{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:21:00Z","timestamp":1758709260332},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2014,7,15]],"date-time":"2014-07-15T00:00:00Z","timestamp":1405382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Med Biol Eng Comput"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11517-014-1177-3","type":"journal-article","created":{"date-parts":[[2014,7,14]],"date-time":"2014-07-14T05:19:35Z","timestamp":1405315175000},"page":"741-747","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Hiding message into DNA sequence through DNA coding and chaotic maps"],"prefix":"10.1007","volume":"52","author":[{"given":"Guoyan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hongjun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Abdurahman","family":"Kadir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,15]]},"reference":[{"issue":"4","key":"1177_CR1","first-page":"483","volume":"35","author":"A Awad","year":"2008","unstructured":"Awad A, Assad SE, Wang QX, Vl\u0103deanu C, Bakhache B (2008) Comparative study of 1-D chaotic generators for digital data encryption. IAENG Int J Comput Sci 35(4):483\u2013488","journal-title":"IAENG Int J Comput Sci"},{"issue":"5","key":"1177_CR2","first-page":"1145","volume":"3","author":"CC Chang","year":"2007","unstructured":"Chang CC, Lu TC, Chang YF, Lee RCT (2007) Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium. Int J Innov Comput Inf Control 3(5):1145\u20131160","journal-title":"Int J Innov Comput Inf Control"},{"issue":"6736","key":"1177_CR3","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"CT Clelland","year":"1999","unstructured":"Clelland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399(6736):533\u2013534","journal-title":"Nature"},{"key":"1177_CR4","unstructured":"Guo C, Chang CC, Wang ZH (2012) A new data hiding scheme based on DNA sequence. Int J Innov Comput Inf Control 8(1(A)):139\u2013149"},{"issue":"8","key":"1177_CR5","doi-asserted-by":"crossref","first-page":"6712","DOI":"10.1016\/j.eswa.2011.12.019","volume":"39","author":"CF Lee","year":"2012","unstructured":"Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712\u20136719","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1177_CR6","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S0303-2647(00)00083-6","volume":"57","author":"A Leier","year":"2000","unstructured":"Leier A, Richter C, Banzhaf W, Rauhe H (2000) Cryptography with DNA binary strands. BioSystems 57(1):13\u201322","journal-title":"BioSystems"},{"issue":"30\u201331","key":"1177_CR7","first-page":"2828","volume":"375","author":"HJ Liu","year":"2011","unstructured":"Liu HJ, Wang XY, Zhu QL (2011) Asynchronous anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching. Phys Lett A 375(30\u201331):2828\u20132835","journal-title":"Phys Lett A"},{"issue":"5","key":"1177_CR8","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"HJ Liu","year":"2012","unstructured":"Liu HJ, Wang XY, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"2","key":"1177_CR9","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.dsp.2011.09.003","volume":"22","author":"SN Mali","year":"2012","unstructured":"Mali SN, Patil PM, Jalnekar RM (2012) Robust and secured image-adaptive data hiding. Digit Signal Proc 22(2):314\u2013323","journal-title":"Digit Signal Proc"},{"key":"1177_CR10","doi-asserted-by":"crossref","unstructured":"Peterson I (2001) Hiding in DNA, Muse, p 22","DOI":"10.1067\/mgn.2001.113534"},{"issue":"2","key":"1177_CR11","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.jss.2011.08.015","volume":"85","author":"ZX Qian","year":"2012","unstructured":"Qian ZX, Zhang XP (2012) Lossless data hiding in JPEG bitstream. J Syst Softw 85(2):309\u2013313","journal-title":"J Syst Softw"},{"key":"1177_CR12","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/3-540-36415-3_24","volume":"2578","author":"B Shimanovsky","year":"2002","unstructured":"Shimanovsky B, Feng J, Potkonjak M (2002) Hiding data in DNA, the 5th international workshop on information hiding. Lect Notes Comput Sci 2578:373\u2013386","journal-title":"Lect Notes Comput Sci"},{"issue":"11","key":"1177_CR13","doi-asserted-by":"crossref","first-page":"2196","DOI":"10.1016\/j.ins.2010.01.030","volume":"180","author":"HJ Shiu","year":"2010","unstructured":"Shiu HJ, Ng KL, Fang JF, Lee RCT, Huang CH (2010) Data hiding methods based upon DNA sequences. Inf Sci 180(11):2196\u20132208","journal-title":"Inf Sci"},{"key":"1177_CR14","unstructured":"Website, NCBI Database: http:\/\/www.ncbi.nlm.nih.gov\/"},{"key":"1177_CR15","unstructured":"European Bioinformatics Institute. http:\/\/www.ebi.ac.uk\/"},{"issue":"1","key":"1177_CR16","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.ins.2011.11.046","volume":"190","author":"WJ Yang","year":"2012","unstructured":"Yang WJ, Chung KL, Liao HYM (2012) Efficient reversible data hiding for color filter array images. Inf Sci 190(1):208\u2013226","journal-title":"Inf Sci"}],"container-title":["Medical &amp; Biological Engineering &amp; Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11517-014-1177-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11517-014-1177-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11517-014-1177-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T15:29:33Z","timestamp":1565623773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11517-014-1177-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,15]]},"references-count":16,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["1177"],"URL":"https:\/\/doi.org\/10.1007\/s11517-014-1177-3","relation":{},"ISSN":["0140-0118","1741-0444"],"issn-type":[{"value":"0140-0118","type":"print"},{"value":"1741-0444","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,15]]}}}