{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T03:44:35Z","timestamp":1762659875719},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T00:00:00Z","timestamp":1583452800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T00:00:00Z","timestamp":1583452800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s42044-020-00055-1","type":"journal-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T16:04:49Z","timestamp":1583510689000},"page":"195-205","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An embedding technique for smartcard-supported e-healthcare services"],"prefix":"10.1007","volume":"3","author":[{"given":"A. H. M.","family":"Kamal","sequence":"first","affiliation":[]},{"given":"Mohammad Mahfuzul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Zehadul","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"issue":"2","key":"55_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1049\/htl.2013.0026","volume":"1","author":"AHM Kamal","year":"2014","unstructured":"Kamal, A.H.M., Islam, M.M.: Facilitating and securing offline e-medicine service through image steganography. Healthcare Technol. Lett. 1(2), 74\u201379 (2014)","journal-title":"Healthcare Technol. Lett."},{"issue":"2","key":"55_CR2","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1080\/01611194.2017.1325787","volume":"42","author":"D Mishra","year":"2018","unstructured":"Mishra, D.: Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security. Cryptologia 42(2), 146\u2013175 (2018)","journal-title":"Cryptologia"},{"issue":"10","key":"55_CR3","first-page":"51","volume":"26","author":"S Brindha","year":"2011","unstructured":"Brindha, S., Vennila, I.: Hiding fingerprint in face using scattered LSB embedding steganographic technique for smart card based authentication system. Int. J. Comput. Appl. 26(10), 51\u201355 (2011)","journal-title":"Int. J. Comput. Appl."},{"issue":"4","key":"55_CR4","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/S1005-8885(11)60287-2","volume":"19","author":"L Pang","year":"2012","unstructured":"Pang, L., M-h, S.U.N., S-S, L.U.O., Wang, B., Xin, Y.: Full privacy preserving electronic voting scheme. J. China Univ. Posts Telecommun. 19(4), 86\u201393 (2012)","journal-title":"J. China Univ. Posts Telecommun."},{"issue":"7","key":"55_CR5","doi-asserted-by":"publisher","first-page":"43","DOI":"10.14257\/ijunesst.2017.10.7.05","volume":"10","author":"AHM Kamal","year":"2017","unstructured":"Kamal, A.H.M.: Securing the smart card authentications process by embedment random number of data bits into each pixel. Int. J. u- and e-Serv. Sci. Technol. 10(7), 43\u201354 (2017)","journal-title":"Int. J. u- and e-Serv. Sci. Technol."},{"key":"55_CR6","first-page":"170","volume-title":"Davidson\u2019s principle and practice of medicine","author":"BR Walker","year":"2014","unstructured":"Walker, B.R., Colledge, N.R., Ralston, S.H., Penman, I.D.: Davidson\u2019s principle and practice of medicine, 22nd edn, pp. 170\u2013176. Elsevier Ltd., Amsterdam (2014)","edition":"22"},{"key":"55_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ijhcs.2019.02.004","volume":"126","author":"A Alshamsi","year":"2019","unstructured":"Alshamsi, A., Andras, P.: User perception of Bitcoin usability and security across novice users. Int. J. Hum. Comput. Stud. 126, 94\u2013110 (2019)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"2","key":"55_CR8","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.dsp.2012.06.015","volume":"23","author":"X-T Wang","year":"2013","unstructured":"Wang, X.-T., Chang, C.-C., Nguyen, T.-S., Li, M.-C.: Reversible data hiding for high quality image exploiting interpolation and direction order mechanism. Digit. Signal Process. 23(2), 569\u2013577 (2013)","journal-title":"Digit. Signal Process."},{"issue":"3","key":"55_CR9","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s42044-018-0016-3","volume":"1","author":"AHM Kamal","year":"2018","unstructured":"Kamal, A.H.M., Islam, M.M.: An image distortion-based enhanced embedding scheme. Iran J. Comput. Sci. 1(3), 175\u2013186 (2018)","journal-title":"Iran J. Comput. Sci."