Reversible Data Hiding Scheme During Encryption Using Machine Learning Article Swipe
YOU?
·
· 2018
· Open Access
·
· DOI: https://doi.org/10.1016/j.procs.2018.07.043
Reversible data hiding (RDH) is a recent research field of information security for secured digital data transmission. The advancements in communication technology and the invention of new medical robotics are very much useful in telemedicine applications. The transmission of medical image and electronic patient records (EPR) is a common process in telemedicine. The images captured by robots may need to be authenticated, the RDH schemes can be used to authenticate data and/or the owner of the data. In addition, the RDH techniques provide a way to embed EPR data into medical images before transmission. The EPR data extraction and recovery of the original image can be carried out by the receiver. This manuscript proposes a new RDH scheme to embed EPR data during image encryption process. A block-wise image encryption technique has been used in the proposed scheme to obtain the encrypted image with hidden EPR data bits. The novelty of the proposed scheme is that a support vector machine (SVM) based classification scheme has been used for data extraction and image recovery process from the encrypted image. Experimental study of the proposed scheme on standard medical images from OsriX dataset shows that the proposed scheme performs better than the existing schemes in terms of embedding rate and bit error rate.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.procs.2018.07.043
- OA Status
- diamond
- Cited By
- 45
- References
- 28
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2883094232
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2883094232Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.procs.2018.07.043Digital Object Identifier
- Title
-
Reversible Data Hiding Scheme During Encryption Using Machine LearningWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2018Year of publication
- Publication date
-
2018-01-01Full publication date if available
- Authors
-
V. M. Manikandan, V. MasilamaniList of authors in order
- Landing page
-
https://doi.org/10.1016/j.procs.2018.07.043Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.procs.2018.07.043Direct OA link when available
- Concepts
-
Computer science, Encryption, Artificial intelligence, Scheme (mathematics), Support vector machine, Data extraction, Information hiding, Block (permutation group theory), Process (computing), Field (mathematics), Transmission (telecommunications), Image (mathematics), Computer vision, Computer security, Political science, MEDLINE, Telecommunications, Pure mathematics, Mathematics, Operating system, Law, Geometry, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
45Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 2, 2024: 3, 2023: 8, 2022: 9, 2021: 12Per-year citation counts (last 5 years)
- References (count)
-
28Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2883094232 |
|---|---|
| doi | https://doi.org/10.1016/j.procs.2018.07.043 |
| ids.doi | https://doi.org/10.1016/j.procs.2018.07.043 |
| ids.mag | 2883094232 |
| ids.openalex | https://openalex.org/W2883094232 |
| fwci | 3.32079841 |
| type | article |
| title | Reversible Data Hiding Scheme During Encryption Using Machine Learning |
| biblio.issue | |
| biblio.volume | 133 |
| biblio.last_page | 356 |
| biblio.first_page | 348 |
| topics[0].id | https://openalex.org/T10388 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Advanced Steganography and Watermarking Techniques |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9987000226974487 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T12357 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9980000257492065 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Digital Media Forensic Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8385752439498901 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C148730421 |
| concepts[1].level | 2 |
| concepts[1].score | 0.769460916519165 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[1].display_name | Encryption |
| concepts[2].id | https://openalex.org/C154945302 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5669883489608765 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[2].display_name | Artificial intelligence |
| concepts[3].id | https://openalex.org/C77618280 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5663673281669617 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[3].display_name | Scheme (mathematics) |
| concepts[4].id | https://openalex.org/C12267149 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5489252209663391 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q282453 |
| concepts[4].display_name | Support vector machine |
| concepts[5].id | https://openalex.org/C2777466982 |
| concepts[5].level | 3 |
| concepts[5].score | 0.5364319682121277 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q5227287 |
| concepts[5].display_name | Data extraction |
| concepts[6].id | https://openalex.org/C3073032 |
| concepts[6].level | 3 |
| concepts[6].score | 0.5327003002166748 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q15912075 |
| concepts[6].display_name | Information hiding |
| concepts[7].id | https://openalex.org/C2777210771 |
| concepts[7].level | 2 |
