{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T14:34:17Z","timestamp":1712241257591},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s00034-022-02024-4","type":"journal-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T14:03:54Z","timestamp":1650895434000},"page":"5134-5159","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Reversible ECG Watermarking for Ownership Detection, Tamper Localization, and Recovery"],"prefix":"10.1007","volume":"41","author":[{"given":"Siddharth","family":"Bhalerao","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2991-0908","authenticated-orcid":false,"given":"Irshad Ahmad","family":"Ansari","sequence":"additional","affiliation":[]},{"given":"Anil","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,25]]},"reference":[{"key":"2024_CR1","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1109\/TBME.2006.877103","volume":"53","author":"RV Andre\u00e3o","year":"2006","unstructured":"R.V. Andre\u00e3o, B. Dorizzi, J. Boudy, ECG signal analysis through hidden markov models. IEEE Trans. Biomed. Eng. 53, 1541 (2006)","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"2024_CR2","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1007\/s11760-018-1237-5","volume":"12","author":"MM Bassiouni","year":"2018","unstructured":"M.M. Bassiouni, E.S.A. El-Dahshan, W. Khalefa, A.M. Salem, Intelligent hybrid approaches for human ECG signals identification. Signal Image Video Process. 12, 941 (2018)","journal-title":"Signal Image Video Process."},{"key":"2024_CR3","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.bspc.2017.01.013","volume":"34","author":"I Beraza","year":"2017","unstructured":"I. Beraza, I. Romero, Comparative study of algorithms for ECG segmentation. Biomed. Signal Process. Control 34, 166 (2017)","journal-title":"Biomed. Signal Process. Control"},{"key":"2024_CR4","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.patrec.2019.06.004","volume":"125","author":"S Bhalerao","year":"2019","unstructured":"S. Bhalerao, I.A. Ansari, A. Kumar, D.K. Jain, A reversible and multipurpose ECG data hiding technique for telemedicine applications. Pattern Recognit. Lett. 125, 463 (2019)","journal-title":"Pattern Recognit. Lett."},{"key":"2024_CR5","first-page":"3","volume":"1","author":"S Bhalerao","year":"2020","unstructured":"S. Bhalerao, I.A. Ansari, A. Kumar, A secure image watermarking for tamper detection and localization. J. Ambient Intell. Humaniz. Comput. 1, 3 (2020)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"2024_CR6","doi-asserted-by":"crossref","unstructured":"G. Coatrieux, L. Lecornu, B. Sankur, C. Roux, A review of image watermarking applications in healthcare, in Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings, pp. 4691\u20134694 (2006)","DOI":"10.1109\/IEMBS.2006.259305"},{"key":"2024_CR7","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1093\/biomet\/81.3.425","volume":"81","author":"DL Donoho","year":"1994","unstructured":"D.L. Donoho, J.M. Johnstone, Ideal spatial adaptation by wavelet shrinkage. Biometrika 81, 425 (1994)","journal-title":"Biometrika"},{"key":"2024_CR8","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"IC Dragoi","year":"2014","unstructured":"I.C. Dragoi, D. Coltuc, Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23, 1779 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"2024_CR9","first-page":"e215","volume":"101","author":"AL Goldberger","year":"2000","unstructured":"A.L. Goldberger, L.A. Amaral, L. Glass, J.M. Hausdorff, P.C. Ivanov, R.G. Mark, J.E. Mietus, G.B. Moody, C.K. Peng, H.E. Stanley, PhysioBank, PhysioToolkit, and PhysioNet: components of a new research resource for complex physiologic signals. Circulation 101, e215\u2013e220 (2000)","journal-title":"Circulation"},{"key":"2024_CR10","first-page":"862","volume":"1","author":"P Gope","year":"2020","unstructured":"P. Gope, Y. Gheraibia, S. Kabir, B. Sikdar, A secure IoT-based modern healthcare system with fault-tolerant decision making process. IEEE J. Biomed. Heal. Inform. 1, 862 (2020)","journal-title":"IEEE J. Biomed. Heal. Inform."