{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T07:34:22Z","timestamp":1710401662285},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T00:00:00Z","timestamp":1549497600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T00:00:00Z","timestamp":1549497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s12065-019-00202-z","type":"journal-article","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T08:34:16Z","timestamp":1549528456000},"page":"331-343","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Data storage in cellular DNA: contextualizing diverse encoding schemes"],"prefix":"10.1007","volume":"14","author":[{"given":"Gaby G.","family":"Dagher","sequence":"first","affiliation":[]},{"given":"Anthony P.","family":"Machado","sequence":"additional","affiliation":[]},{"given":"Eddie C.","family":"Davis","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Green","sequence":"additional","affiliation":[]},{"given":"John","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Ferguson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,7]]},"reference":[{"key":"202_CR1","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.jbiotec.2016.03.044","volume":"226","author":"T Brunet","year":"2016","unstructured":"Brunet T (2016) Aims and methods of biosteganography. J Biotechnol 226:56\u201364","journal-title":"J Biotechnol"},{"key":"202_CR2","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1038\/nmat4594","volume":"15","author":"V Zhirnov","year":"2016","unstructured":"Zhirnov V, Zadegan R, Sandhu G, Church G, Hughes W (2016) Nucleic acid memory. Nat Mater 15:336\u2013370","journal-title":"Nat Mater"},{"issue":"5","key":"202_CR3","doi-asserted-by":"crossref","first-page":"1439","DOI":"10.1093\/ietisy\/e91-d.5.1439","volume":"91","author":"H Tanaka","year":"2008","unstructured":"Tanaka H (2008) Evaluation of information leakage via electromagnetic emanation and effectiveness of tempest. IEICE Trans Inform Syst 91(5):1439\u20131446","journal-title":"IEICE Trans Inform Syst"},{"key":"202_CR4","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2014.03.039","volume":"273","author":"S-H Lee","year":"2014","unstructured":"Lee S-H (2014) Dwt based coding DNA watermarking for DNA copyright protection. Inform Sci 273:263\u2013286","journal-title":"Inform Sci"},{"issue":"10","key":"202_CR5","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1016\/j.cub.2015.04.007","volume":"25","author":"E Palkopoulou","year":"2015","unstructured":"Palkopoulou E, Mallick S, Skoglund P, Enk J, Rohland N, Li H, Omrak A, Vartanyan S, Poinar H, G\u00f6therstr\u00f6m A (2015) Complete genomes reveal signatures of demographic and genetic declines in the woolly mammoth. Curr Biol 25(10):1395\u20131400","journal-title":"Curr Biol"},{"key":"202_CR6","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"C Clelland","year":"1999","unstructured":"Clelland C, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399:533\u2013534","journal-title":"Nature"},{"issue":"6102","key":"202_CR7","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1126\/science.1226355","volume":"337","author":"GM Church","year":"2012","unstructured":"Church GM, Gao Y, Kosuri S (2012) Next-generation digital information storage in DNA. Science 337(6102):1628\u20131628","journal-title":"Science"},{"issue":"7435","key":"202_CR8","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1038\/nature11875","volume":"494","author":"N Goldman","year":"2013","unstructured":"Goldman N, Bertone P, Chen S, Dessimoz C, LeProust EM, Sipos B, Birney E (2013) Towards practical, high-capacity, low-maintenance information storage in synthesized DNA. Nature 494(7435):77\u201380","journal-title":"Nature"},{"issue":"9","key":"202_CR9","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"D Huffman","year":"1952","unstructured":"Huffman D (1952) A method for the construction of minimum-redundancy codes. Proc IRE 40(9):1098\u20131101","journal-title":"Proc IRE"},{"issue":"8","key":"202_CR10","doi-asserted-by":"crossref","first-page":"2552","DOI":"10.1002\/anie.201411378","volume":"54","author":"RN Grass","year":"2015","unstructured":"Grass RN, Heckel R, Puddu M, Paunescu D, Stark WJ (2015) Robust chemical preservation of digital information on DNA in silica with error-correcting codes. Angewandte Chemie Int Ed 54(8):2552\u20132555","journal-title":"Angewandte Chemie Int