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-03278-2","volume":"5","author":"KLFC Rani","year":"2024","unstructured":"Rani KLFC, Anuradha MP (2024) An IoT cloud security system powered by blockchain for secure preservation of electronic health records. SN Comput Sci 5(7):945","journal-title":"SN Comput Sci"},{"issue":"1","key":"2147_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00967-0","volume":"24","author":"F Ullah","year":"2025","unstructured":"Ullah F, He J, Zhu N, Wajahat A, Nazir A, Qureshi S, Shahzad H (2025) EHR management evolution through purpose-based access control and blockchain smart contracts. Int J Inf Secur 24(1):63","journal-title":"Int J Inf Secur"},{"key":"2147_CR14","doi-asserted-by":"publisher","unstructured":"Ilyas B, Kumar A, Ali SM, Lei H (2024) Blockchain-enabled IoT access control model for sharing electronic healthcare data. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-19232-6","DOI":"10.1007\/s11042-024-19232-6"},{"issue":"2","key":"2147_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-025-03661-7","volume":"6","author":"MN Alruwaill","year":"2025","unstructured":"Alruwaill MN, Mohanty SP, Kougianos E (2025) hChain 2.0: leveraging blockchain and distributed file system for EHR management in smart healthcare. SN Comput Sci 6(2):116","journal-title":"SN Comput Sci"},{"key":"2147_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-20092-3","author":"RK Mishra","year":"2024","unstructured":"Mishra RK, Yadav RK, Nath P (2024) Integration of blockchain and IPFS: healthcare data management & sharing for IoT environment. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-20092-3","journal-title":"Multimedia Tools Appl"},{"key":"2147_CR17","doi-asserted-by":"crossref","unstructured":"Prathima S, Durga R (2023) An efficient CH based authentication and authorization for secure EHR using DF-BCrypt and hashed access structure. In: International Conference on Advancements in Smart Computing and Information Security. Cham, Springer Nature Switzerland, pp 207\u2013226","DOI":"10.1007\/978-3-031-59100-6_16"},{"issue":"5","key":"2147_CR18","doi-asserted-by":"publisher","first-page":"2977","DOI":"10.1007\/s10586-022-03792-z","volume":"26","author":"A Basit","year":"2023","unstructured":"Basit A, Toor WT, Saadi M, Maroof N, Khan SA, Otaibi SA (2023) Reversible encryption and lossless data hiding for medical imaging aiding smart health care. Cluster Comput 26(5):2977\u20132991","journal-title":"Cluster Comput"},{"issue":"6","key":"2147_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01767-y","volume":"17","author":"VB Chenam","year":"2024","unstructured":"Chenam VB, Sree KD, Ali ST (2024) A multi-receiver certificateless public-key searchable encryption: field-free subset conjunctive and disjunctive. Peer-to-Peer Netw Appl 17(6):1","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2147_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.105025","volume":"197","author":"Y Li","year":"2025","unstructured":"Li Y, Xu C, Xu L, Mei L, Zhu Y (2025) Verifiable searchable encryption scheme with flexible access control in the cloud. J Parallel Distrib Comput 197:105025","journal-title":"J Parallel Distrib Comput"},{"key":"2147_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3399031","author":"CNA Cobblah","year":"2024","unstructured":"Cobblah CNA, Xia Q, Gao J, Xia H, Kusi GA, Obiri IA (2024) A secure and lightweight NDN-based vehicular network using edge computing and certificateless signcryption. