{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:19:26Z","timestamp":1761977966721,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642398902"},{"type":"electronic","value":"9783642398919"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39891-9_13","type":"book-chapter","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T05:28:17Z","timestamp":1380605297000},"page":"204-219","source":"Crossref","is-referenced-by-count":6,"title":["Finding Data in DNA: Computer Forensic Investigations of Living Organisms"],"prefix":"10.1007","author":[{"given":"Marc B.","family":"Beck","sequence":"first","affiliation":[]},{"given":"Eric C.","family":"Rouchka","sequence":"additional","affiliation":[]},{"given":"Roman V.","family":"Yampolskiy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Anam, B., Sakib, K., Hossain, A., Dahal, K.: Review on the Advancements of DNA Cryptography. In: International Conference on Software, Knowledge, Information Management and Application, Paro, Bhutan, August 25-27 (2010)"},{"issue":"1","key":"13_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.tibs.2003.11.009","volume":"29","author":"M. Nirenberg","year":"2004","unstructured":"Nirenberg, M.: Historical review: Deciphering the genetic code \u2013 a personal account. Trends in Biochemical Sciences\u00a029(1), 46\u201354 (2004)","journal-title":"Trends in Biochemical Sciences"},{"key":"13_CR3","unstructured":"Jiao, S.-H., Goutte, R.: Code For Encryption Hiding Data Into Genomic DNA. In: International Conference on Software Process (2008)"},{"issue":"5187","key":"13_CR4","first-page":"1021","volume":"266","author":"L.M. Adleman","year":"1994","unstructured":"Adleman, L.M.: Molecular Computation of Solutions To Combinatorial Problems. Science, New Series\u00a0266(5187), 1021\u20131024 (1994)","journal-title":"Science, New Series"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Ogihara, M., Ray, A.: Simulating Boolean Circuits on a DNA Computer. RECOMB (1997)","DOI":"10.1145\/267521.267759"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1016\/j.pnsc.2007.12.009","volume":"18","author":"C.M. Bogard","year":"2007","unstructured":"Bogard, C.M., Rouchka, E.C., Arazi, B.: DNA media storage. Progress in Natural Science\u00a018, 603\u2013609 (2007)","journal-title":"Progress in Natural Science"},{"issue":"5","key":"13_CR7","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1021\/bp049917i","volume":"20","author":"M. Arita","year":"2004","unstructured":"Arita, M., Ohashi, Y.: Secret Signatures Inside Genomic DNA. Biotechnology Progress\u00a020(5), 1605\u20131607 (2004)","journal-title":"Biotechnology Progress"},{"issue":"2","key":"13_CR8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1021\/bp060261y","volume":"23","author":"N. Yachie","year":"2007","unstructured":"Yachie, N., Sekiyama, K., Sugahara, J., Ohashi, Y., Tomita, M.: Alignment-Based Approach for Durable Data Storage into Living Organisms. Biotechnology Progress\u00a023(2), 4 (2007); (Epub January 25, 2007)","journal-title":"Biotechnology Progress"},{"issue":"5","key":"13_CR9","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/986213.986244","volume":"47","author":"M. Arita","year":"2004","unstructured":"Arita, M.: Comma-free design for DNA words. Communications of the ACM\u00a047(5), 99 (2004)","journal-title":"Communications of the ACM"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Heider, D., Barnekow, A.: DNA-based watermarks using the DNA-Crypt algorithm. BMC Bioinformatics\u00a08, 176 (2007) (Epub May 31, 2007)","DOI":"10.1186\/1471-2105-8-176"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature, 533\u2013534 (1999)","DOI":"10.1038\/21092"},{"issue":"4","key":"13_CR12","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1073\/pnas.97.4.1665","volume":"97","author":"S. Brenner","year":"2000","unstructured":"Brenner, S., Williams, S.R., Vermaas, E.H., Storck, T., Moon, K., McCollum, C., et al.: In vitro cloning of complex mixtures of DNA on microbeads: Physical separation of differentially expressed cDNAs. Proceedings of the National Academy of Sciences of the United States of America\u00a097(4), 1665\u20131670 (2000)","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"issue":"3","key":"13_CR13","doi-asserted-by":"publisher","first-page":"181","DOI":"10.4236\/ns.2009.13023","volume":"1","author":"S.