{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:40:59Z","timestamp":1759992059195,"version":"3.37.3"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172303"],"award-info":[{"award-number":["62172303"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Project of the Hubei Key Laboratory of Intelligent GeoInformation Processing","award":["KLIGIP-2019B09"],"award-info":[{"award-number":["KLIGIP-2019B09"]}]},{"name":"Cloud Technology Endowed Professorship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tnet.2023.3313160","type":"journal-article","created":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T18:08:24Z","timestamp":1695060504000},"page":"1261-1272","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient and Secure Health Data Propagation Scheme Using Steganography-Based Approach for Electronic Health Networks"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3558-917X","authenticated-orcid":false,"given":"Liping","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, China"}]},{"given":"Wenshuo","family":"Han","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7903-0808","authenticated-orcid":false,"given":"Shukai","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2175450"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2893249"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885561"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2509941"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2215324"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0426-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2015.07.004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2013.2264539"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.eswa.2015.12.010","article-title":"Imperceptibility\u2014Robustness tradeoff studies for ECG steganography using continuous ant colony optimization","volume":"49","author":"Raj","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.2988449"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13246-018-00718-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2016.2631885"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3063174"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/sil2.12031"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2020.102230"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/4233.966104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.09.008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/51.932724"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1161\/01.cir.101.23.e215"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2018.2883396"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3067238"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s13721-018-0169-x"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10505042\/10254494.pdf?arnumber=10254494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T17:39:15Z","timestamp":1713548355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10254494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":24,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2023.3313160","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}