{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T12:01:15Z","timestamp":1770033675618,"version":"3.49.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100023674","name":"Deanship of Scientific Research, King Khalid University","doi-asserted-by":"publisher","award":["RGP2\/274\/46"],"award-info":[{"award-number":["RGP2\/274\/46"]}],"id":[{"id":"10.13039\/501100023674","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s00034-025-03266-8","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T10:44:40Z","timestamp":1757414680000},"page":"9-29","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Image Security Using Pseudo-Memristive-Based Steganography"],"prefix":"10.1007","volume":"45","author":[{"given":"Shikha","family":"Khurana","sequence":"first","affiliation":[]},{"given":"Vandana","family":"Khanna","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2714-6478","authenticated-orcid":false,"given":"Shaveta","family":"Arora","sequence":"additional","affiliation":[]},{"given":"Neeraj Kumar","family":"Shukla","sequence":"additional","affiliation":[]},{"given":"Mainak","family":"Basu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"3266_CR1","doi-asserted-by":"publisher","first-page":"107661","DOI":"10.1016\/j.bspc.2025.107661","volume":"105","author":"SN Batool","year":"2025","unstructured":"S.N. Batool, J. Yang, G. Gilanie, A. Latif, S. Yasin, A. Ikram, L.Y. Por, Forensic radiology: a robust approach to biological profile Estimation from bone image analysis using deep learning. Biomed. Signal. Process. Control 105, 107661 (2025). https:\/\/doi.org\/10.1016\/j.bspc.2025.107661","journal-title":"Biomed. Signal. Process. Control"},{"key":"3266_CR2","doi-asserted-by":"publisher","first-page":"7340","DOI":"10.1038\/s41598-025-92082-w","volume":"15","author":"L Bohang","year":"2025","unstructured":"L. Bohang, N. Li, J. Yang, O. Alfarraj, F. Albelhai, A. Tolba, Z.A. Shaikh, R. Alizadehsani, P. P\u0142awiak, L.Y. Por, Image steganalysis using active learning and hyperparameter optimization. Sci. Rep. 15, 7340 (2025). https:\/\/doi.org\/10.1038\/s41598-025-92082-w","journal-title":"Sci. Rep."},{"issue":"1","key":"3266_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-022-23629-4","volume":"12","author":"S Carapezzi","year":"2022","unstructured":"S. Carapezzi, C. Delacour, A. Plews, A. Nejim, S. Karg, A. Todri-Sanial, Role of ambient temperature in modulation of behavior of vanadium dioxide volatile memristors and oscillators for neuromorphic applications. Sci. Rep. 12(1), 1\u201312 (2022). https:\/\/doi.org\/10.1038\/s41598-022-23629-4","journal-title":"Sci. Rep."},{"issue":"12","key":"3266_CR4","doi-asserted-by":"publisher","first-page":"120501","DOI":"10.1063\/1.5142089","volume":"116","author":"E Chicca","year":"2020","unstructured":"E. Chicca, G. Indiveri, A recipe for creating ideal hybrid memristive-CMOS neuromorphic processing systems. Appl. Phys. Lett. 116(12), 120501 (2020). https:\/\/doi.org\/10.1063\/1.5142089","journal-title":"Appl. Phys. Lett."},{"issue":"5","key":"3266_CR5","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TCT.1971.1083337","volume":"18","author":"LO Chua","year":"1971","unstructured":"L.O. Chua, Memristor - the missing circuit element. IEEE Trans. Circ. Theory. 18(5), 507\u2013519 (1971). https:\/\/doi.org\/10.1109\/TCT.1971.1083337","journal-title":"IEEE Trans. Circ. Theory"},{"issue":"2","key":"3266_CR6","doi-asserted-by":"publisher","first-page":"373","DOI":"10.24425\/ijet.2020.131888","volume":"66","author":"J Domaradzki","year":"2020","unstructured":"J. Domaradzki, D. Wojcieszak, T. Kotwica, E. Ma\u0144kowska, Memristors: a short review on fundamentals, structures, materials and applications. Int. J. Electron. Telecommun. 66(2), 373\u2013381 (2020)","journal-title":"Int. J. Electron. Telecommun."