-H. Jiao","year":"2009","unstructured":"Jiao, S.-H., Goutte, R.: Hiding data in DNA of living organisms. Natural Science\u00a01(3), 181\u2013184 (2009)","journal-title":"Natural Science"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Heider, D., Barnekow, A.: DNA watermarks: A proof of concept. BMC Molecular Biology\u00a09, 40 (2008); (Epub April 23, 2008)","DOI":"10.1186\/1471-2199-9-40"},{"issue":"5987","key":"13_CR15","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1126\/science.1190719","volume":"329","author":"D.G. Gibson","year":"2010","unstructured":"Gibson, D.G., Glass, J.I., Lartigue, C., Noskov, V.N., Chuang, R.Y., Algire, M.A., et al.: Creation of a bacterial cell controlled by a chemically synthesized genome. Science\u00a0329(5987), 52\u201356 (2010); (Epub May 22, 2010)","journal-title":"Science"},{"issue":"5536","key":"13_CR16","first-page":"1763","volume":"293","author":"C. Bancroft","year":"2001","unstructured":"Bancroft, C., Bowler, T., Bloom, B., Clelland, C.T.: Long-Term Storage of Information in DNA. Science, New Series\u00a0293(5536), 1763\u20131765 (2001)","journal-title":"Science, New Series"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"A Y3K bug.pdf. nature biotechnology 18 (2000)","DOI":"10.1038\/71857"},{"issue":"4","key":"13_CR18","first-page":"20","volume":"148","author":"J.W. Drake","year":"1998","unstructured":"Drake, J.W., Charlesworth, B., Charlesworth, D., Crow, J.F.: Rates of Spontaneous mutation. Genetics\u00a0148(4), 20 (1998)","journal-title":"Genetics"},{"issue":"14","key":"13_CR19","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1023\/A:1024539608706","volume":"25","author":"G.C. Smith","year":"2003","unstructured":"Smith, G.C., Fiddes, C.C., Hawkins, J.P., Cox, J.P.L.: Some possible codes for encrypting data in DNA. Biotechnology Letters\u00a025(14), 1125\u20131130 (2003)","journal-title":"Biotechnology Letters"},{"issue":"1","key":"13_CR20","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/602421.602426","volume":"46","author":"P.C. Wong","year":"2003","unstructured":"Wong, P.C., Wong, K.-K., Foote, H.: Organic Data Memory Using the DNA Approach. Communications of the ACM\u00a046(1), 95\u201398 (2003)","journal-title":"Communications of the ACM"},{"issue":"1","key":"13_CR21","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.biosystems.2005.01.004","volume":"81","author":"K. Tanaka","year":"2005","unstructured":"Tanaka, K., Okamoto, A., Saito, I.: Public-key system using DNA as a one-way function for key distribution. Bio Systems\u00a081(1), 25\u201329 (2005); (Epub May 27, 2005)","journal-title":"Bio Systems"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Huffman, D.A.: A Method for the Construction of Minimum-Redundancy Codes. In: Proceedings of the IRE, pp. 1098\u20131102 (1952)","DOI":"10.1109\/JRPROC.1952.273898"},{"key":"13_CR23","volume-title":"The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography","author":"S. Singh","year":"1999","unstructured":"Singh, S.: The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. Doubleday, New York (1999)"},{"issue":"6","key":"13_CR24","first-page":"1","volume":"6","author":"D.C. Jupiter","year":"2010","unstructured":"Jupiter, D.C., Ficht, T.A., Qin, Q.-M., de Figueiredo, P.: DNA Watermarking of Infectious Agents Progress and Prospects. Public Library of Science Pathogens\u00a06(6), 1\u20133 (2010)","journal-title":"Public Library of Science Pathogens"},{"key":"13_CR25","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis: The Investigation of Hidden Information. In: IEEE Information Technology Conference, Syracuse, NY (1998)"},{"issue":"3","key":"13_CR26","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TIFS.2009.2025841","volume":"4","author":"B. Li","year":"2009","unstructured":"Li, B., Huang, J., Shi, Y.Q.: Steganalysis of YASS. IEEE Transactions on Information Forensics and Security\u00a04(3), 369\u2013382 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Xin-guang, S., Hui, L., Zhong-liang, Z.: A Steganalysis Method Based on the