},{"key":"55_CR10","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.jvcir.2015.10.008","volume":"33","author":"T-S Nguyen","year":"2015","unstructured":"Nguyen, T.-S., Chang, C.-C., Huynh, N.-T.: A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm. J. Vis. Commun. Image Represent. 33, 389\u2013397 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"55_CR11","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.jvcir.2015.05.005","volume":"31","author":"Z Pan","year":"2015","unstructured":"Pan, Z., Hu, S., Ma, X., Wang, L.: Reversible data hiding based on local histogram shifting with multilayer embedding. J. Vis. Commun. Image Represent. 31, 64\u201374 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"55_CR12","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1016\/j.jvcir.2016.07.023","volume":"40","author":"AHM Kamal","year":"2016","unstructured":"Kamal, A.H.M., Islam, M.M.: Boosting up the data hiding rate multi cycle embedment process. J. Vis. Commun. Image Represent. 40, 574\u2013588 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"10","key":"55_CR13","doi-asserted-by":"publisher","first-page":"2700","DOI":"10.1016\/j.jss.2013.05.077","volume":"86","author":"O Bo","year":"2013","unstructured":"Bo, O., Li, X., Zhao, Y., Ni, R.: Reversible data hiding based on PDE predictor. J. Syst. Softw. 86(10), 2700\u20132709 (2013)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"55_CR14","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.optcom.2011.09.005","volume":"285","author":"W Hong","year":"2012","unstructured":"Hong, W.: Adaptive reversible data hiding method based on error energy control and histogram shifting. Opt. Commun. 285(2), 101\u2013108 (2012)","journal-title":"Opt. Commun."},{"issue":"1","key":"55_CR15","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T.-S.: A novel data embedding method using adaptive pixel pair matching. Inf. Forensics Secur. IEEE Trans. 7(1), 176\u2013184 (2012)","journal-title":"Inf. Forensics Secur. IEEE Trans."},{"issue":"9","key":"55_CR16","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1016\/j.patcog.2008.03.005","volume":"41","author":"C-L Liu","year":"2008","unstructured":"Liu, C.-L., Liao, S.-R.: High-performance JPEG steganography using complementary embedding strategy. Pattern Recogn. 41(9), 2945\u20132955 (2008)","journal-title":"Pattern Recogn."},{"issue":"3","key":"55_CR17","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1109\/JSYST.2012.2232551","volume":"8","author":"J-D Lee","year":"2014","unstructured":"Lee, J.-D., Chiou, Y.-H., Guo, J.-M.: Information hiding based on block match coding for vector quantization-compressed images. IEEE Syst. J. 8(3), 737\u2013748 (2014)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"55_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.3390\/electronics5040079","volume":"5","author":"AHM Kamal","year":"2016","unstructured":"Kamal, A.H.M., Islam, M.M.: Enhancing the performance of the data embedment process through encoding errors. J. Electron. 5(4), 79\u201395 (2016)","journal-title":"J. Electron."},{"issue":"4","key":"55_CR19","first-page":"157","volume":"18","author":"S Gujjunoori","year":"2013","unstructured":"Gujjunoori, S., Amberker, B.B.: DCT based reversible data embedding for MPEG-4 video using HVS characteristics. J. Inf. Secur. Appl. 18(4), 157\u2013166 (2013)","journal-title":"J. Inf. Secur. Appl."},{"issue":"6","key":"55_CR20","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"W-L Tai","year":"2009","unstructured":"Tai, W.-L., Yeh, C.-M., Chang, C.-C.: Reversible data hiding based on histogram modification of pixel differences. Circuits Syst. Video Technol. IEEE Trans. 19(6), 906\u2013910 (2009)","journal-title":"Circuits Syst. Video Technol. IEEE Trans."},{"issue":"10","key":"55_CR21","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1016\/j.aeue.2011.01.014","volume":"65","author":"Z Zhao","year":"2011","unstructured":"Zhao, Z., Luo, H., Lu, Z.-M., Pan, J.-S.: Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int. J. Electron. Commun. 65(10), 814\u2013826 (2011)","journal-title":"AEU-Int. J. Electron. Commun."