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2024.3399031","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"2147_CR22","doi-asserted-by":"publisher","first-page":"12252","DOI":"10.1109\/JIOT.2023.3332492","volume":"11","author":"Y Han","year":"2023","unstructured":"Han Y, Zhou Y, Yang B, Xia Z, Zhang M (2023) An efficient and secure lightweight certificateless hybrid signcryption scheme. IEEE Internet Things J 11(7):12252\u201312265","journal-title":"IEEE Internet Things J"},{"key":"2147_CR23","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.aej.2024.08.056","volume":"106","author":"AA Alzahrani","year":"2024","unstructured":"Alzahrani AA, Alharithi FS (2024) Machine learning approaches for advanced detection of rare genetic disorders in whole-genome sequencing. Alexandria Eng J 106:582\u2013593","journal-title":"Alexandria Eng J"},{"issue":"5","key":"2147_CR24","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1016\/j.ajhg.2024.03.008","volume":"111","author":"G Lemire","year":"2024","unstructured":"Lemire G, Sanchis-Juan A, Russell K, Baxter S, Chao KR, Singer-Berk M, Groopman E, Wong I, England E, Goodrich J, Pais L (2024) Exome copy number variant detection, analysis, and classification in a large cohort of families with undiagnosed rare genetic disease. Am J Hum Genet 111(5):863\u2013876","journal-title":"Am J Hum Genet"},{"issue":"3","key":"2147_CR25","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.ajhg.2025.01.019","volume":"112","author":"L Yang","year":"2025","unstructured":"Yang L, Sadler MC, Altman RB (2025) Genetic association studies using disease liabilities from deep neural networks. Am J Hum Genet 112(3):675\u2013692","journal-title":"Am J Hum Genet"},{"key":"2147_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2025.117294","volume":"251","author":"H Gen\u00e7","year":"2025","unstructured":"Gen\u00e7 H, Seyyarer E, Ayata F (2025) Deep learning-driven MRI analysis for accurate diagnosis and grading of lumbar spinal stenosis. Measurement 251:117294","journal-title":"Measurement"},{"key":"2147_CR27","doi-asserted-by":"crossref","unstructured":"Sulakiya P, Chandan S, Bhargavi CP, Bhavana S, Thomas TD, Prabhavathi H, Kumaraswamy HM, Prashanth N, Rajaput SP, Babu RL, Naika HR (2025) Advancements in clinical decision support through deep learning approaches in genetic diagnostics. In: Deep Learning in Genetics and Genomics. Academic Press, pp 107\u2013129","DOI":"10.1016\/B978-0-443-27523-4.00023-8"},{"issue":"1","key":"2147_CR28","doi-asserted-by":"publisher","DOI":"10.1186\/s40246-024-00697-3","volume":"18","author":"F Yao","year":"2024","unstructured":"Yao F, Hao N, Li D, Zhang W, Zhou J, Qiu Z, Mao A, Meng W, Liu J (2024) Long-read sequencing enables comprehensive molecular genetic diagnosis of Fabry disease. Hum Genomics 18(1):133","journal-title":"Hum Genomics"},{"key":"2147_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s00467-025-06702-8","author":"G Butler","year":"2025","unstructured":"Butler G, Satkumaran S, Shanks J, Segal A, Kausman J, Wilkins E, Elbaum Y, Buttery J, Quinlan C (2025) Cracking the code: an integrated electronic medical record approach to early diagnosis of genetic kidney disease in children with microscopic haematuria. Pediatr Nephrol. https:\/\/doi.org\/10.1007\/s00467-025-06702-8","journal-title":"Pediatr Nephrol"},{"issue":"3","key":"2147_CR30","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1007\/s00277-025-06277-2","volume":"104","author":"L Huang","year":"2025","unstructured":"Huang L, Zhang Q, Ye Y, Long Y, Huang H, Niu C, Lin B, Zeng L, Wang Y, Dai T, Hua X (2025) Rapid detection of genetic modifiers of \u03b2-thalassemia based on MALDI-TOF MS. Ann Hematol 104(3):1481\u20131492","journal-title":"Ann Hematol"},{"key":"2147_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2024.102457","volume":"83","author":"M Nasreen","year":"2024","unstructured":"Nasreen M, Singh SK (2024) BPMT: a hybrid model for secure and effective electronic medical record management system. J Comput Sci 83:102457","journal-title":"J Comput