},{"key":"2024_CR11","doi-asserted-by":"crossref","unstructured":"P. Huang, B. Li, L. Guo, Z. Jin, Y. Chen, A robust and reusable ECG-based authentication and data encryption scheme for EHealth systems, in 2016 IEEE Global Communications Conference, GLOBECOM 2016 \u2013 Proceedings, vol. 1 (2016)","DOI":"10.1109\/GLOCOM.2016.7841541"},{"key":"2024_CR12","first-page":"3","volume":"1","author":"T Jabeen","year":"2021","unstructured":"T. Jabeen, H. Ashraf, A. Ullah, A survey on healthcare data security in wireless body area networks. J. Ambient Intell. Humaniz. Comput. 1, 3 (2021)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"2024_CR13","doi-asserted-by":"crossref","unstructured":"S.P. Jaiswal, O.C. Au, V. Jakhetiya, Y. Guo, A.K. Tiwari, K. Yue, Efficient adaptive prediction based reversible image watermarking, in 2013 IEEE International Conference on Image Processing, ICIP 2013\u2014Proceedings, vol. 4540 (2013)","DOI":"10.1109\/ICIP.2013.6738935"},{"key":"2024_CR14","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.bspc.2015.07.004","volume":"22","author":"SE Jero","year":"2015","unstructured":"S.E. Jero, P. Ramu, S. Ramakrishnan, ECG steganography using curvelet transform. Biomed. Signal Process. Control 22, 161 (2015)","journal-title":"Biomed. Signal Process. Control"},{"key":"2024_CR15","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1049\/el.2015.3218","volume":"52","author":"SE Jero","year":"2016","unstructured":"S.E. Jero, P. Ramu, Curvelets-based ECG steganography for data security. Electron. Lett. 52, 283 (2016)","journal-title":"Electron. Lett."},{"key":"2024_CR16","first-page":"979","volume":"37","author":"L Johannesen","year":"2010","unstructured":"L. Johannesen, U.S.L. Grove, J.S. S\u00f8rensen, M.L. Schmidt, J.P. Couderc, C. Graff, A wavelet-based algorithm for delineation and classification of wave patterns in continuous holter ECG recordings. Comput. Cardiol. 37, 979 (2010)","journal-title":"Comput. Cardiol."},{"key":"2024_CR17","doi-asserted-by":"publisher","first-page":"10855","DOI":"10.1109\/JIOT.2019.2942048","volume":"6","author":"Y Kim","year":"2019","unstructured":"Y. Kim, M. Sim, I. Moon, B. Javidi, Secure random phase key exchange schemes for image cryptography. IEEE Internet Things J. 6, 10855 (2019)","journal-title":"IEEE Internet Things J."},{"key":"2024_CR18","unstructured":"P. Laguna, R.G. Mark, A. Goldberg, G.B. Moody, Database for evaluation of algorithms for measurement of QT and other waveform intervals in the ECG. in Computers in Cardiology, vol. 673 (1997)"},{"key":"2024_CR19","doi-asserted-by":"publisher","first-page":"4502","DOI":"10.3390\/s18124502","volume":"18","author":"S Lee","year":"2018","unstructured":"S. Lee, Y. Jeong, D. Park, B.J. Yun, K.H. Park, Efficient fiducial point detection of ECG QRS complex based on polygonal approximation. Sensors (Switzerland) 18, 4502 (2018)","journal-title":"Sensors (Switzerland)"},{"key":"2024_CR20","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1007\/s13246-018-0695-y","volume":"41","author":"P Mathivanan","year":"2018","unstructured":"P. Mathivanan, S. Edward Jero, P. Ramu, A. Balaji Ganesh, QR code based patient data protection in ECG steganography. Aust. Phys. Eng. Sci. Med. 41, 1057 (2018)","journal-title":"Aust. Phys. Eng. Sci. Med."},{"issue":"1","key":"2024_CR21","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1002\/ima.22477","volume":"31","author":"P Mathivanan","year":"2020","unstructured":"P. Mathivanan, ECG steganography based on tunable Q-factor wavelet transform and singular value decomposition. Int. J. Imaging Syst. Technol. 31(1), 270\u2013287 (2020)","journal-title":"Int. J. Imaging Syst. Technol."},{"key":"2024_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/51.932724","volume":"20","author":"GB Moody","year":"2001","unstructured":"G.B. Moody, R.G. Mark, The impact of the MIT-BIH arrhythmia database. IEEE Eng. Med. Biol. Mag. 20, 45 (2001)","journal-title":"IEEE Eng. Med. Biol. Mag."},{"key":"2024_CR23","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16, 354 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2024_CR24","doi-asserted-by":"publisher","first-page":"8517","DOI":"10.1007\/s11042-016-3490-3","volume":"76","author":"Z Pakdaman","year":"2017","unstructured":"Z. Pakdaman, S. Saryazdi, H. Nezamabadi-pour, A prediction based reversible image watermarking in hadamard domain. Multimed. Tools Appl. 76, 8517 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"2024_CR25","doi-asserted-by":"publisher","first-page":"2464","DOI":"10.1007\/s00034-020-01585-6","volume":"40","author":"C Priya","year":"2020","unstructured":"C. Priya, C. Ramya, Robust and secure video watermarking based on cellular automata and singular value decomposition for copyright protection. Circuits Syst. Signal Process. 