{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:01:31Z","timestamp":1760709691222,"version":"3.37.3"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,8,24]],"date-time":"2018-08-24T00:00:00Z","timestamp":1535068800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-6551-y","type":"journal-article","created":{"date-parts":[[2018,8,24]],"date-time":"2018-08-24T11:35:10Z","timestamp":1535110510000},"page":"9537-9552","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["BIIIA: a bioinformatics-inspired image identification approach"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9810-6705","authenticated-orcid":false,"given":"Abhimanyu Singh","family":"Garhwal","sequence":"first","affiliation":[]},{"given":"Wei Qi","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,24]]},"reference":[{"key":"6551_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.aci.2014.07.003","volume":"11","author":"NA Abbas","year":"2014","unstructured":"Abbas NA (2014) Image watermark detection techniques using quadtrees. Appl Comput Inform 11:102\u2013115","journal-title":"Appl Comput Inform"},{"issue":"5187","key":"6551_CR2","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L Adleman","year":"1994","unstructured":"Adleman L (1994) Molecular computation of solutions to combinatorial problems. Science 266(5187):1021\u20131024","journal-title":"Science"},{"issue":"3","key":"6551_CR3","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/S0022-2836(05)80360-2","volume":"215","author":"SF Altschul","year":"1990","unstructured":"Altschul SF et al (1990) Basic local alignment search tool. J Mol Biol 215(3):403\u2013410","journal-title":"J Mol Biol"},{"key":"6551_CR4","unstructured":"Bicego M, Lovato P (2012) 2D shape recognition using biological sequence alignment tools. Tsukuba"},{"key":"6551_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.cviu.2015.11.011","volume":"145","author":"M Bicego","year":"2016","unstructured":"Bicego M, Lovato P (2016) A bioinformatics approach to 2D shape classification. Comput Vis Image Underst 145:59\u201369","journal-title":"Comput Vis Image Underst"},{"key":"6551_CR6","doi-asserted-by":"crossref","unstructured":"Bicego M, Danese S, Melzi S, Castellani U (2015) A bioinformatics approach to 3D shape matching. Zurich, Switzerland","DOI":"10.1007\/978-3-319-16220-1_22"},{"key":"6551_CR7","doi-asserted-by":"crossref","unstructured":"Bornholt J et al. (2016) A DNA-based archival storage system. Atlanta, Georgia, USA","DOI":"10.1145\/2872362.2872397"},{"key":"6551_CR8","doi-asserted-by":"crossref","unstructured":"Brassil J, Low S, Maxemchuk NF, O\u2019Gorman L (1994) Electronic marking and identification techniques to discourage document copying. Infocom","DOI":"10.1109\/49.464718"},{"key":"6551_CR9","doi-asserted-by":"crossref","unstructured":"Caronni G (1995) Assuring Ownership Rights for Digital Images. In: Verl\u00e4\u00dfliche IT-Systeme. DUD-Fachbeitr\u00e4ge. s.l.:Vieweg+Teubner Verlag, Wiesbaden, pp. 251-263","DOI":"10.1007\/978-3-322-91094-3_16"},{"issue":"10","key":"6551_CR10","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1038\/nnano.2013.189","volume":"8","author":"NDSY-J Chen","year":"2013","unstructured":"Chen NDSY-J et al (2013) Programmable chemical controllers made from DNA. Nat Nanotechnol 8(10):755\u2013762","journal-title":"Nat Nanotechnol"},{"issue":"6102","key":"6551_CR11","doi-asserted-by":"publisher","first-page":"1628","DOI":"10.1126\/science.1226355","volume":"337","author":"GM Church","year":"2012","unstructured":"Church GM, Gao Y, Kosuri S (2012) Next-generation digital information storage in DNA. Science 337(6102):1628","journal-title":"Science"},{"key":"6551_CR12","unstructured":"ClamavNet (2016) ClamAV\u00ae is an open source antivirus engine for detecting trojans, viruses, malware & other malicious threats. [Online] Available at: \n                    https:\/\/www.clamav.net\/"},{"issue":"6736","key":"6551_CR13","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"CT Clelland","year":"1999","unstructured":"Clelland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399(6736):533\u2013534","journal-title":"Nature"},{"issue":"7","key":"6551_CR14","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0167-7799(01)01671-7","volume":"19","author":"JP Cox","year":"2001","unstructured":"Cox JP (2001) Long-term data storage in DNA. Trends Biotechnol 19(7):247\u2013250","journal-title":"Trends Biotechnol"},{"key":"6551_CR15","first-page":"1","volume":"2","author":"I