Sci"},{"key":"2147_CR32","volume":"85","author":"K Ashok","year":"2024","unstructured":"Ashok K, Gopikrishnan S (2024) A hybrid secure signcryption algorithm for data security in an internet of medical things environment. J Inf Secur Appl 85:103836","journal-title":"J Inf Secur Appl"},{"key":"2147_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2024.102295","volume":"64","author":"Q Liu","year":"2024","unstructured":"Liu Q, Zhou F, Chen H (2024) Secure medical data on cloud storage via DNA homomorphic encryption technique. Phys Commun 64:102295","journal-title":"Phys Commun"},{"key":"2147_CR34","doi-asserted-by":"crossref","unstructured":"Saranya A, Naresh R, Karuppiah S, Jenifer M (2024) Development of trust-based authorization and authentication framework for secure electronic health payment in cloud environment. In: Soft Computing, pp 1\u201316","DOI":"10.1007\/s00500-023-09514-w"},{"key":"2147_CR35","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2025.062910","author":"Y Zhang","year":"2025","unstructured":"Zhang Y, Wang XA, Jiang W, Zhou M, Xu X, Liu H (2025) An efficient and secure data audit scheme for cloud-based EHRs with recoverable and batch auditing. Comput Mater Contin. https:\/\/doi.org\/10.32604\/cmc.2025.062910","journal-title":"Comput Mater Contin"},{"key":"2147_CR36","volume":"90","author":"X Liu","year":"2025","unstructured":"Liu X, Wang H, Zhang B, Zhang Y, Zhang B (2025) Secure medical data sharing with verifiable outsourced decryption and cryptographic reverse firewalls. J Inf Secur Appl 90:104050","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"2147_CR37","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-025-02994-w","volume":"25","author":"L Lilli","year":"2025","unstructured":"Lilli L, Santoro M, Masiello V, Patarnello S, Tagliaferri L, Marazzi F, Capocchiano ND (2025) MISTIC: a novel approach for metastasis classification in Italian electronic health records using transformers. BMC Med Inform Decis Mak 25(1):160","journal-title":"BMC Med Inform Decis Mak"},{"issue":"5","key":"2147_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-025-03961-y","volume":"6","author":"VV Leelavathi","year":"2025","unstructured":"Leelavathi VV, Rashmi Priyadarshini BK, Puttegowda K (2025) Securing telehealth electronic health records with adaptive chaotic encryption and dynamic key generation. SN Comput Sci 6(5):1\u201319","journal-title":"SN Comput Sci"},{"key":"2147_CR39","doi-asserted-by":"crossref","unstructured":"Jin B, Chen X, Xiong J, Li X, Lin L, Yao Z (2024) BCAS: Blockchain-based secure access and sharing scheme for EHR data. In: Digital Communications and Networks","DOI":"10.1016\/j.dcan.2024.10.012"},{"key":"2147_CR40","doi-asserted-by":"publisher","DOI":"10.2174\/0118750362316814240820051945","author":"MP Singh","year":"2024","unstructured":"Singh MP, Singh J, Ravi V, Gupta P, Alahmadi TJ, Singh P, Shivahare BD, Verma M (2024) Impact and implications of quantum computing on blockchain-based electronic health record systems. Open Bioinform J. https:\/\/doi.org\/10.2174\/0118750362316814240820051945","journal-title":"Open Bioinform J"},{"key":"2147_CR41","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1016\/j.aej.2024.08.115","volume":"107","author":"S Kanwal","year":"2024","unstructured":"Kanwal S, Inam S, Nawaz Z, Hajjej F, Alfraihi H, Ibrahim M (2024) Securing blockchain-enabled smart health care image encryption framework using Tinkerbell Map. Alexandria Eng J 107:711\u2013729","journal-title":"Alexandria Eng J"},{"key":"2147_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2024.141371","volume":"447","author":"X Liu","year":"2024","unstructured":"Liu X, Shah R, Shandilya A, Shah M, Pandya A (2024) A systematic study on integrating blockchain in healthcare for electronic health record management and