Distribution of Characters.pdf. In: 8th International Conference on Signal Processing, Beijing, China (2006)","DOI":"10.1109\/ICOSP.2006.345973"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Wang, G., Zhang, W.: A steganalysis-based approach to comprehensive identification and characterization of functional regulatory elements. Genome Biology\u00a07(6), R49 (2006); (Epub June 22, 2006)","DOI":"10.1186\/gb-2006-7-6-r49"},{"issue":"1","key":"13_CR29","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1080\/0161-119391867746","volume":"17","author":"R. Spillman","year":"1993","unstructured":"Spillman, R., Janssen, M., Nelson, B., Kepner, M.: Use of a Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers. Cryptologia\u00a017(1), 31\u201344 (1993)","journal-title":"Cryptologia"},{"key":"13_CR30","volume-title":"Genetic Algorithms in Cryptography","author":"B. Delman","year":"2004","unstructured":"Delman, B.: Genetic Algorithms in Cryptography. Rochester Institute of Technology, Rochester (2004)"},{"key":"13_CR31","unstructured":"Hasinoff, S.: Solving Substitution Ciphers. A Technical Report, University of Toronto (2003)"},{"key":"13_CR32","first-page":"1582","volume-title":"CCECE+CCGEI","author":"M.F. Uddin","year":"2006","unstructured":"Uddin, M.F., Youssef, A.M.: An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers. In: CCECE+CCGEI, May 7-10, pp. 1582\u20131585. IEEE, Ottawa (2006)"},{"key":"13_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/0-387-34799-2_11","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"M. Lucks","year":"1990","unstructured":"Lucks, M.: A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 132\u2013144. Springer, Heidelberg (1990)"},{"issue":"9","key":"13_CR34","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1145\/182987.184078","volume":"37","author":"G.W. Hart","year":"1994","unstructured":"Hart, G.W.: To decode short Cryptograms. Communications of the ACM\u00a037(9), 102\u2013108 (1994)","journal-title":"Communications of the ACM"},{"issue":"3","key":"13_CR35","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1080\/0161-119591883944","volume":"19","author":"T. Jakobsen","year":"1995","unstructured":"Jakobsen, T.: A fast method for cryptanalysis of substitution ciphers. Cryptologia\u00a019(3), 265\u2013274 (1995)","journal-title":"Cryptologia"},{"issue":"4","key":"13_CR36","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1080\/0161-119391868033","volume":"17","author":"W.S. Forsyth","year":"1993","unstructured":"Forsyth, W.S., Safavi-Nani, R.: Automated Cryptanalysis of substitution ciphers. Cryptologia\u00a017(4), 407\u2013424 (1993)","journal-title":"Cryptologia"},{"issue":"11","key":"13_CR37","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1145\/359168.359174","volume":"22","author":"S. Peleg","year":"1979","unstructured":"Peleg, S., Rosenfeld, A.: Breaking Substitution Ciphers Using a Relaxation Algorithm. Communications of the ACM\u00a022(11), 598\u2013605 (1979)","journal-title":"Communications of the ACM"},{"key":"13_CR38","unstructured":"Modegi, T.: Watermark Embedding Techniques for DNA Sequences Using Codon Usage Bias Features. In: 16th International Conference on Genome Informatics, Yokohama, Japan (2005)"},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Yampolskiy, R.V., El-Barkouky, A.: Wisdom of artificial crowds algorithm for solving NP-had problems. International Journal of Bio-Inspired Computation\u00a03(6) (2011)","DOI":"10.1504\/IJBIC.2011.043624"},{"key":"13_CR40","doi-asserted-by":"crossref","unstructured":"Yampolskiy, R.V., Ashby, L.H.: Genetic Algorithm and Wisdom of Artificial Crowds Algorithm Applied to Light Up. In: The 16th International Conference on Computer Games, Louisville, KY, pp. 27\u201332 (2011)","DOI":"10.1109\/CGAMES.2011.6000341"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39891-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T15:04:07Z","timestamp":1746025447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39891-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642398902","9783642398919"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39891-9_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}