{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:22:30Z","timestamp":1756311750831,"version":"3.41.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,2,15]],"date-time":"2016-02-15T00:00:00Z","timestamp":1455494400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Brain Inf."],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s40708-016-0032-8","type":"journal-article","created":{"date-parts":[[2016,2,15]],"date-time":"2016-02-15T12:27:07Z","timestamp":1455539227000},"page":"39-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Diagonal queue medical image steganography with Rabin cryptosystem"],"prefix":"10.1007","volume":"3","author":[{"given":"Mamta","family":"Jain","sequence":"first","affiliation":[]},{"given":"Saroj Kumar","family":"Lenka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,15]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Randolph C, Barrows JR, Paul MD, Clayton D (1996) Review: privacy, confidentiality and electronic medical records. J Am Med Inform Assoc 3(2):139\u2013148. http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC116296\/pdf\/0030139.pdf","DOI":"10.1136\/jamia.1996.96236282"},{"key":"32_CR2","unstructured":"Summary of the HIPAA Privacy Rule (2000) United States Department of Health and Human Services, pp1\u201319. http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/understanding\/summary\/privacysummary.pdf"},{"key":"32_CR3","unstructured":"Raman RS, Reddy R, Jagannathan V, Reddy S, Cleetus KJ, Srinivas K (1997) A strategy for the development of secure telemedicine applications. In: Proceedings of the AMIA annual fall symposium,\u00a0pp 344\u2013348. http:\/\/www.ncbi.nlm.nih.gov\/pubmed\/9357645"},{"key":"32_CR4","unstructured":"Li B et al. (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimed Signal Process (ISSN: 2073-4212) 2(2):142\u2013172. http:\/\/bit.kuas.edu.tw\/~jihmsp\/2011\/vol2\/JIH-MSP-2011-03-005.pdf"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Ross J, Anderson F, Petitcolas AP (1998) On the limits of steganography. IEEE J Select Areas Commun Special Issue Copyright Privacy Prot (ISSN: 0733-8716) 6(4):474\u2013481. https:\/\/www.cl.cam.ac.uk\/~rja14\/Papers\/jsac98-limsteg.pdf","DOI":"10.1109\/49.668971"},{"key":"32_CR6","unstructured":"Mohammad ABY, Jantan A (2008) A new steganography approach for image encryption exchange by using the LSB insertion. IJCSNS Int J Comput Sci Netw Secur 8(6):247\u2013254. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.371.9525&rep=rep1&type=pdf"},{"issue":"12","key":"32_CR7","doi-asserted-by":"crossref","first-page":"2040","DOI":"10.1109\/TIP.2005.859370","volume":"14","author":"A Martin","year":"2005","unstructured":"Martin A, Sapiro G, Seroussi G (2005) Is image steganography natural. IEEE Trans Image Process 14(12):2040\u20132050","journal-title":"IEEE Trans Image Process"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Juneja M, Sandhu PS (2009) Designing of robust steganography technique based on LSB insertion and encryption. In: Proceedings of international conference on advances in recent technologies in communication and computing pp 302\u2013305 (ISBN: 978-0-7695-38457). http:\/\/dl.acm.org\/citation.cfm?id=1673335","DOI":"10.1109\/ARTCom.2009.228"},{"key":"32_CR9","unstructured":"Gandharba S, Lenka SK (2015) A novel steganography technique by mapping words with LSB array. Int J Signal Imaging Syst Eng Indersci 8(1\u20132) (ISSN:\u00a01748-0701). www.inderscience.com\/link.php?id=67052"},{"key":"32_CR10","unstructured":"Gandharba S, Lenka SK (2012) LSB array based image steganography technique by exploring the four least significant bits. In: Proceedings of 4th international conference, Obcom 2011, CCIS, vol 2(270), pp 479\u2013488 (ISBN: 978-3-642-29216-3). doi: 10.1007\/978-3-642-29216-3_52.pdf )"},{"issue":"9-10","key":"32_CR11","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel value differencing. Pattern Recogn Lett 24(9-10):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"3","key":"32_CR12","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/LSP.2005.862603","volume":"13","author":"R