Cox","year":"2002","unstructured":"Cox I, Miller M (2002) The first 50 years of electronic watermarking. EURASIP J Adv Sign Process 2:1\u20137","journal-title":"EURASIP J Adv Sign Process"},{"issue":"1","key":"6551_CR16","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1080\/00043249.1996.10791743","volume":"55","author":"J Davis","year":"1996","unstructured":"Davis J (1996) Microvenus. Art J 55(1):70\u201374","journal-title":"Art J"},{"key":"6551_CR17","doi-asserted-by":"crossref","unstructured":"Drozda P, G\u00f3recki P, Sopy\u0142a K, Artiemjew P (2013) Visual Words Sequence Alignment for Image Classification. New York, NY, s.n","DOI":"10.1109\/ICCI-CC.2013.6622273"},{"key":"6551_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07173-2_59","volume-title":"Different orderings and visual sequence alignment algorithms for image classification","author":"P Drozda","year":"2014","unstructured":"Drozda P, Sopy\u0142a K, G\u00f3recki P (2014) Different orderings and visual sequence alignment algorithms for image classification. Zakopane, Poland"},{"key":"6551_CR19","unstructured":"Garhwal AS (2018) Bioinformatics-Inspired Analysis for Watermarked Images with Multiple Print and Scan. New Zealand: PhD Thesis, Auckland University of Technology"},{"key":"6551_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/IVCNZ.2017.8402504","volume-title":"Image phylogeny for simulating multiple print-scan","author":"AS Garhwal","year":"2017","unstructured":"Garhwal AS, Yan WQ, Narayanan A (2017) Image phylogeny for simulating multiple print-scan. IVCNZ17, Christchurch New Zealand"},{"issue":"5987","key":"6551_CR21","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1126\/science.1190719","volume":"329","author":"DG Gibson","year":"2010","unstructured":"Gibson DG et al (2010) Creation of bacterial cell controlled by a Cemically Sntheised genomes. Science 329(5987):13\u201322","journal-title":"Science"},{"issue":"7435","key":"6551_CR22","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1038\/nature11875","volume":"494","author":"N Goldman","year":"2013","unstructured":"Goldman N et al (2013) Towards practical, high-capacity, low-maintenance information storage in synthesized DNA. Nature 494(7435):77\u201380","journal-title":"Nature"},{"key":"6551_CR23","unstructured":"Gonzalez W (2008) IEEE, NASA and NOAA, \"DIP3\/e\u2014book images downloads 2008. [online]. Available: , S.L.: imageprocessingplace"},{"key":"6551_CR24","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/0022-2836(82)90398-9","volume":"162","author":"O Gotoh","year":"1982","unstructured":"Gotoh O (1982) An improved algorithm for matching biological sequences. J Mol Biol 162:705\u2013708","journal-title":"J Mol Biol"},{"issue":"8","key":"6551_CR25","doi-asserted-by":"publisher","first-page":"2552","DOI":"10.1002\/anie.201411378","volume":"54","author":"RN Grass","year":"2015","unstructured":"Grass RN et al (2015) Robust chemical preservation of digital information on DNA in silica with error-correcting codes. Angew Chem Int Ed 54(8):2552\u20132555","journal-title":"Angew Chem Int Ed"},{"key":"6551_CR26","doi-asserted-by":"crossref","unstructured":"Homola T, Dohnal V, Zezula P (2011) Searching for sub-images using sequence alignment. Dana Point CA","DOI":"10.1109\/ISM.2011.19"},{"key":"6551_CR27","doi-asserted-by":"crossref","unstructured":"Kiah HM, Puleo GJ, Milenkovic O (2015) Codes for DNA Storage Channels. Jerusalem","DOI":"10.1109\/ITW.2015.7133132"},{"key":"6551_CR28","unstructured":"Kim Y-W, Oh I-S (2004) Watermarking text document images using edge directionm histograms. Pattern Recogn Lett: 1243\u20131251"},{"key":"6551_CR29","doi-asserted-by":"crossref","unstructured":"Kim H-S, Chang H-W, Liu H, Ja L, Lee D (2009) BIM: image matching using biological gene sequence alignment. Cairo","DOI":"10.1109\/ICIP.2009.5414214"},{"key":"6551_CR30","doi-asserted-by":"crossref","unstructured":"Kim H-S, Chang H-W, Lee J, Lee D (2010) BASIL: effective near-duplicate image detection using gene sequence alignment. Milton Keynes, UK","DOI":"10.1007\/978-3-642-12275-0_22"},{"key":"6551_CR31","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ins.2014.03.039","volume":"273","author":"S-H Lee","year":"2014","unstructured":"Lee S-H (2014) DWT based coding DNA watermarking for DNA copyright protection. Inf Sci 273:263\u2013286","journal-title":"Inf Sci"},{"key":"6551_CR32","unstructured":"Lee S-H, Hwang W-J, Lee E-J, Kwon K-R (2014) Coding DNA sequence watermarking. Frontier and Innovation in Future