| concepts[7].score | 0.5318690538406372 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q4927124 |
| concepts[7].display_name | Block (permutation group theory) |
| concepts[8].id | https://openalex.org/C98045186 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4464603066444397 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q205663 |
| concepts[8].display_name | Process (computing) |
| concepts[9].id | https://openalex.org/C9652623 |
| concepts[9].level | 2 |
| concepts[9].score | 0.44121798872947693 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q190109 |
| concepts[9].display_name | Field (mathematics) |
| concepts[10].id | https://openalex.org/C761482 |
| concepts[10].level | 2 |
| concepts[10].score | 0.42749568819999695 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q118093 |
| concepts[10].display_name | Transmission (telecommunications) |
| concepts[11].id | https://openalex.org/C115961682 |
| concepts[11].level | 2 |
| concepts[11].score | 0.41637247800827026 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q860623 |
| concepts[11].display_name | Image (mathematics) |
| concepts[12].id | https://openalex.org/C31972630 |
| concepts[12].level | 1 |
| concepts[12].score | 0.40219444036483765 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q844240 |
| concepts[12].display_name | Computer vision |
| concepts[13].id | https://openalex.org/C38652104 |
| concepts[13].level | 1 |
| concepts[13].score | 0.08534416556358337 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[13].display_name | Computer security |
| concepts[14].id | https://openalex.org/C17744445 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[14].display_name | Political science |
| concepts[15].id | https://openalex.org/C2779473830 |
| concepts[15].level | 2 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q1540899 |
| concepts[15].display_name | MEDLINE |
| concepts[16].id | https://openalex.org/C76155785 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[16].display_name | Telecommunications |
| concepts[17].id | https://openalex.org/C202444582 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q837863 |
| concepts[17].display_name | Pure mathematics |
| concepts[18].id | https://openalex.org/C33923547 |
| concepts[18].level | 0 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[18].display_name | Mathematics |
| concepts[19].id | https://openalex.org/C111919701 |
| concepts[19].level | 1 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[19].display_name | Operating system |
| concepts[20].id | https://openalex.org/C199539241 |
| concepts[20].level | 1 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q7748 |
| concepts[20].display_name | Law |
| concepts[21].id | https://openalex.org/C2524010 |
| concepts[21].level | 1 |
| concepts[21].score | 0.0 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[21].display_name | Geometry |
| concepts[22].id | https://openalex.org/C134306372 |
| concepts[22].level | 1 |
| concepts[22].score | 0.0 |
| concepts[22].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[22].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8385752439498901 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/encryption |
| keywords[1].score | 0.769460916519165 |
| keywords[1].display_name | Encryption |
| keywords[2].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[2].score | 0.5669883489608765 |
| keywords[2].display_name | Artificial intelligence |
| keywords[3].id | https://openalex.org/keywords/scheme |
| keywords[3].score | 0.5663673281669617 |
| keywords[3].display_name | Scheme (mathematics) |
| keywords[4].id | https://openalex.org/keywords/support-vector-machine |
| keywords[4].score | 0.5489252209663391 |
| keywords[4].display_name | Support vector machine |
| keywords[5].id | https://openalex.org/keywords/data-extraction |
| keywords[5].score | 0.5364319682121277 |
| keywords[5].display_name | Data extraction |
| keywords[6].id | https://openalex.org/keywords/information-hiding |
| keywords[6].score | 0.5327003002166748 |
| keywords[6].display_name | Information hiding |
| keywords[7].id | https://openalex.org/keywords/block |
| keywords[7].score | 0.5318690538406372 |
| keywords[7].display_name | Block (permutation group theory) |
| keywords[8].id | https://openalex.org/keywords/process |
| keywords[8].score | 0.4464603066444397 |
| keywords[8].display_name | Process (computing) |
| keywords[9].id | https://openalex.org/keywords/field |
| keywords[9].score | 0.44121798872947693 |
| keywords[9].display_name | Field (mathematics) |
| keywords[10].id | https://openalex.org/keywords/transmission |
| keywords[10].score | 0.42749568819999695 |
| keywords[10].display_name | Transmission (telecommunications) |
| keywords[11].id | https://openalex.org/keywords/image |
| keywords[11].score | 0.41637247800827026 |
| keywords[11].display_name | Image (mathematics) |
| keywords[12].id | https://openalex.org/keywords/computer-vision |
| keywords[12].score | 0.40219444036483765 |
| keywords[12].display_name | Computer vision |
| keywords[13].id | https://openalex.org/keywords/computer-security |
| keywords[13].score | 0.08534416556358337 |
| keywords[13].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.1016/j.procs.2018.07.043 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S120348307 |