Wang","year":"2006","unstructured":"Wang R, Chen Y (2006) High payload image steganography using two-way block matching. IEEE Signal Process Lett 13(3):161\u2013164","journal-title":"IEEE Signal Process Lett"},{"key":"32_CR13","unstructured":"Kumar PM, Roopa D (2007) An image steganography framework with improved tamper proofing. Asian J Inf Technol 6(10):1023\u20131029. http:\/\/medwelljournals.com\/abstract\/?doi=ajit.2007.1023.1029"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Parvez MT, Gutub AA (2008) RGB based variable-bits image steganography. In: Proceedings of IEEE Asia Pacific services computing conference, pp 1322\u20131327 (ISBN: 978-0-7695-3473-2). www.ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=4780862 )","DOI":"10.1109\/APSCC.2008.105"},{"issue":"12","key":"32_CR15","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.patrec.2003.10.014","volume":"25","author":"X Zhang","year":"2004","unstructured":"Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(12):331\u2013339","journal-title":"Pattern Recogn Lett"},{"issue":"12","key":"32_CR16","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.1016\/j.patrec.2004.05.006","volume":"25","author":"CC Chang","year":"2004","unstructured":"Chang CC, Tseng HW (2004) A steganographic method for digital images using side match. Pattern Recogn Lett 25(12):1431\u20131437","journal-title":"Pattern Recogn Lett"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Nag A, Singh JP, Khan S, Ghosh S (2001) A weighted location based lsb image steganography technique. Springer ACC 2011, CCIS 2(191):620\u2013627 (ISBN: 978-3-642-22714-1). http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_64.pdf","DOI":"10.1007\/978-3-642-22714-1_64"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Maiti C, Baksi D, Zamider I, Gorai P, Kisku DR (2011) Data hiding in images using some efficient steganography techniques. Springer SIP 2011, CCIS 2(260):195\u2013203 (ISBN: 978-3-642-27183-0). http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-642-27183-0_21","DOI":"10.1007\/978-3-642-27183-0_21"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Thiyagarajan, P., and Aghila, G., \u201cReversible dynamic secure steganography for medical image using graph coloring,\u201d Health Policy and Technology, vol. 2, no. 3, pp. 151\u2013161, 2013. (Available at; http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2211883713000403 )","DOI":"10.1016\/j.hlpt.2013.05.005"},{"key":"32_CR20","unstructured":"Srivastava AK, Mathur A (2013) The Rabin cryptosystem and analysis in measure of Chinese Reminder Theorem. Int J Sci Res Publ 3(6) (ISSN: 2250-3153). http:\/\/www.ijsrp.org\/research-paper-0613\/ijsrp-p1883.pdf"},{"key":"32_CR21","unstructured":"Thomas HC, Charles EL, Ronald LR, Clifford S (2001) Introduction to algorithms, 2nd Edition. MIT Press and McGraw-Hill, Section\u00a010.1: Stacks and queues, pp. 200\u2013204. http:\/\/www.dcc.ufrj.br\/~francisco_vianna\/livros\/Introduction.To.Algorithms.-.Cormen.-.2nd.Ed.pdf"},{"key":"32_CR22","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A et al (2010) Digital image steganography survey and analysis of current methods. Sig Process 90:727\u2013752","journal-title":"Sig Process"},{"issue":"3","key":"32_CR23","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. Secur Priv Mag IEEE 1(3):32\u201344","journal-title":"Secur Priv Mag IEEE"}],"container-title":["Brain Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40708-016-0032-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40708-016-0032-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40708-016-0032-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T11:30:01Z","timestamp":1748777401000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40708-016-0032-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,15]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["32"],"URL":"https:\/\/doi.org\/10.1007\/s40708-016-0032-8","relation":{},"ISSN":["2198-4018","2198-4026"],"issn-type":[{"type":"print","value":"2198-4018"},{"type":"electronic","value":"2198-4026"}],"subject":[],"published":{"date-parts":[[2016,2,15]]}}}