{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:45:47Z","timestamp":1761677147475,"version":"3.40.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T00:00:00Z","timestamp":1672012800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T00:00:00Z","timestamp":1672012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12652-022-04510-8","type":"journal-article","created":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T13:07:41Z","timestamp":1672060061000},"page":"2631-2643","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["CADEN: cellular automata and DNA based secure framework for privacy preserving in IoT based healthcare"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0798-0158","authenticated-orcid":false,"given":"Nasir N.","family":"Hurrah","sequence":"first","affiliation":[]},{"given":"Ekram","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Uzma","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,26]]},"reference":[{"issue":"4","key":"4510_CR1","first-page":"1594","volume":"9","author":"A Anand","year":"2021","unstructured":"Anand A, Singh AK (2021) Health record security through multiple watermarking on fused medical images. IEEE Trans Comp Soc Syst 9(4):1594\u20131603","journal-title":"IEEE Trans Comp Soc Syst"},{"key":"4510_CR2","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ijleo.2019.04.074","volume":"187","author":"MJ Barani","year":"2019","unstructured":"Barani MJ, Valandar MY, Ayubi P (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187:205\u2013222","journal-title":"Optik"},{"issue":"1","key":"4510_CR3","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1007\/s12652-020-02135-3","volume":"12","author":"S Bhalerao","year":"2021","unstructured":"Bhalerao S, Ansari IA, Kumar A (2021) A secure image watermarking for tamper detection and localization. J Ambient Intell Humaniz Comput 12(1):1057\u20131068","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4510_CR4","unstructured":"CIS Report (2022) Data breaches: in the healthcare sector. Available at https:\/\/www.cisecurity.org\/insights\/blog\/data-breaches-in-the-healthcare-sector"},{"key":"4510_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.jvcir.2017.09.017","volume":"50","author":"BB Haghighi","year":"2018","unstructured":"Haghighi BB, Taherinia AH, Harati A (2018) TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J Vis Commun Image Represent 50:49\u201364","journal-title":"J Vis Commun Image Represent"},{"key":"4510_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101989","volume":"95","author":"NN Hurrah","year":"2019","unstructured":"Hurrah NN, Parah SA, Sheikh JA, Al-Turjman F, Muhammad K (2019a) Secure data transmission framework for confidentiality in IoTs. Ad Hoc Netw 95:101989","journal-title":"Ad Hoc Netw"},{"key":"4510_CR7","volume-title":"Handbook of multimedia information security: techniques and apps","author":"NN Hurrah","year":"2019","unstructured":"Hurrah NN, Parah SA, Sheikh JA (2019b) A secure medical image watermarking technique for E-healthcare applications. In: Singh AK, Mohan A (eds) Handbook of multimedia information security: techniques and apps. Springer, Cham"},{"issue":"5","key":"4510_CR8","doi-asserted-by":"publisher","first-page":"3630","DOI":"10.1109\/TII.2020.3014158","volume":"17","author":"NN Hurrah","year":"2021","unstructured":"Hurrah NN, Loan NA, Parah SA, Sheikh JA, Muhammad K, de Macedo ARL, de Albuquerque VHC (2021) INDFORG: industrial forgery detection using automatic rotation angle detection and correction. IEEE Trans Ind Inf 17(5):3630\u20133639","journal-title":"IEEE Trans Ind Inf"},{"issue":"4","key":"4510_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-021-04387-w","volume":"3","author":"M Kabir","year":"2021","unstructured":"Kabir M (2021) An efficient low bit rate image watermarking and tamper detection for image authentication. SN Appl Sci 3(4):1\u201317","journal-title":"SN Appl Sci"},{"issue":"3","key":"4510_CR10","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.3390\/app11031146","volume":"11","author":"C Kim","year":"2021","unstructured":"Kim C, Yang CN (2021) Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches. Appl Sci 11(3):1146","journal-title":"Appl Sci"},{"key":"4510_CR11","doi-asserted-by":"publisher","first-page":"11259","DOI":"10.1007\/s11042-022-11974-5","volume":"81","author":"S Koul","year":"2022","unstructured":"Koul S, Kumar M, Khurana SS, Mushtaq F, Kumar K (2022) An efficient approach for copy-move image forgery detection using convolution neural network. Multimedia Tools Appl 81:11259\u201311277","journal-title":"Multimedia Tools Appl"},{"key":"4510_CR12","doi-asserted-by":"publisher","DOI":"10.1108\/CW-07-2020-0137","author":"V Kumarasamy","year":"2021","unstructured":"Kumarasamy V, Ramasamy VK, Chinnaraj G (2021) Systematic design of multi-objective enhanced genetic algorithm optimized fractional order PID controller for sensorless brushless DC motor drive. Circuit World. https:\/\/doi.org\/10.1108\/CW-07-2020-0137","journal-title":"Circuit World"},{"key":"4510_CR13","doi-asserted-by":"publisher","first-page":"18470","DOI":"10.1109\/ACCESS.2022.3144322","volume":"10","author":"CC Lin","year":"2022","unstructured":"Lin CC, Chang CC, Kao WJ, Chang JF (2022) Efficient electronic patient information hiding scheme with tamper detection function for medical images. IEEE Access 10:18470\u201318485","journal-title":"IEEE Access"},{"issue":"1","key":"4510_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-021-27846-9","volume":"13","author":"LC Meiser","year":"2022","unstructured":"Meiser LC, Nguyen BH, Chen YJ, Nivala J, Strauss K, Ceze L, Grass RN (2022) Synthetic DNA applications in information technology. Nat Commun 13(1):1\u201313","journal-title":"Nat Commun"},{"issue":"3","key":"4510_CR15","doi-asserted-by":"publisher","first-page":"2741","DOI":"10.1109\/TSG.2020.3042897","volume":"12","author":"F Milano","year":"2020","unstructured":"Milano F, Gomez-Exposito A (2020) Detection of cyber-attacks of power systems through Benford\u2019s law. IEEE Trans Smart Grid 12(3):2741\u20132744","journal-title":"IEEE Trans Smart Grid"},{"key":"4510_CR16","unstructured":"OPENi medical image database from National Laboratory of Medicine (2022). Available at https:\/\/openi.nlm.nih.gov\/"},{"key":"4510_CR17","doi-asserted-by":"publisher","first-page":"7323","DOI":"10.1007\/s11042-021-11799-8","volume":"81","author":"P Ping","year":"2022","unstructured":"Ping P, Zhang X, Yang X, Hashems YAA (2022) A novel medical image encryption based on cellular automata with ROI position embedded. Multimedia Tools Appl 81:7323\u20137343","journal-title":"Multimedia Tools Appl"},{"key":"4510_CR18","doi-asserted-by":"publisher","first-page":"168864","DOI":"10.1016\/j.ijleo.2022.168864","volume":"258","author":"HE Rostam","year":"2022","unstructured":"Rostam HE, Motameni H, Enayatifar R (2022) Privacy-preserving in the Internet of Things based on steganography and chaotic functions. Optik 258:168864","journal-title":"Optik"},{"key":"4510_CR19","doi-asserted-by":"publisher","first-page":"11605","DOI":"10.1007\/s11042-022-12273-9","volume":"81","author":"PV Sanivarapu","year":"2022","unstructured":"Sanivarapu PV (2022) Adaptive tamper detection watermarking scheme for medical images in transform domain. Multimedia Tools Appl 81:11605\u201311619","journal-title":"Multimedia Tools Appl"},{"key":"4510_CR20","doi-asserted-by":"crossref","unstructured":"Schaefer G, Stich M (2003) UCID: an uncompressed color image database. In: Storage and retrieval methods and applications for multimedia 2004, vol 5307. SPIE, pp 472\u2013480","DOI":"10.1117\/12.525375"},{"key":"4510_CR21","doi-asserted-by":"publisher","first-page":"96321","DOI":"10.1109\/ACCESS.2021.3094563","volume":"9","author":"Y Sha","year":"2021","unstructured":"Sha Y, Cao Y, Yan H, Gao X, Mou J (2021) An image encryption scheme based on IAVL permutation scheme and DNA operations. IEEE Access 9:96321\u201396336","journal-title":"IEEE Access"},{"issue":"2","key":"4510_CR22","doi-asserted-by":"publisher","first-page":"8860","DOI":"10.1109\/TII.2022.3193708","volume":"18","author":"SHA Shah","year":"2022","unstructured":"Shah SHA, Koundal D, Sai V, Rani S (2022) 5G edge computing enabled internet of medical things. IEEE Trans Ind