| locations[0].source.issn | 1877-0509 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1877-0509 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Procedia Computer Science |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Procedia Computer Science |
| locations[0].landing_page_url | https://doi.org/10.1016/j.procs.2018.07.043 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5057825539 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | V. M. Manikandan |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I39244652 |
| authorships[0].affiliations[0].raw_affiliation_string | Indian Institute of Information Technology Design and Manufacturing Kancheepuram, Chennai-600127, India |
| authorships[0].institutions[0].id | https://openalex.org/I39244652 |
| authorships[0].institutions[0].ror | https://ror.org/023c9pb11 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I39244652 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Indian Institute of Information Technology, Design and Manufacturing, Kancheepuram |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | V.M. Manikandan |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Indian Institute of Information Technology Design and Manufacturing Kancheepuram, Chennai-600127, India |
| authorships[1].author.id | https://openalex.org/A5017252969 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | V. Masilamani |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I39244652 |
| authorships[1].affiliations[0].raw_affiliation_string | Indian Institute of Information Technology Design and Manufacturing Kancheepuram, Chennai-600127, India |
| authorships[1].institutions[0].id | https://openalex.org/I39244652 |
| authorships[1].institutions[0].ror | https://ror.org/023c9pb11 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I39244652 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Indian Institute of Information Technology, Design and Manufacturing, Kancheepuram |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | V. Masilamani |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Indian Institute of Information Technology Design and Manufacturing Kancheepuram, Chennai-600127, India |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.procs.2018.07.043 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Reversible Data Hiding Scheme During Encryption Using Machine Learning |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10388 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Advanced Steganography and Watermarking Techniques |
| related_works | https://openalex.org/W3127228990, https://openalex.org/W2301878849, https://openalex.org/W2054082132, https://openalex.org/W3101977789, https://openalex.org/W2184946989, https://openalex.org/W2907504581, https://openalex.org/W1808511582, https://openalex.org/W1600790868, https://openalex.org/W1998279455, https://openalex.org/W2166257263 |
| cited_by_count | 45 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 3 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 8 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 9 |
| counts_by_year[4].year | 2021 |
| counts_by_year[4].cited_by_count | 12 |
| counts_by_year[5].year | 2020 |
| counts_by_year[5].cited_by_count | 4 |
| counts_by_year[6].year | 2019 |
| counts_by_year[6].cited_by_count | 7 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1016/j.procs.2018.07.043 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S120348307 |
| best_oa_location.source.issn | 1877-0509 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1877-0509 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Procedia Computer Science |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Procedia Computer Science |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.procs.2018.07.043 |
| primary_location.id | doi:10.1016/j.procs.2018.07.043 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S120348307 |
| primary_location.source.issn | 1877-0509 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1877-0509 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Procedia Computer Science |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Procedia Computer Science |
| primary_location.landing_page_url | https://doi.org/10.1016/j.procs.2018.07.043 |
| publication_date | 2018-01-01 |
| publication_year | 2018 |
| referenced_works | https://openalex.org/W2099724512, https://openalex.org/W2105770740, https://openalex.org/W2137288380, https://openalex.org/W2322104612, https://openalex.org/W2572274682, https://openalex.org/W6678272029, https://openalex.org/W2075965608, https://openalex.org/W2124519936, https://openalex.org/W1812030059, https://openalex.org/W6712785368, https://openalex.org/W1570710652, https://openalex.org/W2055488442, https://openalex.org/W1998279455, https://openalex.org/W6604313757, https://openalex.org/W1987442454, https://openalex.org/W6664297395, https://openalex.org/W2103459202, https://openalex.org/W2135459805, https://openalex.org/W2070482985, https://openalex.org/W2067674530, https://openalex.org/W756028442, https://openalex.org/W1750292977, https://openalex.org/W2170269447, https://openalex.org/W2400309217, https://openalex.org/W3023411394, https://openalex.org/W2123218196, https://openalex.org/W2054082132, https://openalex.org/W106414205 |
| referenced_works_count | 28 |
| abstract_inverted_index.A | 126 |
| abstract_inverted_index.a | 5, 47, 83, 114, 156 |
