{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:33:54Z","timestamp":1756308834571,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/embc.2014.6943569","type":"proceedings-article","created":{"date-parts":[[2014,11,12]],"date-time":"2014-11-12T17:43:47Z","timestamp":1415814227000},"page":"222-225","source":"Crossref","is-referenced-by-count":6,"title":["An efficient steganography method for hiding patient confidential information"],"prefix":"10.1109","author":[{"given":"Hayat","family":"Al-Dmour","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Al-Ani","sequence":"additional","affiliation":[]},{"family":"Hung Nguyen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Digital watermarking and steganography","year":"2008","author":"cox","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/42.938246"},{"key":"ref6","first-page":"469","article-title":"Biometric template security: Challenges and solutions","author":"anil","year":"2005","journal-title":"Proceedings of European Signal Processing Conference (EUSIPCO)"},{"key":"ref5","first-page":"168","article-title":"Image steganography techniques: an overview","volume":"6","author":"hamid","year":"2012","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2004.1311702"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2013.6528835"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/4233.992161"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"ref1","article-title":"Design and implementation of multilevel access control in medical image transmission using symmetric polynomial based audio steganography","author":"nafeesa begum","year":"2010","journal-title":"ar Xiv preprint arXiv 1004 1682"}],"event":{"name":"2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)","start":{"date-parts":[[2014,8,26]]},"location":"Chicago, IL","end":{"date-parts":[[2014,8,30]]}},"container-title":["2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6923026\/6943513\/06943569.pdf?arnumber=6943569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:12:32Z","timestamp":1490307152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6943569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/embc.2014.6943569","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}