},{"key":"3266_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17998-9","author":"M EL-Hady","year":"2024","unstructured":"M. EL-Hady, M.H. Abbas, F.A. Khanday, L.A. Said, A.G. Radwan, DISH: digital image steganography using stochastic-computing with high-capacity. Multimed. Tools Appl. (2024). https:\/\/doi.org\/10.1007\/s11042-023-17998-9","journal-title":"Multimed. Tools Appl."},{"key":"3266_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.optlastec.2019.03.005","volume":"116","author":"AAA EL-Latifa","year":"2019","unstructured":"A.A.A. EL-Latifa, B. Abd-El-Attya, S.E. Venegas-Andracac, A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 116, 92\u2013102 (2019). https:\/\/doi.org\/10.1016\/j.optlastec.2019.03.005","journal-title":"Opt. Laser Technol."},{"key":"3266_CR9","doi-asserted-by":"publisher","first-page":"116457","DOI":"10.1109\/ACCESS.2024.3447075","volume":"12","author":"M Gabr","year":"2024","unstructured":"M. Gabr, A. Diab, H.T. Elshoush, Y.L. Chen, L.Y. Por, C.S. Ku, Data security utilizing a memristive coupled neural network in 3D models. IEEE Access 12, 116457\u2013116477 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3447075","journal-title":"IEEE Access."},{"issue":"1","key":"3266_CR10","doi-asserted-by":"publisher","first-page":"16895","DOI":"10.1038\/s41598-022-17362-1","volume":"12","author":"V Himthani","year":"2022","unstructured":"V. Himthani, V.S. Dhaka, M. Kaur, G. Rani, M. Oza, H.N. Lee, Comparative performance assessment of deep learning based image steganography techniques. Sci. Rep. 12(1), 16895 (2022). https:\/\/doi.org\/10.1038\/s41598-022-17362-1","journal-title":"Sci. Rep."},{"key":"3266_CR11","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s11432-011-4410-9","volume":"55","author":"X Hu","year":"2012","unstructured":"X. Hu, S. Duan, L. Wang, X. Liao, Memristive crossbar array with applications in image processing. Sci. China Inf. Sci. 55, 461\u2013472 (2012). https:\/\/doi.org\/10.1007\/s11432-011-4410-9","journal-title":"Sci. China Inf. Sci."},{"issue":"12","key":"3266_CR12","doi-asserted-by":"publisher","first-page":"7928","DOI":"10.1109\/TCSVT.2023.3275708","volume":"33","author":"X Ji","year":"2023","unstructured":"X. Ji, Z. Dong, Y. Han, C.S. Lai, D. Qi, A brain-inspired hierarchical interactive in-memory computing system and its application in video sentiment analysis. IEEE Trans. Circ. Syst. Video Technol. 33(12), 7928\u20137942 (2023). https:\/\/doi.org\/10.1109\/TCSVT.2023.3275708","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"4","key":"3266_CR13","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TCE.2023.3263672","volume":"69","author":"X Ji","year":"2023","unstructured":"X. Ji, Z. Dong, Y. Han, C.S. Lai, G. Zhou, D. Qi, An energy-efficient memristive sequencer network for human emotion classification in mental health monitoring. IEEE Trans. Consum. Electron. 69(4), 1005\u20131016 (2023). https:\/\/doi.org\/10.1109\/TCE.2023.3263672","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"8","key":"3266_CR14","doi-asserted-by":"publisher","first-page":"5137","DOI":"10.1109\/TSMC.2024.3392732","volume":"54","author":"X Ji","year":"2024","unstructured":"X. Ji, Z. Dong, G. Zhou, C.S. Lai, D. Qi, Multimodal local-global neuromorphic computing system for affective video content analysis. IEEE Trans. Syst. Man. Cybern Syst. 54(8), 5137\u20135149 (2024). https:\/\/doi.org\/10.1109\/TSMC.2024.3392732","journal-title":"IEEE Trans. Syst. Man. Cybern Syst."},{"key":"3266_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2024.3392648","author":"X Ji","year":"2024","unstructured":"X. Ji, Z. Dong, G. Zhou, C.S. Lai, Y. Yan, D. Qi, An efficient human activity recognition in-memory computing architecture development for healthcare monitoring. IEEE J. Biomed. Health Inf. (2024). https:\/\/doi.org\/10.1109\/JBHI.2024.3392648","journal-title":"IEEE J. Biomed. Health Inf."},{"issue":"24","key":"3266_CR16","doi-asserted-by":"publisher","first-page":"3176","DOI":"10.3390\/electronics10243176","volume":"10","author":"X Ji","year":"2021","unstructured":"X. Ji, Z. Dong, G. Zhou, C.S. Lai, Y. Yan, D. Qi, Memristive system based image processing technology: a review and perspective. Electron. 