40, 2464 (2020)","journal-title":"Circuits Syst. Signal Process."},{"key":"2024_CR26","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.inffus.2019.07.012","volume":"55","author":"H Qiu","year":"2020","unstructured":"H. Qiu, M. Qiu, Z. Lu, Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59 (2020)","journal-title":"Inf. Fusion"},{"issue":"3","key":"2024_CR27","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1080\/19393555.2011.561154","volume":"20","author":"NV Rao","year":"2011","unstructured":"N.V. Rao, V.M. Kumari, Watermarking in medical imaging for security and authentication. Inf. Secur. J. A Global Perspect. 20(3), 148\u2013155 (2011)","journal-title":"Inf. Secur. J. A Global Perspect."},{"key":"2024_CR28","first-page":"408","volume":"15","author":"A Ricardo","year":"2008","unstructured":"A. Ricardo, P. Riera, C. Ferreira, C. Ferreira Filho, M. Ferreira, A. Meneghini, A.H. Uchida, E. Schapachnik, S. Dubner, L. Zhang, The enigmatic sixth wave of the electrocardiogram: the U wave. Cardiol. J. 15, 408 (2008)","journal-title":"Cardiol. J."},{"issue":"13","key":"2024_CR29","first-page":"2525","volume":"136","author":"LD Sharma","year":"2019","unstructured":"L.D. Sharma, R.K. Sunkaria, Detection and delineation of the enigmatic U-wave in an electrocardiogram. Int. J. Inf. Technol. 136(13), 2525 (2019)","journal-title":"Int. J. Inf. Technol."},{"key":"2024_CR30","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.cmpb.2017.08.015","volume":"151","author":"HJ Shiu","year":"2017","unstructured":"H.J. Shiu, B.S. Lin, C.H. Huang, P.Y. Chiang, C.L. Lei, Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput. Methods Programs Biomed. 151, 159 (2017)","journal-title":"Comput. Methods Programs Biomed."},{"key":"2024_CR31","doi-asserted-by":"publisher","first-page":"5059","DOI":"10.1007\/s00034-020-01401-1","volume":"39","author":"N Tarhouni","year":"2020","unstructured":"N. Tarhouni, M. Charfeddine, C. Ben Amar, Novel and robust image watermarking for copyright protection and integrity control. Circuits Syst. Signal Process. 39, 5059 (2020)","journal-title":"Circuits Syst. Signal Process."},{"key":"2024_CR32","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"D.M. Thodi, J.J. Rodr\u00edguez, Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16, 721 (2007)","journal-title":"IEEE Trans. Image Process."},{"key":"2024_CR33","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"J. Tian, Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13, 890 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2024_CR34","doi-asserted-by":"publisher","first-page":"548","DOI":"10.3390\/app8040548","volume":"8","author":"C Wang","year":"2018","unstructured":"C. Wang, H. Zhang, X. Zhou, A self-recovery fragile image watermarking with variable watermark capacity. Appl. Sci. 8, 548 (2018)","journal-title":"Appl. Sci."},{"key":"2024_CR35","doi-asserted-by":"publisher","first-page":"13733","DOI":"10.1007\/s11042-015-2706-2","volume":"75","author":"H Wang","year":"2016","unstructured":"H. Wang, W. Zhang, N. Yu, Protecting patient confidential information based on ECG reversible data hiding. Multimed. Tools Appl. 75, 13733 (2016)","journal-title":"Multimed. Tools Appl."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02024-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-022-02024-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02024-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T18:15:12Z","timestamp":1658513712000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-022-02024-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":35,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["2024"],"URL":"http:\/\/dx.doi.org\/10.1007\/s00034-022-02024-4","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"17 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}