Computing and Communications, Springer: 21\u201327"},{"key":"6551_CR33","unstructured":"Lee S-H, Lee E-J, Hwang W-J, Kwon K-R (n.d.) A watermarking scheme for coding DNA sequences using codon circular code. Lugano, Switzerland"},{"issue":"1","key":"6551_CR34","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0303-2647(00)00083-6","volume":"57","author":"A Leier","year":"2000","unstructured":"Leier A, Richter C, Banzhaf W, Rauhe H (2000) Cryptography with DNA binary strands. Biosystems 57(1):13\u201322","journal-title":"Biosystems"},{"issue":"5","key":"6551_CR35","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1093\/bib\/bbq015","volume":"11","author":"H Li","year":"2010","unstructured":"Li H, Homer N (2010) A survey of sequence alignment algorithms for next-generation sequencing. Brief Bioinform 11(5):473\u2013483","journal-title":"Brief Bioinform"},{"key":"6551_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/IWSDA.2015.7458386","volume-title":"On optimal family of codes for archival DNA storage","author":"D Limbachiya","year":"2015","unstructured":"Limbachiya, D., Dhameliya, V., Khakhar, M. & Gupta, M. K., (2015) On optimal family of codes for archival DNA storage. Bengaluru"},{"issue":"1","key":"6551_CR37","first-page":"215","volume":"1","author":"I Lobo","year":"2008","unstructured":"Lobo I (2008) Basic local alignment search tool (BLAST). Nat Educ 1(1):215","journal-title":"Nat Educ"},{"key":"6551_CR38","doi-asserted-by":"crossref","unstructured":"Lovato P, Bicego M (2012) 2D shapes classification using BLAST. Hiroshima, Japan","DOI":"10.1007\/978-3-642-34166-3_30"},{"key":"6551_CR39","volume-title":"Stockholm","author":"P Lovato","year":"2014","unstructured":"Lovato P et al (2014) S-BLOSUM: classification of 2D shapes with biological sequence alignment. In: Stockholm"},{"key":"6551_CR40","volume-title":"Video-steganography","author":"K Matsui","year":"1994","unstructured":"Matsui, K. & Tanaka, K., (1994) Video-steganography. IMA Intellectual Property Project"},{"key":"6551_CR41","doi-asserted-by":"crossref","unstructured":"Naidu, V. & Narayanan, A., (2014) Further Experiments in Biocomputational Structural Analysis of Malware","DOI":"10.1109\/ICNC.2014.6975904"},{"key":"6551_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31863-9_11","volume-title":"A syntactic approach for detecting viral polymorphic malware variants","author":"V Naidu","year":"2016","unstructured":"Naidu V, Narayanan A (2016a) A syntactic approach for detecting viral polymorphic malware variants. Auckland, New Zealand"},{"key":"6551_CR43","doi-asserted-by":"crossref","unstructured":"Naidu V, Narayanan A (2016b) Needleman-Wunsch and smith-waterman algorithms for identifying viral polymorphic malware variants. Auckland, New Zealand","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.73"},{"key":"6551_CR44","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"48","author":"S Needleman","year":"1970","unstructured":"Needleman S, Wunsch CD (1970) A general method applicable to the search for similarities in the amino acid sequence of two proteins. J Mol Biol 48:443\u2013453","journal-title":"J Mol Biol"},{"key":"6551_CR45","doi-asserted-by":"publisher","first-page":"2670","DOI":"10.1109\/ACCESS.2016.2570812","volume":"4","author":"AS Panah","year":"2016","unstructured":"Panah AS, Schyndel RV, Sellis T, Bertino E (2016) On the properties of non-media digital watermarking: a review of state of the art techniques. IEEE Acess 4:2670\u20132704","journal-title":"IEEE Acess"},{"key":"6551_CR46","unstructured":"Pavel G (2005) Embedding, extraction and detection of digital watermark in spectral images. Lappeenranta, Finland"},{"key":"6551_CR47","doi-asserted-by":"crossref","unstructured":"Praun E, Hoppey H, Finkelstein A 1999. Robust mesh watermarking. Los Angeles, CA, USA","DOI":"10.1145\/311535.311540"},{"issue":"7356","key":"6551_CR48","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1038\/nature10262","volume":"475","author":"L Qian","year":"2011","unstructured":"Qian L, Winfree E, Bruck J (2011) Neural network computation with DNA strand displacement cascades. Nature 475(7356):368\u2013372","journal-title":"Nature"},{"issue":"5","key":"6551_CR49","first-page":"170","volume":"5","author":"KS Rajawat","year":"2014","unstructured":"Rajawat KS, Chaudhary D, Kumar DA (2014) Watermarking text and image with encryption. Int J Sci Eng Res 5(5):170\u2013176","journal-title":"Int J Sci Eng Res"},{"key":"6551_CR50","doi-asserted-by":"crossref","unstructured":"Roberto