tracking medical supplies. J Clean Prod 447:141371","journal-title":"J Clean Prod"},{"issue":"1","key":"2147_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-024-02120-9","volume":"48","author":"G Wu","year":"2024","unstructured":"Wu G, Wang H, Yang Z, He D, Chan S (2024) Electronic health records sharing based on consortium blockchain. J Med Syst 48(1):106","journal-title":"J Med Syst"},{"issue":"3","key":"2147_CR44","first-page":"1581","volume":"16","author":"V Kumar","year":"2024","unstructured":"Kumar V, Ali R, Sharma PK (2024) A secure blockchain-assisted authentication framework for electronic health records. Int J Inf Technol 16(3):1581\u20131593","journal-title":"Int J Inf Technol"},{"issue":"6","key":"2147_CR45","doi-asserted-by":"publisher","first-page":"5372","DOI":"10.1109\/TNET.2024.3462539","volume":"32","author":"H Luo","year":"2024","unstructured":"Luo H, Zhang Q, Sun G, Yu H, Niyato D (2024) Symbiotic blockchain consensus: cognitive backscatter communications-enabled wireless blockchain consensus. IEEE ACM Trans Netw 32(6):5372\u20135387. https:\/\/doi.org\/10.1109\/TNET.2024.3462539","journal-title":"IEEE ACM Trans Netw"},{"issue":"3","key":"2147_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3584663","volume":"19","author":"W Xia","year":"2023","unstructured":"Xia W, Pu L, Zou X, Shilane P, Li S, Zhang H, Wang X (2023) The design of fast and lightweight resemblance detection for efficient post-deduplication delta compression. ACM Trans Storage 19(3):1\u201330. https:\/\/doi.org\/10.1145\/3584663","journal-title":"ACM Trans Storage"},{"key":"2147_CR47","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2025.1635475","volume":"13","author":"F Hu","year":"2025","unstructured":"Hu F, Yang H, Qiu L, Wang X, Ren Z, Wei S, Zhou H, Chen Y, Hu H (2025) Innovation networks in the advanced medical equipment industry: supporting regional digital health systems from a local\u2013national perspective. Front Public Health 13:1635475. https:\/\/doi.org\/10.3389\/fpubh.2025.1635475","journal-title":"Front Public Health"},{"key":"2147_CR48","doi-asserted-by":"publisher","first-page":"5647","DOI":"10.1109\/TIFS.2025.3574959","volume":"20","author":"G Xu","year":"2025","unstructured":"Xu G, Fan X, Xu S, Cao Y, Chen X, Shang T, Chen Xiu-Bo, Yu S (2025) Anonymity-enhanced sequential multi-signer ring signature for secure medical data sharing in IoMT. IEEE Trans Inf Forensics Secur 20:5647\u20135662. https:\/\/doi.org\/10.1109\/TIFS.2025.3574959","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2147_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2024.108080","volume":"247","author":"H Li","year":"2024","unstructured":"Li H, Wang Z, Guan Z, Miao J, Li W, Yu P, Molina Jimenez C (2024) UCFNNet: ulcerative colitis evaluation based on fine-grained lesion learner and noise suppression gating. Comput Methods Programs Biomed 247:108080. https:\/\/doi.org\/10.1016\/j.cmpb.2024.108080","journal-title":"Comput Methods Programs Biomed"},{"issue":"2","key":"2147_CR50","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1109\/TIT.2023.3340147","volume":"70","author":"M Zhang","year":"2024","unstructured":"Zhang M, Wei E, Berry R, Huang J (2024) Age-dependent differential privacy. IEEE Trans Inf Theory 70(2):1300\u20131319. https:\/\/doi.org\/10.1109\/TIT.2023.3340147","journal-title":"IEEE Trans Inf Theory"},{"key":"2147_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cobeha.2024.101431","volume":"59","author":"Y Gan","year":"2024","unstructured":"Gan Y, Huang H, Wu X, Meng M (2024) What doesn\u2019t kill us makes us stronger: insights from neuroscience studies and molecular genetics. Curr Opin Behav Sci 59:101431. https:\/\/doi.org\/10.1016\/j.cobeha.2024.101431","journal-title":"Curr Opin Behav