| abstract_inverted_index.In | 77 |
| abstract_inverted_index.be | 60, 66, 105 |
| abstract_inverted_index.by | 55, 108 |
| abstract_inverted_index.in | 19, 33, 50, 134, 202 |
| abstract_inverted_index.is | 4, 46, 154 |
| abstract_inverted_index.of | 9, 25, 38, 74, 100, 150, 180, 204 |
| abstract_inverted_index.on | 184 |
| abstract_inverted_index.to | 59, 68, 85, 118, 138 |
| abstract_inverted_index.EPR | 87, 95, 120, 145 |
| abstract_inverted_index.RDH | 63, 80, 116 |
| abstract_inverted_index.The | 17, 36, 52, 94, 148 |
| abstract_inverted_index.and | 22, 41, 98, 170, 207 |
| abstract_inverted_index.are | 29 |
| abstract_inverted_index.bit | 208 |
| abstract_inverted_index.can | 65, 104 |
| abstract_inverted_index.for | 12, 167 |
| abstract_inverted_index.has | 131, 164 |
| abstract_inverted_index.may | 57 |
| abstract_inverted_index.new | 26, 115 |
| abstract_inverted_index.out | 107 |
| abstract_inverted_index.the | 23, 62, 72, 75, 79, 101, 109, 135, 140, 151, 175, 181, 193, 199 |
| abstract_inverted_index.way | 84 |
| abstract_inverted_index.This | 111 |
| abstract_inverted_index.been | 132, 165 |
| abstract_inverted_index.data | 1, 15, 70, 88, 96, 121, 146, 168 |
| abstract_inverted_index.from | 174, 188 |
| abstract_inverted_index.into | 89 |
| abstract_inverted_index.much | 31 |
| abstract_inverted_index.need | 58 |
| abstract_inverted_index.rate | 206 |
| abstract_inverted_index.than | 198 |
| abstract_inverted_index.that | 155, 192 |
| abstract_inverted_index.used | 67, 133, 166 |
| abstract_inverted_index.very | 30 |
| abstract_inverted_index.with | 143 |
| abstract_inverted_index.(EPR) | 45 |
| abstract_inverted_index.(RDH) | 3 |
| abstract_inverted_index.(SVM) | 160 |
| abstract_inverted_index.OsriX | 189 |
| abstract_inverted_index.based | 161 |
| abstract_inverted_index.bits. | 147 |
| abstract_inverted_index.data. | 76 |
| abstract_inverted_index.embed | 86, 119 |
| abstract_inverted_index.error | 209 |
| abstract_inverted_index.field | 8 |
| abstract_inverted_index.image | 40, 103, 123, 128, 142, 171 |
| abstract_inverted_index.owner | 73 |
| abstract_inverted_index.rate. | 210 |
| abstract_inverted_index.shows | 191 |
| abstract_inverted_index.study | 179 |
| abstract_inverted_index.terms | 203 |
| abstract_inverted_index.and/or | 71 |
| abstract_inverted_index.before | 92 |
| abstract_inverted_index.better | 197 |
| abstract_inverted_index.common | 48 |
| abstract_inverted_index.during | 122 |
| abstract_inverted_index.hidden | 144 |
| abstract_inverted_index.hiding | 2 |
| abstract_inverted_index.image. | 177 |
| abstract_inverted_index.images | 53, 91, 187 |
| abstract_inverted_index.obtain | 139 |
| abstract_inverted_index.recent | 6 |
| abstract_inverted_index.robots | 56 |
| abstract_inverted_index.scheme | 117, 137, 153, 163, 183, 195 |
| abstract_inverted_index.useful | 32 |
| abstract_inverted_index.vector | 158 |
| abstract_inverted_index.carried | 106 |
| abstract_inverted_index.dataset | 190 |
| abstract_inverted_index.digital | 14 |
| abstract_inverted_index.machine | 159 |
| abstract_inverted_index.medical | 27, 39, 90, 186 |
| abstract_inverted_index.novelty | 149 |
| abstract_inverted_index.patient | 43 |
| abstract_inverted_index.process | 49, 173 |
| abstract_inverted_index.provide | 82 |
| abstract_inverted_index.records | 44 |
| abstract_inverted_index.schemes | 64, 201 |
| abstract_inverted_index.secured | 13 |
| abstract_inverted_index.support | 157 |
| abstract_inverted_index.captured | 54 |
| abstract_inverted_index.existing | 200 |
| abstract_inverted_index.original | 102 |
| abstract_inverted_index.performs | 196 |
| abstract_inverted_index.process. | 125 |
| abstract_inverted_index.proposed | 136, 152, 182, 194 |
| abstract_inverted_index.proposes | 113 |
| abstract_inverted_index.recovery | 99, 172 |
| abstract_inverted_index.research | 7 |
| abstract_inverted_index.robotics | 28 |
| abstract_inverted_index.security | 11 |
| abstract_inverted_index.standard | 185 |
| abstract_inverted_index.addition, | 78 |
| abstract_inverted_index.embedding | 205 |
| abstract_inverted_index.encrypted | 141, 176 |
| abstract_inverted_index.invention | 24 |
| abstract_inverted_index.receiver. | 110 |
| abstract_inverted_index.technique | 130 |
| abstract_inverted_index.Reversible | 0 |
| abstract_inverted_index.block-wise | 127 |
| abstract_inverted_index.electronic | 42 |
| abstract_inverted_index.encryption | 124, 129 |
| abstract_inverted_index.extraction | 97, 169 |
| abstract_inverted_index.manuscript | 112 |
| abstract_inverted_index.techniques | 81 |
| abstract_inverted_index.technology | 21 |
| abstract_inverted_index.information | 10 |
| abstract_inverted_index.Experimental | 178 |
| abstract_inverted_index.advancements | 18 |
| abstract_inverted_index.authenticate | 69 |
| abstract_inverted_index.telemedicine | 34 |
| abstract_inverted_index.transmission | 37 |
| abstract_inverted_index.applications. | 35 |
| abstract_inverted_index.communication | 20 |
| abstract_inverted_index.telemedicine. | 51 |
| abstract_inverted_index.transmission. | 16, 93 |
| abstract_inverted_index.authenticated, | 61 |
| abstract_inverted_index.classification | 162 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 95 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.92172883 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |