{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:24:48Z","timestamp":1725805488804},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662450482"},{"type":"electronic","value":"9783662450499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45049-9_20","type":"book-chapter","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T06:07:14Z","timestamp":1411106834000},"page":"123-127","source":"Crossref","is-referenced-by-count":0,"title":["DNA-Chip-Based Information Hiding Scheme"],"prefix":"10.1007","author":[{"given":"Xiwen","family":"Fang","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1126\/science.270.5235.467","volume":"270","author":"M. Schena","year":"1995","unstructured":"Schena, M., Shalon, D., Davis, R.W., Brown, P.O.: Quantitative monitoring of gene expression patterns with a complementary DNA microarray. Science\u00a0270, 467\u2013470 (1995)","journal-title":"Science"},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/s11432-007-0025-6","volume":"50","author":"M.X. Lu","year":"2007","unstructured":"Lu, M.X., Lai, X.J., Xiao, G.Z., Qin, L.: Symmetric-key cryptosystem with DNA technology. Science China Information Sciences\u00a050(3), 324\u2013333 (2007)","journal-title":"Science China Information Sciences"},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/s11432-010-0063-3","volume":"53","author":"X.J. Lai","year":"2010","unstructured":"Lai, X.J., Lu, M.X., Qin, L., Han, J.S., Fang, X.W.: Asymmetric encryption and signature method with DNA technology. Science China Information Sciences\u00a053(3), 506\u2013514 (2010)","journal-title":"Science China Information Sciences"},{"key":"20_CR4","unstructured":"Fang, X.W., Lai, X.J.: DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys. Science China Information Sciences (accepted)"},{"issue":"3.4","key":"20_CR5","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035(3.4), 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"issue":"3","key":"20_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple lsb substitution. Pattern Recognition\u00a037(3), 469\u2013474 (2004)","journal-title":"Pattern Recognition"},{"issue":"3","key":"20_CR7","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/4236.935180","volume":"5","author":"D. Artz","year":"2001","unstructured":"Artz, D.: Digital steganography: hiding data within data. IEEE Internet Computing\u00a05(3), 75\u201380 (2001)","journal-title":"IEEE Internet Computing"},{"issue":"3","key":"20_CR8","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z.C. Ni","year":"2006","unstructured":"Ni, Z.C., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology\u00a016(3), 354\u2013362 (2006)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing - Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45049-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T19:10:40Z","timestamp":1558984240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45049-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662450482","9783662450499"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45049-9_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}