Sci"},{"issue":"3","key":"2147_CR52","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1109\/TKDE.2024.3523107","volume":"37","author":"C Fu","year":"2025","unstructured":"Fu C, Liu G, Yuan K, Wu J (2025) Nowhere to H2IDE: fraud detection from multi-relation graphs via disentangled homophily and heterophily identification. IEEE Trans Knowl Data Eng 37(3):1380\u20131393. https:\/\/doi.org\/10.1109\/TKDE.2024.3523107","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"11","key":"2147_CR53","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkaf533","volume":"53","author":"Y Wang","year":"2025","unstructured":"Wang Y, Shen Y, Li J, Wang T, Peng J, Shang X (2025) Enhanced RNA secondary structure prediction through integrative deep learning and structural context analysis. Nucleic Acids Res 53(11):gkaf533. https:\/\/doi.org\/10.1093\/nar\/gkaf533","journal-title":"Nucleic Acids Res"},{"key":"2147_CR54","volume":"91","author":"D Zhu","year":"2025","unstructured":"Zhu D, Zhao Z, Zhao J, Song L, Zheng J (2025) QMDS: QKD-based multi-index data secure sharing solution on blockchain. J Inf Secur Appl 91:104077","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"2147_CR55","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-95531-8","volume":"15","author":"SB Othman","year":"2025","unstructured":"Othman SB, Getahun M (2025) Leveraging blockchain and IoMT for secure and interoperable electronic health records. Sci Rep 15(1):12358","journal-title":"Sci Rep"},{"issue":"1","key":"2147_CR56","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-86658-9","volume":"15","author":"M Natarajan","year":"2025","unstructured":"Natarajan M, Bharathi A, Varun CS, Selvarajan S (2025) Quantum secure patient login credential system using blockchain for electronic health record sharing framework. Sci Rep 15(1):4023","journal-title":"Sci Rep"},{"key":"2147_CR57","volume":"26","author":"AWC D\u2019Layla","year":"2025","unstructured":"D\u2019Layla AWC, De La Croix NJ, Ahmad T, Han F (2025) EHR-protect: a steganographic framework based on data-transformation to protect electronic health records. Intell Syst Appl 26:200493","journal-title":"Intell Syst Appl"},{"key":"2147_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100750","volume":"57","author":"M Adil","year":"2025","unstructured":"Adil M, Farouk A, Ali A, Song H, Jin Z (2025) Securing tomorrow of next-generation technologies with biometrics, state-of-the-art techniques, open challenges, and future research directions. Comput Sci Rev 57:100750","journal-title":"Comput Sci Rev"},{"key":"2147_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2025.100395","volume":"26","author":"F Naveed","year":"2025","unstructured":"Naveed F, Masih A, Mahmood J, Ahmed M, Ali A, Saddiqa A, Abdulnabi MSH, Agbozo E (2025) Sustainable AI for plant disease classification using ResNet18 in few-shot learning. Array 26:100395","journal-title":"Array"},{"issue":"3","key":"2147_CR60","doi-asserted-by":"publisher","first-page":"22287","DOI":"10.48084\/etasr.10287","volume":"15","author":"AA Al-Maari","year":"2025","unstructured":"Al-Maari AA, Abdulnabi M, Nathan Y, Ali A, Ali U, Khan M (2025) Optimized credit card fraud detection leveraging ensemble machine learning methods. Eng Technol Appl Sci Res 15(3):22287\u201322294","journal-title":"Eng Technol Appl Sci Res"},{"key":"2147_CR61","doi-asserted-by":"publisher","DOI":"10.3389\/fmed.2025.1545528","volume":"12","author":"R Ullah","year":"2025","unstructured":"Ullah R, Sarwar N, Alatawi MN, Alsadhan AA, Salamah Alwageed H, Khan M, Ali A (2025) Advancing personalized diagnosis and treatment using deep learning architecture. Front Med 12:1545528","journal-title":"Front Med"},{"issue":"1","key":"2147_CR62","doi-asserted-by":"publisher","first-page":"19776","DOI":"10.48084\/etasr.9148","volume":"15","author":"S