V, Hofer M (2009) Theia: multispectral image analysis and archaeological survey. Vietri sul Mare, Italy","DOI":"10.1145\/1385569.1385659"},{"key":"6551_CR51","doi-asserted-by":"crossref","unstructured":"Sankoff D (1972) Matching sequences under deletion\/insertion constraints. Proceeding of National Academic Sciences, USA","DOI":"10.1073\/pnas.69.1.4"},{"key":"6551_CR52","unstructured":"Schyndel RV, Tirkel A, Osborne CF (1994) A Digital Watermark"},{"key":"6551_CR53","first-page":"787","volume":"26","author":"P Sellers","year":"1974","unstructured":"Sellers P (1974) On the theory of computation of evolutionary distances. J Appl Math 26:787\u2013493","journal-title":"J Appl Math"},{"issue":"1","key":"6551_CR54","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/0022-2836(81)90087-5","volume":"147","author":"T Smith","year":"1981","unstructured":"Smith T, Waterman M (1981) Identification of common molecular subsequences. J Mol Biol 147(1):195\u2013197","journal-title":"J Mol Biol"},{"key":"6551_CR55","doi-asserted-by":"crossref","unstructured":"Takahashi K, Yaegashi S, Kameda A, Hagiya M (2005) Chain reaction systems based on loop dissociation of DNA. Canada","DOI":"10.1007\/11753681_27"},{"key":"6551_CR56","unstructured":"Turner LF (1989) Digital data security system. s.l. Patent No. IPN WO 89\/08915"},{"key":"6551_CR57","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/0001-8708(76)90202-4","volume":"20","author":"MS Waterman","year":"1976","unstructured":"Waterman MS, Smith TF, Beyer WA (1976) Some Biological Sequence Metrics. Adv Math 20:367\u2013387","journal-title":"Adv Math"},{"issue":"1","key":"6551_CR58","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/602421.602426","volume":"46","author":"PC Wong","year":"2003","unstructured":"Wong PC, Wong K-k, Foote H (2003) Organic data memory using the DNA approach. Commun ACM 46(1):95\u201398","journal-title":"Commun ACM"},{"key":"6551_CR59","doi-asserted-by":"crossref","unstructured":"Wu X, Kan H (2015) A blind dual color images watermarking method via SVD and DNA sequences. Beijing, China","DOI":"10.1007\/978-3-319-38898-4_15"},{"key":"6551_CR60","doi-asserted-by":"crossref","unstructured":"Xie Z, Gao J, Wu K, Zhang J (2011) Brief survey on image semantic analysis and understanding. Dalian, China, s.n., pp. 179-183","DOI":"10.1109\/SoCPaR.2011.6089136"},{"issue":"2","key":"6551_CR61","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/S0031-3203(97)00037-X","volume":"31","author":"K Xu","year":"1998","unstructured":"Xu K, Luxmoore AR, Davies T (1998) Sewer pipe deformation assessment by image analysis of video survey. Pattern Recogn 31(2):169\u2013180","journal-title":"Pattern Recogn"},{"key":"6551_CR62","doi-asserted-by":"publisher","first-page":"14138","DOI":"10.1038\/srep14138","volume":"5","author":"SMHT Yazdi","year":"2015","unstructured":"Yazdi SMHT et al (2015) A rewritable, random-access DNA-based storage system. Sci Rep 5:14138","journal-title":"Sci Rep"},{"key":"6551_CR63","doi-asserted-by":"publisher","first-page":"49","DOI":"10.3389\/fbioe.2014.00049","volume":"2","author":"AK-Y Yim","year":"2014","unstructured":"Yim AK-Y et al (2014) The essential component in DNA-based information storage system: robust error-tolerating module. Front Bioeng Biotechnol 2:49","journal-title":"Front Bioeng Biotechnol"},{"key":"6551_CR64","doi-asserted-by":"publisher","first-page":"1534","DOI":"10.1109\/83.799882","volume":"8","author":"W Zeng","year":"1999","unstructured":"Zeng W, Liu B (1999) A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. IEEE Trans Image Process 8:1534\u20131548","journal-title":"IEEE Trans Image Process"},{"key":"6551_CR65","unstructured":"Zhou CEL, Zemla AT, Lam MW (2007) Structure based analysis for identification of protein signatures: PSCORE Patent No United states Patent 20070244652"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6551-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6551-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6551-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T16:11:58Z","timestamp":1576858318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6551-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,24]]},"references-count":65,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6551"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6551-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,8,24]]},"assertion":[{"value":"18 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}