{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T21:50:09Z","timestamp":1769291409829,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:00:00Z","timestamp":1769212800000},"content-version":"vor","delay-in-days":28,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Manipal University Jaipur"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01341-0","type":"journal-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T11:14:06Z","timestamp":1766834046000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A secure framework for optimized data transmission using steganographic techniques"],"prefix":"10.1186","volume":"13","author":[{"given":"Priya","family":"Batta","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Pramod Singh","family":"Rathore","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"issue":"4","key":"1341_CR1","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1093\/jamiaopen\/ooz036","volume":"2","author":"R Abdolkhani","year":"2019","unstructured":"Abdolkhani R, Gray K, Borda A, DeSouza R. Patient-generated health data management and quality challenges in remote patient monitoring. JAMIA Open. 2019;2(4):471\u20138.","journal-title":"JAMIA Open"},{"issue":"9","key":"1341_CR2","doi-asserted-by":"publisher","first-page":"9576","DOI":"10.1007\/s11227-021-03637-3","volume":"77","author":"T Veeramakali","year":"2021","unstructured":"Veeramakali T, Siva R, Sivakumar B, Senthil Mahesh PC, Krishnaraj N. An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model. J Supercomput. 2021;77(9):9576\u201396. https:\/\/doi.org\/10.1007\/s11227-021-03637-3.","journal-title":"J Supercomput"},{"key":"1341_CR3","doi-asserted-by":"publisher","first-page":"10332","DOI":"10.1109\/ACCESS.2018.2799879","volume":"6","author":"AA Abd El-Latif","year":"2018","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Elmougy S, Ghoneim A. Secure quantum steganography protocol for fog cloud internet of things. IEEE Access. 2018;6:10332\u201340.","journal-title":"IEEE Access"},{"key":"1341_CR4","doi-asserted-by":"publisher","first-page":"Article123687","DOI":"10.1016\/j.physa.2019.123687","volume":"541","author":"AA Abd El-Latif","year":"2020","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Elseuofi S, Khalifa HS, Alghamdi AS, Polat K, Amin M. Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A. 2020;541:Article123687. Google Search. Accessed: Nov. 02, 2023. [Online].","journal-title":"Physica A"},{"key":"1341_CR5","doi-asserted-by":"publisher","unstructured":"Batta P, Bharti V. Review on Tools and Technologies in Assessing the Quality of Smart Devices, presented at the AIP Conference Proceedings. 2022. https:\/\/doi.org\/10.1063\/5.0108922","DOI":"10.1063\/5.0108922"},{"key":"1341_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-023-02115-9","author":"J Escorcia-Gutierrez","year":"2023","unstructured":"Escorcia-Gutierrez J, et al. Privacy preserving blockchain with energy aware clustering scheme for IoT healthcare systems. Mob Netw Appl. 2023. https:\/\/doi.org\/10.1007\/s11036-023-02115-9.","journal-title":"Mob Netw Appl"},{"issue":"3","key":"1341_CR7","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1007\/s11277-023-10226-5","volume":"129","author":"S Abed","year":"2023","unstructured":"Abed S, Jaffal R, Mohd BJ. A review on blockchain and IoT integration from energy, security and hardware perspectives. Wirel Pers Commun. 2023;129(3):2079\u2013122. https:\/\/doi.org\/10.1007\/s11277-023-10226-5.","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"1341_CR8","doi-asserted-by":"publisher","first-page":"1749","DOI":"10.1007\/s11277-024-11694-z","volume":"139","author":"P Batta","year":"2024","unstructured":"Batta P, Ahuja S, Kumar A. Future directions for secure IoT frameworks: insights from blockchain-based solutions: a comprehensive review and future analysis. Wirel Pers Commun. 2024;139(3):1749\u201381. https:\/\/doi.org\/10.1007\/s11277-024-11694-z.","journal-title":"Wirel Pers Commun"},{"issue":"21","key":"1341_CR9","doi-asserted-by":"publisher","first-page":"30523","DOI":"10.1007\/s11042-018-7115-x","volume":"78","author":"AK Singh","year":"2019","unstructured":"Singh AK. Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl. 2019;78(21):30523\u201333. https:\/\/doi.org\/10.1007\/s11042-018-7115-x.","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"1341_CR10","doi-asserted-by":"publisher","first-page":"14137","DOI":"10.1007\/s11042-020-10284-y","volume":"80","author":"AH Mohsin","year":"2021","unstructured":"Mohsin AH, et al. PSO\u2013blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture. Multimed Tools Appl. 2021;80(9):14137\u201361. https:\/\/doi.org\/10.1007\/s11042-020-10284-y.","journal-title":"Multimed Tools Appl"},{"key":"1341_CR11","doi-asserted-by":"publisher","first-page":"98013","DOI":"10.1109\/ACCESS.2021.3095297","volume":"9","author":"D Samanta","year":"2021","unstructured":"Samanta D, et al. Cipher block chaining support vector machine for secured decentralized cloud enabled intelligent IoT architecture. IEEE Access. 2021;9:98013\u201325.","journal-title":"IEEE Access"},{"issue":"5","key":"1341_CR12","doi-asserted-by":"publisher","first-page":"3029","DOI":"10.1007\/s12083-021-01143-0","volume":"14","author":"W She","year":"2021","unstructured":"She W, Huo L, Tian Z, Zhuang Y, Niu C, Liu W. A double steganography model combining blockchain and interplanetary file system. Peer-to-Peer Netw Appl. 2021;14(5):3029\u201342. https:\/\/doi.org\/10.1007\/s12083-021-01143-0.","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"8","key":"1341_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12081817","volume":"12","author":"X Zheng","year":"2023","unstructured":"Zheng X, Miao F, Udomwong P, Chakpitak N. Registered data-centered lab management system based on data ownership safety architecture. Electronics. 2023;12(8):1817.","journal-title":"Electronics"},{"key":"1341_CR14","doi-asserted-by":"crossref","unstructured":"Batta P, Ahuja S, Kumar A, Performance Validation of Secret Data in IoT using Blockchain, in. 2023 World Conference on Communication & Computing (WCONF), IEEE, 2023, pp. 1\u20136. Accessed: Oct. 14, 2023. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/10234981\/","DOI":"10.1109\/WCONF58270.2023.10234981"},{"key":"1341_CR15","doi-asserted-by":"publisher","first-page":"54478","DOI":"10.1109\/ACCESS.2021.3070555","volume":"9","author":"A Al Sadawi","year":"2021","unstructured":"Al Sadawi A, Hassan MS, Ndiaye M. A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges. IEEE Access. 2021;9:54478\u201397.","journal-title":"IEEE Access"},{"key":"1341_CR16","doi-asserted-by":"publisher","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","volume":"6","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2018","unstructured":"Fern\u00e1ndez-Caram\u00e9s TM, Fraga-Lamas P. A review on the use of blockchain for the internet of things. Ieee Access. 2018;6:32979\u20133001.","journal-title":"Ieee Access"},{"issue":"1","key":"1341_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1504\/IJITST.2023.127391","volume":"13","author":"A Parcha","year":"2023","unstructured":"Parcha A, et al. Implementing security in IoT systems via blockchain. IJITST. 2023;13(1):85. https:\/\/doi.org\/10.1504\/IJITST.2023.127391.","journal-title":"IJITST"},{"key":"1341_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113385","volume":"154","author":"SMH Bamakan","year":"2020","unstructured":"Bamakan SMH, Motavali A, Bondarti AB. A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst Appl. 2020;154:113385.","journal-title":"Expert Syst Appl"},{"issue":"3","key":"1341_CR19","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1007\/s10586-020-03059-5","volume":"23","author":"D Pavithran","year":"2020","unstructured":"Pavithran D, Shaalan K, Al-Karaki JN, Gawanmeh A. Towards building a blockchain framework for IoT. Cluster Comput. 2020;23(3):2089\u2013103. https:\/\/doi.org\/10.1007\/s10586-020-03059-5.","journal-title":"Cluster Comput"},{"key":"1341_CR20","doi-asserted-by":"publisher","first-page":"5629","DOI":"10.1109\/ACCESS.2023.3236505","volume":"11","author":"ERD Villarreal","year":"2023","unstructured":"Villarreal ERD, Garc\u00eda-Alonso J, Moguel E, Alegr\u00eda JAH. Blockchain for healthcare management systems: a survey on interoperability and security. IEEE Access. 2023;11:5629\u201352.","journal-title":"IEEE Access"},{"issue":"4","key":"1341_CR21","first-page":"365","volume":"28","author":"S Mishra","year":"2022","unstructured":"Mishra S. Blockchain-based security in smart grid network. Int J Commun Netw Distrib Syst. 2022;28(4):365\u201388.","journal-title":"Int J Commun Netw Distrib Syst"},{"key":"1341_CR22","unstructured":"Li X, Zhao H, Deng W. BFOD: Blockchain-based privacy protection and security sharing scheme of flight operation data, IEEE Internet of Things Journal, 2023, Accessed: Oct. 14, 2023. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/10185924\/?casa_token=ZynlKwiIzIkAAAAA:CEj2EtM4LqeYf1opADLdkMHUvSxVxfRfqSZFhywRwA_65T0yFNjO2ufbDxUCm9txv4I05tUPn4c"},{"issue":"9","key":"1341_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3560816","volume":"55","author":"W Issa","year":"2023","unstructured":"Issa W, Moustafa N, Turnbull B, Sohrabi N, Tari Z. Blockchain-based federated learning for securing internet of things: a comprehensive survey. ACM Comput Surv. 2023;55(9):1\u201343. https:\/\/doi.org\/10.1145\/3560816.","journal-title":"ACM Comput Surv"},{"issue":"6","key":"1341_CR24","doi-asserted-by":"publisher","first-page":"4495","DOI":"10.1007\/s10586-022-03701-4","volume":"25","author":"A Razzaq","year":"2022","unstructured":"Razzaq A. Blockchain-based secure data transmission for internet of underwater things. Cluster Comput. 2022;25(6):4495\u2013514.","journal-title":"Cluster Comput"},{"issue":"3","key":"1341_CR25","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.cviu.2006.11.002","volume":"107","author":"Y-H Yu","year":"2007","unstructured":"Yu Y-H, Chang C-C, Lin I-C. A new steganographic method for color and grayscale image hiding. Comput Vis Image Underst. 2007;107(3):183\u201394.","journal-title":"Comput Vis Image Underst"},{"key":"1341_CR26","doi-asserted-by":"crossref","unstructured":"Gurunathan P, Devi RS. RSA Cryptography and GZIP Steganography Techniques for Information Hiding and Security using Java, in 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, 2023, pp. 654\u2013659. Accessed: Oct. 14, 2023. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/10125906\/","DOI":"10.1109\/ICOEI56765.2023.10125906"},{"key":"1341_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120416","volume":"229","author":"X Duan","year":"2023","unstructured":"Duan X, Li B, Yin Z, Zhang X, Luo B. Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction. Expert Syst Appl. 2023;229:120416.","journal-title":"Expert Syst Appl"},{"key":"1341_CR28","doi-asserted-by":"crossref","unstructured":"Horng J-H, Chang C-C, Li G-L, Lee W-K, Hwang SO. Blockchain-based reversible data hiding for securing medical images, Journal of Healthcare Engineering, vol. 2021, 2021, Accessed: Nov. 02, 2023. [Online]. Available: https:\/\/www.hindawi.com\/journals\/jhe\/2021\/9943402\/","DOI":"10.1155\/2021\/9943402"},{"issue":"3","key":"1341_CR29","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030546","volume":"12","author":"Z Wenhua","year":"2023","unstructured":"Wenhua Z, Qamar F, Abdali T-AN, Hassan R, Jafri STA, Nguyen QN. Blockchain technology: security issues, healthcare applications, challenges and future trends. Electronics. 2023;12(3):546.","journal-title":"Electronics"},{"issue":"3","key":"1341_CR30","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1108\/IJCS-03-2020-0007","volume":"4","author":"J Lin","year":"2020","unstructured":"Lin J, Long W, Zhang A, Chai Y. Blockchain and IoT-based architecture design for intellectual property protection. Int J Crowd Sci. 2020;4(3):283\u201393.","journal-title":"Int J Crowd Sci"},{"key":"1341_CR31","doi-asserted-by":"publisher","unstructured":"Secure transmission of secret data using optimization based embedding techniques in blockchain. Expert Syst Appl. 2023;211:118469. https:\/\/doi.org\/10.1016\/j.eswa.2022.118469","DOI":"10.1016\/j.eswa.2022.118469"},{"key":"1341_CR32","doi-asserted-by":"crossref","unstructured":"Zhou X, Gong W, Fu W, Jin L. An improved method for LSB based color image steganography combined with cryptography, in 2016 IEEE\/ACIS 15th international conference on computer and information science (ICIS), IEEE, 2016, pp. 1\u20134. Accessed: Nov. 06, 2023. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/7550955\/","DOI":"10.1109\/ICIS.2016.7550955"},{"key":"1341_CR33","unstructured":"Bhardwaj M, Kumar A, Saini N, Varshney NK, Sadique M. Information Hiding Using Image Steganography, in IPEC, 2023, p. 01. Accessed: Oct. 14, 2023. [Online]. Available: https:\/\/ipecjst.ipec.org.in\/assets\/doc\/I1-F13.pdf"},{"key":"1341_CR34","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.csi.2018.12.002","volume":"64","author":"AH Mohsin","year":"2019","unstructured":"Mohsin AH, et al. Blockchain authentication of network applications: taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions. Comput Stand Interfaces. 2019;64:41\u201360. https:\/\/doi.org\/10.1016\/j.csi.2018.12.002","journal-title":"Comput Stand Interfaces"},{"issue":"3","key":"1341_CR35","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s42979-021-00542-7","volume":"2","author":"BS Shashikiran","year":"2021","unstructured":"Shashikiran BS, Shaila K, Venugopal KR. Minimal block knight\u2019s tour and edge with LSB pixel replacement based encrypted image steganography. SN Comput Sci. 2021;2(3):139. https:\/\/doi.org\/10.1007\/s42979-021-00542-7.","journal-title":"SN Comput Sci"},{"key":"1341_CR36","doi-asserted-by":"crossref","unstructured":"Batta P, Ahuja S, Kumar A. A hybrid framework for secure data transfer for enhancing the Blockchain Security, in 2023 Seventh International Conference on Image Information Processing (ICIIP), IEEE, 2023, pp. 645\u2013650. Accessed: Nov. 12, 2024. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/10537655\/","DOI":"10.1109\/ICIIP61524.2023.10537655"},{"key":"1341_CR37","doi-asserted-by":"crossref","unstructured":"Wu S, Chen Y, Mermet S, Hurni L, Schindler K, Gonthier N, Landrieu L. Stegogan: Leveraging steganography for non-bijective image-to-image translation, in Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), 2024, pp. 7922\u20137931.","DOI":"10.1109\/CVPR52733.2024.00757"},{"key":"1341_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101358","volume":"28","author":"S Mukherjee","year":"2024","unstructured":"Mukherjee S, Mukhopadhyay S, Sarkar S. IoTSLE: securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model. Internet Things. 2024;28:101358.","journal-title":"Internet Things"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01341-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01341-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01341-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T08:37:05Z","timestamp":1769243825000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s40537-025-01341-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,27]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["1341"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01341-0","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,27]]},"assertion":[{"value":"19 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"We hereby declare that the image containing a potential human face, included in our manuscript submission, is part of an open-access dataset and publicly available. As such, no specific consent is required for its publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"9"}}