Hussain","year":"2025","unstructured":"Hussain S, Sarwar N, Ali A, Khan H, Din I, Alqahtani AM, Shabir M, Ali A (2025) An enhanced random forest (ERF)-based machine learning framework for resampling, prediction, and classification of mobile applications using textual features. Eng Technol Appl Sci Res 15(1):19776\u201319781","journal-title":"Eng Technol Appl Sci Res"},{"key":"2147_CR63","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/JIOT.2024.3486659","volume":"12","author":"M Adil","year":"2024","unstructured":"Adil M, Farouk A, Abulkasim H, Ali A, Song H, Jin Z (2024) NG-ICPS: next generation industrial-CPS, security threats in the era of artificial intelligence, open challenges with future research directions. IEEE Internet Things J 12:1343\u20131367","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2147_CR64","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TGCN.2024.3396454","volume":"8","author":"AA Khan","year":"2024","unstructured":"Khan AA, Laghari AA, Baqasah AM, Alroobaea R, Gadekallu TR, Sampedro GA, Zhu Y (2024) ORAN-B5G: a next-generation open radio access network architecture with machine learning for beyond 5G in industrial 5.0. IEEE Trans Green Commun Netw 8(3):1026\u20131036","journal-title":"IEEE Trans Green Commun Netw"},{"key":"2147_CR65","doi-asserted-by":"crossref","unstructured":"Khan AA, Laghari AA, Alsafyani M, Baqasah AM, Kryvinska N, Almadhor A, Alroobaea R, Gregus M Jr (2025) A cost-effective approach using generative AI and gamification to enhance biomedical treatment and real-time biosensor monitoring. Sci Rep 15(1):17305","DOI":"10.1038\/s41598-025-01408-1"},{"issue":"1","key":"2147_CR66","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-05130-w","volume":"15","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Alroobaea R, Baqasah AM, Alsafyani M, Alsufyani H, Ullah S (2025) A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing. Sci Rep 15(1):19856","journal-title":"Sci Rep"},{"key":"2147_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.109838","volume":"141","author":"AA Khan","year":"2025","unstructured":"Khan AA, Yang J, Laghari AA, Baqasah AM, Alroobaea R, Ku CS, Alizadehsani R, Acharya UR, Por LY (2025) BAIoT-EMS: Consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng Appl Artif Intell 141:109838","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"2147_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43621-025-01124-w","volume":"6","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Inam SA, Ullah S, Nadeem L (2025) A review on artificial intelligence thermal fluids and the integration of energy conservation with blockchain technology. Discov Sustain 6(1):1\u201318","journal-title":"Discov Sustain"},{"issue":"1","key":"2147_CR69","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/s10791-025-09550-0","volume":"28","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Inam SA, Ullah S, Shahzad M, Syed D (2025) A survey on multimedia-enabled deepfake detection: state-of-the-art tools and techniques, emerging trends, current challenges & limitations, and future directions. Discov Comput 28(1):48","journal-title":"Discov Comput"},{"issue":"1","key":"2147_CR70","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-55424-8","volume":"14","author":"D Moynihan","year":"2024","unstructured":"Moynihan D, Monaco S, Ting TW, Narasimhalu K, Hsieh J, Kam S, Lim JY, Lim WK, Davila S, Bylstra Y, Balakrishnan ID (2024) Analysis and visualisation of electronic health records data to identify undiagnosed patients with rare genetic diseases. Sci Rep 14(1):5056","journal-title":"Sci Rep"},{"key":"2147_CR71","doi-asserted-by":"crossref","unstructured":"Bikku T, Pujari JJ, Satyasree KPNV, Thota S, Joseph S (2025) Deep learning-based ovarian cancer detection from