10(24), 3176 (2021). https:\/\/doi.org\/10.3390\/electronics10243176","journal-title":"Electron"},{"issue":"5","key":"3266_CR17","doi-asserted-by":"publisher","first-page":"5437","DOI":"10.48047\/nq.2022.20.5.nq22828","volume":"20","author":"S Kapila","year":"2022","unstructured":"S. Kapila, V. Khanna, N.K. Shukla, M. Basu, A pseudo-memristive system for analog neuromorphic computing. NeuroQuantology. 20(5), 5437\u20135449 (2022). https:\/\/doi.org\/10.48047\/nq.2022.20.5.nq22828","journal-title":"NeuroQuantology"},{"issue":"7","key":"3266_CR18","doi-asserted-by":"publisher","first-page":"3586","DOI":"10.14704\/nq.2022.20.7.NQ33440","volume":"20","author":"S Kapila","year":"2022","unstructured":"S. Kapila, V. Khanna, N.K. Shukla, M. Basu, Design of programmable analog and neuromorphic computing circuits using pseudo-memristive effect. NeuroQuantology. 20(7), 3586\u20133594 (2022). https:\/\/doi.org\/10.14704\/nq.2022.20.7.NQ33440","journal-title":"NeuroQuantology"},{"issue":"2","key":"3266_CR19","first-page":"39","volume":"29","author":"B Karakaya","year":"2017","unstructured":"B. Karakaya, M.E. \u015eahin, H. G\u00fcler, A. G\u00fclten, Memrist\u00f6r Tabanl\u0131 Kaotik Devre modelinin FPGA Ortam\u0131nda Tasar\u0131m\u0131 ve ger\u00e7eklenmesi. Firat Univ. J. Sci. 29(2), 39\u201344 (2017)","journal-title":"Firat Univ. J. Sci."},{"key":"3266_CR20","doi-asserted-by":"publisher","unstructured":"R. Kaur, B. Singh, A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map. Multimed. Tools Appl. 80, 14665\u201314691 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10528-5","DOI":"10.1007\/s11042-021-10528-5"},{"key":"3266_CR21","doi-asserted-by":"publisher","first-page":"100502","DOI":"10.1016\/j.eij.2024.100502","volume":"27","author":"AA Khan","year":"2024","unstructured":"A.A. Khan, Y.L. Chen, F. Hajjej, A.A. Shaikh, J. Yang, C.S. Ku, L.Y. Por, Digital forensics for the socio-cyber world (DF-SCW): a novel framework for deepfake multimedia investigation on social media platforms. Egypt. Inf. J. 27, 100502 (2024). https:\/\/doi.org\/10.1016\/j.eij.2024.100502","journal-title":"Egypt. Inf. J."},{"issue":"1","key":"3266_CR22","doi-asserted-by":"publisher","first-page":"010501","DOI":"10.1063\/5.0093964","volume":"121","author":"D Kim","year":"2022","unstructured":"D. Kim, B. Jeon, Y. Lee, D. Kim, Y. Cho, S. Kim, Prospects and applications of volatile memristors. Appl. Phys. Lett. 121(1), 010501 (2022). https:\/\/doi.org\/10.1063\/5.0093964","journal-title":"Appl. Phys. Lett."},{"key":"3266_CR23","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1038\/s41928-017-0002-z","volume":"1","author":"C Li","year":"2018","unstructured":"C. Li, M. Hu, Y. Li, H. Jiang, N. Ge, E. Montgomery, J. Zhang, W. Song, N. D\u00e1vila, C.E. Graves, Z. Li, J.P. Strachan, P. Lin, Z. Wang, M. Barnell, Q. Wu, R.S. Williams, J.J. Yang, Q. Xia, Analogue signal and image processing with large memristor crossbars. Nat. Electron. 1, 52\u201359 (2018). https:\/\/doi.org\/10.1038\/s41928-017-0002-z","journal-title":"Nat. Electron."},{"issue":"19","key":"3266_CR24","doi-asserted-by":"publisher","first-page":"14419","DOI":"10.1007\/s00521-023-08401-7","volume":"35","author":"Y Li","year":"2023","unstructured":"Y. Li, L. Xie, P. Xiao, C. Zheng, Q. Hong, Drift speed adaptive memristor model. Neural Comput. Appl. 35(19), 14419\u201314430 (2023). https:\/\/doi.org\/10.1007\/s00521-023-08401-7","journal-title":"Neural Comput. Appl."},{"key":"3266_CR25","unstructured":"P.S.N.R. MathWorks (2024). https:\/\/in.mathworks.com\/help\/vision\/ref\/psnr.html. Accessed 10 Jan 2024"},{"key":"3266_CR26","unstructured":"S.S.I.M. MathWorks (2024). https:\/\/in.mathworks.com\/help\/images\/ref\/ssim.html. Accessed 10 Jan 2024"},{"key":"3266_CR27","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1186\/s42787-019-0061-6","volume":"27","author":"D Nashat","year":"2019","unstructured":"D. Nashat, L. Mamdouh, An efficient steganographic technique for hiding data. J. Egypt. Math. Soc. 27, 57 (2019). https:\/\/doi.org\/10.1186\/s42787-019-0061-6","journal-title":"J. Egypt. Math. Soc."