Inf 18(2):8860\u20138863","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"4510_CR23","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s11042-015-3010-x","volume":"76","author":"D Singh","year":"2017","unstructured":"Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools Appl 76(1):953\u2013977","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"4510_CR24","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1109\/TII.2021.3070544","volume":"18","author":"Y Sun","year":"2021","unstructured":"Sun Y, Liu J, Yu K, Alazab M, Lin K (2021) PMRSS: privacy-preserving medical record searching scheme for intelligent diagnosis in IoT healthcare. IEEE Trans Ind Inf 18(3):1981\u20131990","journal-title":"IEEE Trans Ind Inf"},{"key":"4510_CR25","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1109\/TIFS.2020.3025438","volume":"16","author":"W Tang","year":"2020","unstructured":"Tang W, Li B, Barni M, Li J, Huang J (2020) An automatic cost learning framework for image steganography using deep reinforcement learning. IEEE Trans Inf Forensics Secur 16:952\u2013967","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4510_CR26","unstructured":"USC-SIPI Image Database from University of South California (1977). Available at https:\/\/sipi.usc.edu\/database\/"},{"key":"4510_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.rico.2021.100032","volume":"4","author":"K Vanchinathan","year":"2021","unstructured":"Vanchinathan K, Selvaganesan N (2021) Adaptive fractional order PID controller tuning for brushless DC motor using artificial bee colony algorithm. Results Control Optim 4:100032","journal-title":"Results Control Optim"},{"issue":"9","key":"4510_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/2050-7038.12991","volume":"31","author":"K Vanchinathan","year":"2021","unstructured":"Vanchinathan K, Valluvan KR, Gnanavel C, Gokul C (2021) Design methodology and experimental verification of intelligent speed controllers for sensorless permanent magnet brushless DC motor: intelligent speed controllers for electric motor. Int Trans Electr Energy Syst 31(9):e12991","journal-title":"Int Trans Electr Energy Syst"},{"key":"4510_CR29","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.dsp.2015.05.006","volume":"43","author":"T Xiang","year":"2015","unstructured":"Xiang T, Hu J, Sun J (2015) Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Process 43:28\u201337","journal-title":"Digital Signal Process"},{"issue":"12","key":"4510_CR30","doi-asserted-by":"publisher","first-page":"8885","DOI":"10.1109\/TII.2022.3159863","volume":"18","author":"F Yan","year":"2022","unstructured":"Yan F, Huang H, Yu X (2022) A multi-watermarking scheme for verifying medical image integrity and authenticity in the internet of medical things. IEEE Trans Ind Inf 18(12):8885\u20138894","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"4510_CR31","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang K, Ni J, Yang K, Liang X, Ren J, Shen XS (2017) Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag 55(1):122\u2013129","journal-title":"IEEE Commun Mag"},{"issue":"11","key":"4510_CR32","doi-asserted-by":"publisher","first-page":"8836","DOI":"10.1109\/JIOT.2020.3037194","volume":"8","author":"Y Zhao","year":"2020","unstructured":"Zhao Y, Zhao J, Yang M, Wang T, Wang N, Lyu L, Lam KY (2020) Local differential privacy-based federated learning for internet of things. IEEE Internet Things J 8(11):8836\u20138853","journal-title":"IEEE Internet Things J"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04510-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-022-04510-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04510-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:26:32Z","timestamp":1744158392000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-022-04510-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,26]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["4510"],"URL":"https:\/\/doi.org\/10.1007\/s12652-022-04510-8","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2022,12,26]]},"assertion":[{"value":"21 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}