{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:39:55Z","timestamp":1725608395345},"reference-count":10,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cbms.2004.1311702","type":"proceedings-article","created":{"date-parts":[[2004,10,4]],"date-time":"2004-10-04T14:08:32Z","timestamp":1096898912000},"page":"122-127","source":"Crossref","is-referenced-by-count":15,"title":["Secure transmission of medical records using high capacity steganography"],"prefix":"10.1109","author":[{"given":"Y.","family":"Srinivasan","sequence":"first","affiliation":[]},{"given":"B.","family":"Nutter","sequence":"additional","affiliation":[]},{"given":"S.","family":"Mitra","sequence":"additional","affiliation":[]},{"given":"B.","family":"Phillips","sequence":"additional","affiliation":[]},{"given":"D.","family":"Ferris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2003.1212774"},{"journal-title":"Summary of the HIPAA Privacy Rule","year":"0","key":"2"},{"key":"10","first-page":"255","article-title":"Modeling digital image into informative and noise-like regions by complexity measure","author":"kawaguchi","year":"1998","journal-title":"Information Modeling and Knowledge Bases"},{"journal-title":"Summary Report of the Office for the Advancement of Telehealth Seminar Privacy Security and Confidentiality of Medical Records","year":"2000","key":"1"},{"journal-title":"Information Hiding - techniques for steganography and digital watermarking","year":"2000","author":"katzenbeisser","key":"7"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4375-6","author":"johnson","year":"2001","journal-title":"Information Hiding Steganography and Watermarking ? Attacks and Countermeasures"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.1999.825913"},{"journal-title":"A Strategy for the Development of Secure Telemedicine Applications","year":"0","author":"raman","key":"4"},{"journal-title":"A Data Embedding Method Using BPCS Principle with New Complexity Measures","year":"0","author":"hirohisa","key":"9"},{"key":"8","article-title":"Principle and applications of BPCS-steganography","author":"kawaguchi","year":"1998","journal-title":"Proceedings of SPIE International Symposium on Voice Video and Data Communications"}],"event":{"name":"Proceedings. 17th IEEE Symposium on Computer-Based Medical Systems","acronym":"CBMC-04","location":"Bethesda, MD, USA"},"container-title":["Proceedings. 17th IEEE Symposium on Computer-Based Medical Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9171\/29104\/01311702.pdf?arnumber=1311702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T06:34:52Z","timestamp":1497594892000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1311702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/cbms.2004.1311702","relation":{},"subject":[]}}