{"id":"https://openalex.org/W4386825020","doi":"https://doi.org/10.1109/tnet.2023.3313160","title":"An Efficient and Secure Health Data Propagation Scheme Using Steganography-Based Approach for Electronic Health Networks","display_name":"An Efficient and Secure Health Data Propagation Scheme Using Steganography-Based Approach for Electronic Health Networks","publication_year":2023,"publication_date":"2023-09-18","ids":{"openalex":"https://openalex.org/W4386825020","doi":"https://doi.org/10.1109/tnet.2023.3313160"},"language":"en","primary_location":{"id":"doi:10.1109/tnet.2023.3313160","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2023.3313160","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100426768","display_name":"Liping Zhang","orcid":"https://orcid.org/0000-0003-3558-917X"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liping Zhang","raw_affiliation_strings":["School of Computer Science, China University of Geosciences, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013445902","display_name":"Wenshuo Han","orcid":null},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenshuo Han","raw_affiliation_strings":["School of Computer Science, China University of Geosciences, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102968437","display_name":"Shukai Chen","orcid":"https://orcid.org/0000-0001-7903-0808"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shukai Chen","raw_affiliation_strings":["School of Computer Science, China University of Geosciences, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100426768"],"corresponding_institution_ids":["https://openalex.org/I3124059619"],"apc_list":null,"apc_paid":null,"fwci":0.2407,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.52722565,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"32","issue":"2","first_page":"1261","last_page":"1272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7264289855957031},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7241408228874207},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6363588571548462},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44395729899406433},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43769371509552},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4332357347011566},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.191288560628891},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1638253629207611},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1215600073337555}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7264289855957031},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7241408228874207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6363588571548462},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44395729899406433},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43769371509552},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4332357347011566},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.191288560628891},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1638253629207611},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1215600073337555},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnet.2023.3313160","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2023.3313160","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G782110378","display_name":null,"funder_award_id":"62172303","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1076192152","https://openalex.org/W2007123640","https://openalex.org/W2021789809","https://openalex.org/W2029693536","https://openalex.org/W2045254342","https://openalex.org/W2058283171","https://openalex.org/W2095409369","https://openalex.org/W2162538606","https://openalex.org/W2162800060","https://openalex.org/W2214295988","https://openalex.org/W2217122439","https://openalex.org/W2283907002","https://openalex.org/W2558691550","https://openalex.org/W2805846423","https://openalex.org/W2902164957","https://openalex.org/W2904756156","https://openalex.org/W2905097561","https://openalex.org/W2909041083","https://openalex.org/W2912506294","https://openalex.org/W3019490276","https://openalex.org/W3096362226","https://openalex.org/W3135544308","https://openalex.org/W3136621203","https://openalex.org/W3157595287"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2588780717","https://openalex.org/W1852022489","https://openalex.org/W2891774131","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"Electronic":[0],"health":[1,34,52,70,94,155],"(e-health)":[2],"networks":[3],"enable":[4],"users":[5],"to":[6,91,107,149,172,207],"enjoy":[7],"convenient,":[8],"flexible,":[9],"and":[10,21,40,122,144,153,162,177,190,214,225,245],"low-cost":[11],"medical":[12],"services":[13],"at":[14],"home,":[15],"so":[16],"they":[17],"attract":[18],"great":[19],"attention":[20],"spread":[22],"into":[23],"the":[24,51,120,132,145,167,174,179,193,209,220,226],"market":[25],"quickly.":[26],"In":[27,164],"e-health":[28,56],"networks,":[29,57],"large":[30],"amounts":[31],"of":[32,125,195],"various":[33],"data":[35,53,71,95,156],"including":[36],"personal":[37],"privacy":[38],"information":[39],"physiological":[41,73],"signals":[42,74,100,210],"are":[43,89,113,128,170],"transmitted,":[44],"which":[45,217],"raises":[46],"security":[47,194,235],"risks.":[48],"To":[49,130],"protect":[50],"transmitted":[54],"in":[55,72,97,115,135,182,204],"steganography-based":[58,66,117],"solutions":[59,67,127],"have":[60],"been":[61],"widely":[62],"researched.":[63],"Although":[64],"existing":[65],"successfully":[68],"hide":[69],"such":[75],"as":[76],"electrocardiograms":[77],"(ECG),":[78],"forward":[79,188],"secrecy":[80,189],"is":[81,202],"not":[82],"fully":[83],"considered.":[84],"This":[85],"means":[86],"that":[87,230],"adversaries":[88],"able":[90],"extract":[92],"users\u2019":[93],"hidden":[96],"previous":[98],"stego":[99],"by":[101],"using":[102],"compromised":[103],"long-term":[104],"secrets.":[105],"Moreover,":[106,197],"reduce":[108],"communication":[109,221],"overhead,":[110],"compression":[111,200,215],"techniques":[112],"introduced":[114],"some":[116],"methods.":[118],"However,":[119],"imperceptibility":[121],"embedding":[123,180,243],"capacity":[124],"these":[126],"sacrificed.":[129],"solve":[131],"above":[133],"issues,":[134],"this":[136],"study,":[137],"we":[138],"adopt":[139],"Singular":[140],"Value":[141],"Decomposition":[142],"(SVD)":[143],"Bose-Chaudhuri-Hocquenghem":[146],"(BCH)":[147],"codes":[148,169],"design":[150],"an":[151,238],"efficient":[152],"secure":[154],"propagation":[157],"scheme":[158,206,233],"based":[159],"on":[160],"steganography":[161,184],"compression.":[163,246],"our":[165,205,231],"design,":[166],"BCH":[168],"used":[171],"update":[173],"encryption":[175],"key":[176],"change":[178],"locations":[181],"each":[183],"process,":[185],"thus":[186],"achieving":[187,237],"further":[191],"enhancing":[192],"steganography.":[196],"a":[198],"two-stage":[199],"method":[201],"proposed":[203,232],"compress":[208],"during":[211],"signal":[212],"processing":[213],"phases,":[216],"effectively":[218],"reduces":[219],"overhead.":[222],"Security":[223],"analysis":[224],"experimental":[227],"results":[228],"show":[229],"enhances":[234],"while":[236],"elaborate":[239],"balance":[240],"between":[241],"imperceptibility,":[242],"capacity,":[244]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