histopathology images. Quality & Quantity, pp 1\u201315","DOI":"10.1007\/s11135-025-02315-3"},{"issue":"2","key":"2147_CR72","doi-asserted-by":"publisher","DOI":"10.3390\/diagnostics14020128","volume":"14","author":"PN Srinivasu","year":"2024","unstructured":"Srinivasu PN, Sirisha U, Sandeep K, Praveen SP, Maguluri LP, Bikku T (2024) An interpretable approach with explainable AI for heart stroke prediction. Diagnostics 14(2):128","journal-title":"Diagnostics"},{"issue":"1","key":"2147_CR73","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-95836-8","volume":"15","author":"S Shah","year":"2025","unstructured":"Shah S, Sarwar N, Salam A, Amin F, Ullah F, Khan A, de la Torre I, Villar MG, Garay H (2025) A flexible and lightweight signcryption scheme for underwater wireless sensor networks. Sci Rep 15(1):13511","journal-title":"Sci Rep"},{"key":"2147_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123715","author":"K Hu","year":"2024","unstructured":"Hu K, Wang M, Ma X, Chen J, Wang X, Wang X (2024) Learning-based image steganography and watermarking: a survey. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2024.123715","journal-title":"Expert Syst Appl"},{"issue":"4","key":"2147_CR75","doi-asserted-by":"publisher","first-page":"4870","DOI":"10.1007\/s11227-023-05654-w","volume":"80","author":"N Sharma","year":"2024","unstructured":"Sharma N, Rohilla R (2024) A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management. J Supercomput 80(4):4870\u20134913","journal-title":"J Supercomput"},{"key":"2147_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123111","volume":"245","author":"Y Chen","year":"2024","unstructured":"Chen Y, Xia R, Yang K, Zou K (2024) MICU: Image super-resolution via multi-level information compensation and U-net. Expert Syst Appl 245:123111","journal-title":"Expert Syst Appl"},{"key":"2147_CR77","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.103726","volume":"25","author":"R Rakshitha","year":"2025","unstructured":"Rakshitha R, Srinath S, Rashmi S, Poornima BV (2025) Integrated pixel-level crack detection and quantification using an ensemble of advanced U-net architectures. Results Eng 25:103726","journal-title":"Results Eng"},{"issue":"3","key":"2147_CR78","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-024-01320-0","volume":"30","author":"S Lei","year":"2024","unstructured":"Lei S, Song J, Wang T, Wang F, Yan Z (2024) Attention U-net based on multi-scale feature extraction and WSDAN data augmentation for video anomaly detection. Multimedia Syst 30(3):118","journal-title":"Multimedia Syst"},{"key":"2147_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2024.102800","volume":"150","author":"X Shu","year":"2024","unstructured":"Shu X, Wang J, Zhang A, Shi J, Wu XJ (2024) Csca U-net: a channel and space compound attention CNN for medical image segmentation. Artif Intell Med 150:102800","journal-title":"Artif Intell Med"},{"issue":"2","key":"2147_CR80","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.11591\/ijai.v14.i2.pp1673-1682","volume":"14","author":"W Aribowo","year":"2025","unstructured":"Aribowo W, Abualigah L, Oliva D, Mzili T, Sabo A (2025) Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor. IAES International Journal of Artificial Intelligence (IJ-AI) 14(2):1673\u20131682","journal-title":"IAES International Journal of Artificial Intelligence (IJ-AI)"},{"key":"2147_CR81","doi-asserted-by":"publisher","DOI":"10.1177\/15245004241309932","author":"H Afzal","year":"2025","unstructured":"Afzal H, Deshpande S, Carlini J (2025) Glowing beyond shades: unveiling the psychosocial correlates of skin lightening product choice\u2013a systematic review. Soc Mark Q. https:\/\/doi.org\/10.1177\/15245004241309932","journal-title":"Soc Mark