},{"issue":"6","key":"3266_CR28","doi-asserted-by":"publisher","first-page":"939","DOI":"10.18280\/ts.370607","volume":"37","author":"ME Sahin","year":"2020","unstructured":"M.E. Sahin, H. Guler, S.E. Hamamci, Design and realization of a hyperchaotic memristive system for communication system on FPGA. Traitement Signal. 37(6), 939\u2013953 (2020). https:\/\/doi.org\/10.18280\/ts.370607","journal-title":"Traitement Signal."},{"key":"3266_CR29","doi-asserted-by":"publisher","first-page":"82443","DOI":"10.1109\/ACCESS.2024.3404778","volume":"12","author":"L Sana","year":"2024","unstructured":"L. Sana, M.M. Nazir, J. Yang, L. Hussain, Y.L. Chen, C.S. Ku, Securing the IoT cyber environment: enhancing intrusion anomaly detection with vision transformers. IEEE Access. 12, 82443\u201382468 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3404778","journal-title":"IEEE Access."},{"key":"3266_CR30","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1038\/nature06932","volume":"453","author":"DB Strukov","year":"2008","unstructured":"D.B. Strukov, G.S. Snider, D.R. Stewart, R.S. Williams, The missing memristor found. Nature. 453, 80\u201383 (2008). https:\/\/doi.org\/10.1038\/nature06932","journal-title":"Nature"},{"key":"3266_CR31","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1049\/iet-cds.2014.0381","volume":"10","author":"J Sun","year":"2015","unstructured":"J. Sun, L. Yao, X. Zhang, Y. Wang, G. Cui, Generalised mathematical model of memristor. IET Circ. Devices Syst. 10, 244\u2013249 (2015). https:\/\/doi.org\/10.1049\/iet-cds.2014.0381","journal-title":"IET Circ. Devices Syst."},{"issue":"15","key":"3266_CR32","doi-asserted-by":"publisher","first-page":"151903","DOI":"10.1063\/1.5037835","volume":"124","author":"C Sung","year":"2018","unstructured":"C. Sung, H. Hwang, I.K. Yoo, Perspective: a review on memristive hardware for neuromorphic computation. J. Appl. Phys. 124(15), 151903 (2018). https:\/\/doi.org\/10.1063\/1.5037835","journal-title":"J. Appl. Phys."},{"issue":"5","key":"3266_CR33","doi-asserted-by":"publisher","first-page":"2384","DOI":"10.1080\/03772063.2021.1888812","volume":"69","author":"S Thomas","year":"2023","unstructured":"S. Thomas, S. Prakash, S.M. Gopalan, Analysis of fourth-order chaotic circuit based on the memristor model for wireless communication. IETE J. Res. 69(5), 2384\u20132391 (2023). https:\/\/doi.org\/10.1080\/03772063.2021.1888812","journal-title":"IETE J. Res."},{"key":"3266_CR34","unstructured":"University of Waterloo Database https:\/\/links.uwaterloo.ca\/Repository.html. Accessed 2 Jan 2024"},{"key":"3266_CR35","unstructured":"USC-SIPI Image Database https:\/\/sipi.usc.edu\/database. Accessed 2 Jan 2024"},{"issue":"9","key":"3266_CR36","doi-asserted-by":"publisher","first-page":"2000055","DOI":"10.1002\/aisy.202000055","volume":"2","author":"R Wang","year":"2020","unstructured":"R. Wang, J.-Q. Yang, J.-Y. Mao, Z.-P. Wang, S. Wu, M. Zhou, T. Chen, Y. Zhou, S.-T. Han, Recent advances of volatile memristors: devices, mechanisms, and applications. Adv. Intell. Syst. 2(9), 2000055 (2020). https:\/\/doi.org\/10.1002\/aisy.202000055","journal-title":"Adv. Intell. Syst."},{"issue":"1","key":"3266_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40820-024-01338-z","volume":"16","author":"W Wang","year":"2024","unstructured":"W. Wang, Y. Wang, F. Yin, H. Niu, Y.K. Shin, Y. Li, E.S. Kim, N.Y. Kim, Tailoring classical conditioning behavior in TiO2 nanowires: ZnO QDs-based optoelectronic memristors for neuromorphic hardware. Nano-Micro Lett. 16(1), 1\u201316 (2024). https:\/\/doi.org\/10.1007\/s40820-024-01338-z","journal-title":"Nano-Micro Lett."},{"issue":"12","key":"3266_CR38","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSPEC.2008.4687366","volume":"45","author":"RS Williams","year":"2008","unstructured":"R.S. Williams, How we found the missing memristor. IEEE Spectr. 