},{"issue":"12","key":"55_CR22","doi-asserted-by":"publisher","first-page":"2653","DOI":"10.1016\/j.jss.2010.08.047","volume":"83","author":"W Hong","year":"2010","unstructured":"Hong, W., Chen, T.-S.: A local variance-controlled reversible data hiding method using prediction and histogram-shifting. J. Syst. Softw. 83(12), 2653\u20132663 (2010)","journal-title":"J. Syst. Softw."},{"issue":"8","key":"55_CR23","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1016\/j.jss.2013.04.020","volume":"86","author":"HY Leung","year":"2013","unstructured":"Leung, H.Y., Cheng, L.M., Liu, F., Fu, Q.K.: Adaptive reversible data hiding based on block median preservation and modification of prediction errors. J. Syst. Softw. 86(8), 2204\u20132219 (2013)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"55_CR24","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s40595-014-0020-y","volume":"1","author":"Y-Y Lu","year":"2014","unstructured":"Lu, Y.-Y., Huang, H.-C.: Adaptive reversible data hiding with pyramidal structure. Vietnam J. Comput. Sci. 1(3), 179\u2013191 (2014)","journal-title":"Vietnam J. Comput. Sci."},{"key":"55_CR25","doi-asserted-by":"crossref","unstructured":"Kamal, A. H. M. and Islam, M. M. Capacity improvement of reversible data hiding scheme through better prediction and double cycle embedding process. In: Proceedings of IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Kolkata, India, pp 16\u201318. IEEE (2015)","DOI":"10.1109\/ANTS.2015.7413636"},{"key":"55_CR26","doi-asserted-by":"crossref","unstructured":"Kamal A. H. M., Islam M.M. Enhancing the embedding payload by handling the affair of association and mapping of block pixels through prediction errors histogram. In: Proceedings of International Conference on Networking, Systems and Security (NSysS), BUET, Dhaka, pp. 5\u20138. IEEE (2016)","DOI":"10.1109\/NSysS.2016.7400691"},{"key":"55_CR27","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jvcir.2015.01.012","volume":"28","author":"X Ma","year":"2015","unstructured":"Ma, X., Pan, Z., Hu, S., Wang, L.: High-fidelity reversible data hiding scheme based on multi-predictor sorting and selecting mechanism. J. Vis. Commun. Image Represent. 28, 71\u201382 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"55_CR28","first-page":"59","volume":"32","author":"AHM Kamal","year":"2017","unstructured":"Kamal, A.H.M., Islam, M.M.: Enhancing embedding capacity and stego image quality by employing multi predictors. J. of Inf. Secur. Appl. 32, 59\u201374 (2017)","journal-title":"J. of Inf. Secur. Appl."},{"issue":"3","key":"55_CR29","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang, Z., Bovik, A.: A Universal Image Quality Index. IEEE Signal Process. Lett. 9(3), 81\u201384 (2002)","journal-title":"IEEE Signal Process. Lett."}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-020-00055-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42044-020-00055-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-020-00055-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T00:19:49Z","timestamp":1614989989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42044-020-00055-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,6]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["55"],"URL":"https:\/\/doi.org\/10.1007\/s42044-020-00055-1","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"value":"2520-8438","type":"print"},{"value":"2520-8446","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,6]]},"assertion":[{"value":"21 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors do not have any financial interest from that article. The first author was a Ph.D. student and was working under the supervision of the second author. The third author is a professional doctor and was engaged in this research to guide on all the medical related affairs. The authors, now, want to publish the outcomes of the research in a reputed journal. Therefore, the authors have chosen this journal to publish that work. All the authors are aware of that submission. The work is not submitted to any other journals.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}