Q"},{"issue":"3","key":"2147_CR82","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1111\/jnu.13044","volume":"57","author":"RUP Sugathapala","year":"2025","unstructured":"Sugathapala RUP, Balasuriya A, Gillespie BM, Chaboyer W, Latimer S (2025) Evidence-based teaching strategies for assessing pressure injuries in older nursing home residents with darker skin tones. J Nurs Sch 57(3):404\u2013411","journal-title":"J Nurs Sch"},{"issue":"2","key":"2147_CR83","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ada58d","volume":"100","author":"C Daka","year":"2025","unstructured":"Daka C, Bhattacharyya S (2025) Quantum neural network-inspired variational quantum circuit for simulating diamond 14NV center Hamiltonian with a proximal 13C isotope. Phys Scr 100(2):025111","journal-title":"Phys Scr"},{"key":"2147_CR84","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2025.129404","volume":"623","author":"E Acar","year":"2025","unstructured":"Acar E, Y\u0131lmaz \u0130 (2025) Unlocking the high dimensional\u2019potential: comparative analysis of qubits and qutrits in variational quantum neural networks. Neurocomputing 623:129404","journal-title":"Neurocomputing"},{"issue":"1","key":"2147_CR85","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-024-55220-y","volume":"16","author":"SY Ma","year":"2025","unstructured":"Ma SY, Wang T, Laydevant J, Wright LG, McMahon PL (2025) Quantum-limited stochastic optical neural networks operating at a few quanta per activation. Nat Commun 16(1):359","journal-title":"Nat Commun"},{"key":"2147_CR86","doi-asserted-by":"publisher","DOI":"10.1016\/j.mehy.2020.109691","volume":"139","author":"S Karakus","year":"2020","unstructured":"Karakus S, Avci E (2020) A new image steganography method with optimum pixel similarity for data hiding in medical images. Med Hypotheses 139:109691","journal-title":"Med Hypotheses"},{"key":"2147_CR87","doi-asserted-by":"publisher","first-page":"23393","DOI":"10.1007\/s11042-020-10224-w","volume":"80","author":"A AbdelRaouf","year":"2021","unstructured":"AbdelRaouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimed Tools Appl 80:23393\u201323417","journal-title":"Multimed Tools Appl"},{"key":"2147_CR88","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1007\/s12652-022-04366-y","volume":"14","author":"MA Hameed","year":"2023","unstructured":"Hameed MA, Abdel-Aleem OA, Hassaballah M (2023) A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J Ambient Intell Human Comput 14:4639\u20134657","journal-title":"J Ambient Intell Human Comput"},{"issue":"1","key":"2147_CR89","first-page":"313","volume":"38","author":"AZ Hussain","year":"2024","unstructured":"Hussain AZ, Khodher MAA (2024) Securing medical images using chaotic map encryption and LSB steganography. Rev Intell Artif 38(1):313\u2013321","journal-title":"Rev Intell Artif"},{"key":"2147_CR90","first-page":"379","volume":"5","author":"MA Hameed","year":"2024","unstructured":"Hameed MA, Hassaballah M, Abdelazim R, Sahu AK (2024) A novel medical steganography technique based on adversarial neural cryptography and digital signature using least significant bit replacement. Int J Cogn Comput Eng 5:379\u2013397","journal-title":"Int J Cogn Comput Eng"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02147-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02147-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02147-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T12:01:57Z","timestamp":1765627317000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02147-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":90,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2147"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02147-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"3 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"325"}}