{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:12:52Z","timestamp":1756991572985,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031251146"},{"type":"electronic","value":"9783031251153"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25115-3_10","type":"book-chapter","created":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T13:57:23Z","timestamp":1674914243000},"page":"147-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Robust and\u00a0Imperceptible Watermarking Scheme for\u00a0GWAS Data Traceability"],"prefix":"10.1007","author":[{"given":"Reda","family":"Bellafqira","sequence":"first","affiliation":[]},{"given":"Musab","family":"Al-Ghadi","sequence":"additional","affiliation":[]},{"given":"Emmanuelle","family":"Genin","sequence":"additional","affiliation":[]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,29]]},"reference":[{"issue":"369","key":"10_CR1","first-page":"1","volume":"30","author":"A Mehrgou","year":"2016","unstructured":"Mehrgou, A., Akouchekian, M.: The importance of BRCA1 and BRCA2 genes mutations in breast cancer development. Med. J. Islamic Repub. Iran (MJIRI) 30(369), 1\u201312 (2016)","journal-title":"Med. J. Islamic Repub. Iran (MJIRI)"},{"issue":"7497","key":"10_CR2","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1038\/508451a","volume":"508","author":"G Ginsburg","year":"2014","unstructured":"Ginsburg, G.: Medical genomics: gather and use genetic data in health care. Nat. News 508(7497), 451\u2013453 (2014)","journal-title":"Nat. News"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Wang, M.H., Cordell, H.J., Van Steen, K.:Statistical methods for genome-wide association studies. In: Seminars in Cancer Biology, vol. 55, pp. 53\u201360. Elsevier (2019)","DOI":"10.1016\/j.semcancer.2018.04.008"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Taleb, A., Kirchler, M., Monti, R., Lippert, C.: ContiG: self-supervised multimodal contrastive learning for medical imaging with genetics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 20 908\u201320 921. IEEE (2022)","DOI":"10.1109\/CVPR52688.2022.02024"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Michael, B.E., Yann, L.G., Sarah, E.J., Napolioni, V., Michael, G.D., Zihuai, H.: A fast and robust strategy to remove variant-level artifacts in alzheimer disease sequencing project data. Neurol. Genet. 8(5), e200012 (2022)","DOI":"10.1212\/NXG.0000000000200012"},{"issue":"6","key":"10_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/jpm12060959","volume":"12","author":"J Shin","year":"2022","unstructured":"Shin, J., et al.: PhenGenVar: a user-friendly genetic variant detection and visualization tool for precision medicine. J. Personalized Med. 12(6), 1\u201311 (2022)","journal-title":"J. Personalized Med."},{"issue":"4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1038\/ng1047","volume":"32","author":"K Ozaki","year":"2002","unstructured":"Ozaki, K., et al.: Functional SNPs in the lymphotoxin-$$\\alpha $$ gene that are associated with susceptibility to myocardial infarction. Nat. Genet. 32(4), 650\u2013654 (2002)","journal-title":"Nat. Genet."},{"issue":"2","key":"10_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pgen.1000384","volume":"5","author":"BE Madsen","year":"2009","unstructured":"Madsen, B.E., Browning, S.R.: A groupwise association test for rare mutations using a weighted sum statistic. PLoS Genet. 5(2), 1\u201311 (2009)","journal-title":"PLoS Genet."},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.ins.2019.09.036","volume":"512","author":"H Ding","year":"2020","unstructured":"Ding, H., Tian, Y., Peng, C., Zhang, Y., Xiang, S.: Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals. Inf. Sci. 512, 207\u2013218 (2020)","journal-title":"Inf. Sci."},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-030-11389-6_24","volume-title":"Digital Forensics and Watermarking","author":"R Bellafqira","year":"2019","unstructured":"Bellafqira, R., Coatrieux, G., Genin, E., Cozic, M.: Secure multilayer perceptron based on homomorphic encryption. In: Yoo, C.D., Shi, Y.-Q., Kim, H.J., Piva, A., Kim, G. (eds.) IWDW 2018. LNCS, vol. 11378, pp. 322\u2013336. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11389-6_24"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.asej.2019.03.002","volume":"10","author":"M Rady","year":"2019","unstructured":"Rady, M., Abdelkader, T., Ismail, R.: Integrity and confidentiality in cloud outsourced data. Ain Shams Eng. J. 10, 275\u2013285 (2019)","journal-title":"Ain Shams Eng. J."},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"103714","DOI":"10.1016\/j.jbi.2021.103714","volume":"117","author":"X Wang","year":"2021","unstructured":"Wang, X., Jiang, X., Vaidya, J.: Efficient verification for outsourced genome-wide association studies. J. Biomed. Inform. 117, 103714 (2021)","journal-title":"J. Biomed. Inform."},{"issue":"9","key":"10_CR13","doi-asserted-by":"crossref","first-page":"1160","DOI":"10.1002\/cpe.1566","volume":"22","author":"J Wang","year":"2010","unstructured":"Wang, J., Du, X., Lu, J., Lu, W.: Bucket-based authentication for outsourced databases. Concurrency Comput. Pract. Experience 22(9), 1160\u20131180 (2010)","journal-title":"Concurrency Comput. Pract. Experience"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-11389-6_12","volume-title":"Digital Forensics and Watermarking","author":"David Niyitegeka","year":"2019","unstructured":"Niyitegeka, David, Coatrieux, Gouenou, Bellafqira, Reda, Genin, Emmanuelle, Franco-Contreras, Javier: Dynamic watermarking-based integrity protection of homomorphically encrypted databases \u2013 application to outsourced genetic data. In: Yoo, Chang D.., Shi, Yun-Qing., Kim, Hyoung Joong, Piva, Alessandro, Kim, Gwangsu (eds.) IWDW 2018. LNCS, vol. 11378, pp. 151\u2013166. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11389-6_12"},{"key":"10_CR15","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-031-06365-7_21","volume-title":"Digital Forensics and Cyber Crime","author":"F-Z Boujdad","year":"2022","unstructured":"Boujdad, F.-Z., Niyitegeka, D., Bellafqira, R., Coatrieux, G., G\u00e9nin, E., S\u00fcdholt, M.S.: A hybrid cloud deployment architecture for privacy-preserving collaborative genome-wide association studies. In: Gladyshev, P., Goel, S., James, J., Markowsky, G., Johnson, D. (eds.) ICDFC 2021. LNICST, vol. 441, pp. 342\u2013359. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06365-7_21"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Chen, W.: An artificial chromosome for data storage. Nat. Sci. Rev. 8(5), nwab028 (2021)","DOI":"10.1093\/nsr\/nwab028"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., Cai, K., Song, W., Immink, K.A.S.: Optimal single chromosome-inversion correcting codes for data storage in live DNA. In: IEEE International Symposium on Information Theory (ISIT), pp. 1791\u20131796. IEEE (2022)","DOI":"10.1109\/ISIT50566.2022.9834376"},{"issue":"1","key":"10_CR18","first-page":"1","volume":"16","author":"R Vinodhini","year":"2022","unstructured":"Vinodhini, R., Malathi, P.: Hiding information in the DNA sequence using DNA steganographic algorithms with double-layered security. Int. J. Inf. Secur. Priv. (IJISP) 16(1), 1\u201320 (2022)","journal-title":"Int. J. Inf. Secur. Priv. (IJISP)"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/TNANO.2019.2904842","volume":"18","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Han, Q., Cui, G., Sun, J.: Hiding messages based on DNA sequence and recombinant DNA technique. IEEE Trans. Nanotechnol. 18, 299\u2013307 (2019)","journal-title":"IEEE Trans. Nanotechnol."},{"key":"10_CR20","first-page":"1","volume":"2018","author":"S-H Lee","year":"2018","unstructured":"Lee, S.-H.: Reversible data hiding for DNA sequence using multilevel histogram shifting. Secur. Commun. Netw. 2018, 1\u201313 (2018)","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"10_CR21","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1109\/TCBB.2017.2754496","volume":"15","author":"S Hamad","year":"2017","unstructured":"Hamad, S., Elhadad, A., Khalifa, A.: DNA watermarking using codon postfix technique. IEEE\/ACM Trans. Comput. Biol. Bioinf. 15(5), 1605\u20131610 (2017)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinf."},{"key":"10_CR22","unstructured":"Ayday, E., Yilmaz, E., Yilmaz, A.: Robust optimization-based watermarking scheme for sequential data. In: $$22^{nd}$$ International Symposium on Research in Attacks, Intrusions and Defenses, pp. 323\u2013336 (2019)"},{"issue":"1","key":"10_CR23","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1587\/transinf.2018MUP0003","volume":"102","author":"M Kuribayashi","year":"2019","unstructured":"Kuribayashi, M., Fukushima, T., Funabiki, N.: Robust and secure data hiding for PDF text document. IEICE Trans. Inf. Syst. 102(1), 41\u201347 (2019)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"2","key":"10_CR24","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1093\/bib\/bbs086","volume":"15","author":"S Pabinger","year":"2014","unstructured":"Pabinger, S., et al.: A survey of tools for variant analysis of next-generation genome sequencing data. Brief. Bioinform. 15(2), 256\u2013278 (2014)","journal-title":"Brief. Bioinform."},{"issue":"15","key":"10_CR25","doi-asserted-by":"publisher","first-page":"2156","DOI":"10.1093\/bioinformatics\/btr330","volume":"27","author":"P Danecek","year":"2011","unstructured":"Danecek, P.: The variant call format and VCF tools. Bioinformatics 27(15), 2156\u20132158 (2011)","journal-title":"Bioinformatics"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"27970","DOI":"10.1109\/ACCESS.2022.3157866","volume":"10","author":"S Rani","year":"2022","unstructured":"Rani, S., Halder, R.: Comparative analysis of relational database watermarking techniques: an empirical study. IEEE Access 10, 27970\u201327989 (2022)","journal-title":"IEEE Access"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the $$4^{th}$$ ACM Workshop on Digital Rights Management, pp. 73\u201382 (2004)","DOI":"10.1145\/1029146.1029159"},{"issue":"4","key":"10_CR28","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10_CR29","first-page":"691","volume":"41","author":"E Genin","year":"2017","unstructured":"Genin, E., Redon, R., Deleuze, J.-F., Campion, D., Lambert, J.-C., Dartigues, J.-F.: The French exome (FREX) project: a population-based panel of exomes to help filter out common local variants. Int. Genet. Epidemiol. Soc. 41, 691 (2017)","journal-title":"Int. Genet. Epidemiol. Soc."},{"key":"10_CR30","doi-asserted-by":"publisher","first-page":"112515","DOI":"10.1109\/ACCESS.2020.3002966","volume":"8","author":"R Bellafqira","year":"2020","unstructured":"Bellafqira, R., Ludwig, T.E., Niyitegeka, D., G\u00e9nin, E., Coatrieux, G.: Privacy-preserving genome-wide association study for rare mutations-a secure framework for externalized statistical analysis. IEEE Access 8, 112515\u2013112529 (2020)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25115-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T05:49:52Z","timestamp":1728798592000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25115-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031251146","9783031251153"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25115-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guilin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw.site\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.23","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.43","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}