{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T05:07:12Z","timestamp":1723352832903},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T00:00:00Z","timestamp":1473379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Brain Inf."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s40708-016-0057-z","type":"journal-article","created":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T01:40:32Z","timestamp":1473385232000},"page":"95-106","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem"],"prefix":"10.1007","volume":"4","author":[{"given":"Mamta","family":"Jain","sequence":"first","affiliation":[]},{"given":"Anil","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Rishabh Charan","family":"Choudhary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,9]]},"reference":[{"issue":"2","key":"57_CR1","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1136\/jamia.1996.96236282","volume":"3","author":"C Randolph","year":"1996","unstructured":"Randolph C, Barrows JR, Paul MD, Clayton D (1996) Review: privacy, confidentiality and electronic medical records. J Am Med Inform Assoc 3(2):139\u2013148","journal-title":"J Am Med Inform Assoc"},{"key":"57_CR2","unstructured":"Raman RS, Reddy R, Jagannathan V, Reddy S, Cleetus KJ, and Srinivas K (1997) A strategy for the development of secure telemedicine applications. Proc AMIA Annual Fall Symposium, 344\u2013348"},{"key":"57_CR3","unstructured":"United S (2000) Summary of the HIPAA Privacy Rule, United States Department of Health and Human Services 1\u201319"},{"issue":"6","key":"57_CR4","first-page":"493","volume":"3","author":"AK Srivastava","year":"2013","unstructured":"Srivastava AK, Mathur A (2013) The rabin cryptosystem & analysis in measure of Chinese Reminder Theorem. Inter J Scient Res Publ 3(6):493","journal-title":"Inter J Scient Res Publ"},{"issue":"7","key":"57_CR5","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar V, Pareek NK, Sud KK (2009) A new substitution diffusion based image cipher using chaotic standard and logistic Maps. Commun Nonlinear SciNumerSimulat 14(7):3056\u20133075","journal-title":"Commun Nonlinear SciNumerSimulat"},{"issue":"1","key":"57_CR6","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.cnsns.2010.04.010","volume":"16","author":"A Kumar","year":"2011","unstructured":"Kumar A, Ghose MK (2011) Extended substitution-diffusion based image cipher using chaotic standard map. Commun Nonlinear Sci Numer Simul 16(1):372\u2013382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"6","key":"57_CR7","first-page":"247","volume":"8","author":"ABY Mohammad","year":"2008","unstructured":"Mohammad ABY, Jantan A (2008) A new steganography approach for image encryption exchange by using the LSB insertion. IJCSNS Inter J Comp Sci Netw Secur 8(6):247\u2013254","journal-title":"IJCSNS Inter J Comp Sci Netw Secur"},{"key":"57_CR8","first-page":"620","volume-title":"A Weighted location based LSB image steganography technique","author":"A Nag","year":"2011","unstructured":"Nag A, Singh JP, Khan S, Ghosh S (2011) A Weighted location based LSB image steganography technique. Springer ACC, Berlin, pp 620\u2013627"},{"key":"57_CR9","first-page":"1","volume":"8","author":"G Swain","year":"2015","unstructured":"Swain G, Lenka SK (2015) A Novel steganography technique by mapping words with LSB array. Inter J Signal Imaging Syst Eng Indersci 8:1\u20132","journal-title":"Inter J Signal Imaging Syst Eng Indersci"},{"issue":"9-10","key":"57_CR10","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganograhic method for images by pixel value differencing. Pattern Recogn Lett 24(9-10):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"12","key":"57_CR11","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.patrec.2003.10.014","volume":"25","author":"X Zhang","year":"2004","unstructured":"Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(12):331\u2013339","journal-title":"Pattern Recogn Lett"},{"issue":"12","key":"57_CR12","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1016\/j.patrec.2004.05.006","volume":"25","author":"CC Chang","year":"2004","unstructured":"Chang CC, Tseng HW (2004) A steganographic method for digital images using side match. Pattern Recogn Lett 25(12):1431\u20131437","journal-title":"Pattern Recogn Lett"},{"issue":"3","key":"57_CR13","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/LSP.2005.862603","volume":"13","author":"R Wang","year":"2006","unstructured":"Wang R, Chen Y (2006) High payload image steganography using two-way block matching. IEEE Signal Proc Lett 13(3):161\u2013164","journal-title":"IEEE Signal Proc Lett"},{"issue":"10","key":"57_CR14","first-page":"1023","volume":"6","author":"PM Kumar","year":"2007","unstructured":"Kumar PM, Roopa D (2007) An image steganography framework with improved tamper proofing. Asian J Inf Technol 6(10):1023\u20131029","journal-title":"Asian J Inf Technol"},{"issue":"3","key":"57_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. Secur Priv Mag IEEE 1(3):32\u201344","journal-title":"Secur Priv Mag IEEE"},{"issue":"3","key":"57_CR16","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A et al (2010) Digital image steganography survey and analysis of current methods. Sig Process 90(3):727\u2013752","journal-title":"Sig Process"},{"issue":"4","key":"57_CR17","first-page":"474","volume":"6","author":"J Ross","year":"1998","unstructured":"Ross J, Anderson F, Petitcolas AP (1998) On the limits of steganography. IEEE J Selected Areas Commun Special Issue Copyright Priv Protect 6(4):474\u2013481","journal-title":"IEEE J Selected Areas Commun Special Issue Copyright Priv Protect"},{"issue":"3","key":"57_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.hlpt.2013.05.005","volume":"2","author":"P Thiyagarajan","year":"2013","unstructured":"Thiyagarajan P, Aghila G (2013) Reversible dynamic secure steganography for medical image using graph coloring. Health Policy Technol 2(3):151\u2013161","journal-title":"Health Policy Technol"},{"issue":"1","key":"57_CR19","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s40708-016-0032-8","volume":"3","author":"M Jain","year":"2016","unstructured":"Jain M, Lenka SK (2016) Diagonal queue medical image steganography with rabin cryptosystem. Springer Brain Inform 3(1):39\u201351","journal-title":"Springer Brain Inform"},{"key":"57_CR20","volume-title":"Introduction to algorithms","author":"HC Thomas","year":"2001","unstructured":"Thomas HC, Charles EL, Ronald LR, Clifford S (2001) Introduction to algorithms, 2nd edn. MIT Press and McGraw-Hill, Section\u00a010.1: Stacks and queues, Cambridge","edition":"2"},{"issue":"2","key":"57_CR21","first-page":"142","volume":"2","author":"B Li","year":"2011","unstructured":"Li B et al (2011) A survey on image steganography and steganalysis. J Inform Hiding Multimed Signal Process 2(2):142\u2013172","journal-title":"J Inform Hiding Multimed Signal Process"},{"issue":"12","key":"57_CR22","doi-asserted-by":"publisher","first-page":"2040","DOI":"10.1109\/TIP.2005.859370","volume":"14","author":"A Martin","year":"2005","unstructured":"Martin A, Sapiro G, Seroussi G (2005) Is image steganography natural. IEEE Trans Image Process 14(12):2040\u20132050","journal-title":"IEEE Trans Image Process"}],"container-title":["Brain Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40708-016-0057-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40708-016-0057-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40708-016-0057-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T06:01:57Z","timestamp":1493791317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40708-016-0057-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,9]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["57"],"URL":"https:\/\/doi.org\/10.1007\/s40708-016-0057-z","relation":{},"ISSN":["2198-4018","2198-4026"],"issn-type":[{"value":"2198-4018","type":"print"},{"value":"2198-4026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,9]]}}}