45(12), 28\u201335 (2008). https:\/\/doi.org\/10.1109\/MSPEC.2008.4687366","journal-title":"IEEE Spectr."},{"key":"3266_CR39","doi-asserted-by":"publisher","unstructured":"Y. Xiao, B. Jiang, Z. Zhang, S. Ke, Y. Jin, X. Wen, C. Ye, A review of memristor: material and structure design, device performance, applications and prospects. Sci. Technol. Adv. Mater. 24(1) (2023). https:\/\/doi.org\/10.1080\/14686996.2022.2162323","DOI":"10.1080\/14686996.2022.2162323"},{"issue":"7","key":"3266_CR40","doi-asserted-by":"publisher","first-page":"864","DOI":"10.3390\/e24070864","volume":"24","author":"W Yan","year":"2022","unstructured":"W. Yan, W. Dong, P. Wang, Y. Wang, Y. Xing, Q. Ding, Discrete-time memristor model for enhancing chaotic complexity and application in secure communication. Entropy. 24(7), 864 (2022). https:\/\/doi.org\/10.3390\/e24070864","journal-title":"Entropy"},{"key":"3266_CR41","doi-asserted-by":"publisher","unstructured":"J. Yang, M. Awais, M.A. Hossain, L.Y. Por, M. Haowei, I.M. Mehedi, A.I.M. Iskanderani, Thoughts of brain EEG signal-to-text conversion using weighted feature fusion-based multiscale dilated adaptive densenet with attention mechanism. Biomed. Signal. Process. Control 86(Part A), 105120 (2023). https:\/\/doi.org\/10.1016\/j.bspc.2023.105120","DOI":"10.1016\/j.bspc.2023.105120"},{"key":"3266_CR42","doi-asserted-by":"publisher","unstructured":"J. Yang, H. Qin, L.Y. Por, Z.A. Shaikh, O. Alfarraj, A. Tolba, M. Elghatwary, M. Thwin, Optimizing diabetic retinopathy detection with inception-V4 and dynamic version of snow Leopard optimization algorithm. Biomed. Signal. Process. Control 96(Part A), 106501 (2024). https:\/\/doi.org\/10.1016\/j.bspc.2024.106501","DOI":"10.1016\/j.bspc.2024.106501"},{"issue":"3","key":"3266_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/nsr\/nwae008","volume":"11","author":"Q Zhang","year":"2024","unstructured":"Q. Zhang, Y. Zhang, Y. Luo, H. Yin, New structure transistors for advanced technol. Node CMOS ICs. Natl. Sci. Rev. 11(3), 1\u201318 (2024). https:\/\/doi.org\/10.1093\/nsr\/nwae008","journal-title":"Natl. Sci. Rev."},{"key":"3266_CR44","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.1038\/s41467-023-38021-7","volume":"14","author":"H Zhao","year":"2023","unstructured":"H. Zhao, Z. Liu, J. Tang et al., Energy-efficient high-fidelity image reconstruction with memristor arrays for medical diagnosis. Nat. Commun. 14, 2276 (2023). https:\/\/doi.org\/10.1038\/s41467-023-38021-7","journal-title":"Nat. Commun."},{"key":"3266_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-013-4887-5","volume":"57","author":"J Zhou","year":"2014","unstructured":"J. Zhou, X. Yang, J. Wu, X. Zhu, X. Fang, D. Huang, A memristor-based architecture combining memory and image processing. Sci. China Inf. Sci. 57, 1\u201312 (2014). https:\/\/doi.org\/10.1007\/s11432-013-4887-5","journal-title":"Sci. China Inf. Sci."},{"key":"3266_CR46","doi-asserted-by":"publisher","first-page":"1010613","DOI":"10.3389\/femat.2022.1010613","volume":"2","author":"M Zou","year":"2022","unstructured":"M. Zou, N. Du, S. Kvatinsky, Review of security techniques for memristor computing systems. Front. Electron. Mater. 2, 1010613 (2022). https:\/\/doi.org\/10.3389\/femat.2022.1010613","journal-title":"Front. Electron. Mater."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03266-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-025-03266-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03266-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T01:26:22Z","timestamp":1769995582000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-025-03266-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["3266"],"URL":"https:\/\/doi.org\/10.1007\/s00034-025-03266-8","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"25 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no financial or non-financial conflicts of interest related to this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}