Ed"},{"issue":"2","key":"202_CR11","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"IS Reed","year":"1960","unstructured":"Reed IS, Solomon G (1960) Polynomial codes over certain finite fields. J Soc Indus Appl Math 8(2):300\u2013304","journal-title":"J Soc Indus Appl Math"},{"key":"202_CR12","doi-asserted-by":"crossref","first-page":"14138","DOI":"10.1038\/srep14138","volume":"5","author":"SHT Yazdi","year":"2015","unstructured":"Yazdi SHT, Yuan Y, Ma J, Zhao H, Milenkovic O (2015) A rewritable, random-access DNA-based storage system. Sci Rep 5:14138","journal-title":"Sci Rep"},{"key":"202_CR13","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.1016\/j.procs.2016.05.398","volume":"80","author":"M Blawat","year":"2016","unstructured":"Blawat M, Gaedke K, Huetter I, Chen X-M, Turczyk B, Inverso S, Pruitt B, Church G (2016) Forward error correction for DNA data storage. Procedia Comput Sci 80:1011\u20131022","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"202_CR14","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/S0019-9958(60)90287-4","volume":"3","author":"DR-CRC Bose","year":"1960","unstructured":"Bose DR-CRC (1960) On a class of error correcting binary group codes. Inform Control 3(1):68\u201379","journal-title":"Inform Control"},{"key":"202_CR15","unstructured":"Lin S, Costello DJ (2004) Error control coding. Pearson Education India"},{"key":"202_CR16","doi-asserted-by":"crossref","unstructured":"Bornholt J, Lopez R, Carmean D M,Ceze L, Seelig G, Strauss K (2016) A DNA-based archival storagesystem. In: Proceedings of the twenty-first international conference on architectural support for programming languages and operating systems. ACM, pp 637\u2013649","DOI":"10.1145\/2954680.2872397"},{"key":"202_CR17","doi-asserted-by":"crossref","unstructured":"Potdar V M, Han S, Chang E (2005) Fingerprinted secret sharing steganography for robustness againstimage cropping attacks. In: INDIN\u201905. 2005 3rd IEEE International Conference on Industrial Informatics, IEEE, pp 717\u2013724","DOI":"10.1109\/INDIN.2005.1560463"},{"issue":"2","key":"202_CR18","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.csi.2008.06.001","volume":"31","author":"K-H Jung","year":"2009","unstructured":"Jung K-H, Yoo K-Y (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31(2):465\u2013470","journal-title":"Comput Stand Interfaces"},{"key":"202_CR19","doi-asserted-by":"crossref","unstructured":"Li Z, Chen X, Pan X, Zeng X (2009) Losslessdata hiding scheme based on adjacent pixel difference. In: Computer Engineering and Technology, ICCET\u201909. International Conferenceon, vol\u00a01, IEEE, pp 588\u2013592","DOI":"10.1109\/ICCET.2009.40"},{"key":"202_CR20","doi-asserted-by":"crossref","unstructured":"Manikopoulos C, Shi Y-Q, Song S, Zhang Z, Ni Z, Zou D (2002) Detection of block dct-based steganography in gray-scale images. In: Multimedia signal processing, 2002 IEEE Workshop on IEEE, pp 355\u2013358","DOI":"10.1109\/MMSP.2002.1203319"},{"key":"202_CR21","doi-asserted-by":"crossref","unstructured":"McKeon R T (2007) Strange fourier steganography in movies. In: 2007 IEEE International Conference on Electro\/Information Technology, IEEE, pp 178\u2013182","DOI":"10.1109\/EIT.2007.4374540"},{"issue":"1","key":"202_CR22","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.amc.2006.07.041","volume":"185","author":"W-Y Chen","year":"2007","unstructured":"Chen W-Y (2007) Color image steganography scheme using set partitioning in hierarchical trees coding, digital fourier transform and adaptive phase modulation. Appl Math Comput 185(1):432\u2013448","journal-title":"Appl Math Comput"},{"key":"202_CR23","doi-asserted-by":"crossref","unstructured":"Potdar V M, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: INDIN\u201905. 2005 3rd IEEE international conference on industrial informatics, IEEE, pp 709\u2013716","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"202_CR24","unstructured":"Verma B, Jain S, Agarwal D (2005) Watermarking image databases: a review. In: Proceedings of the international conference on cognition and recognition, Mandya, Karnataka, India, pp 171\u2013179"},{"key":"202_CR25","doi-asserted-by":"crossref","unstructured":"Abdulaziz N, Pang K (2000) Robust data hiding for images. In: Communication technology proceedings, 2000. WCC-ICCT 2000. International Conference on IEEE, vol\u00a01, pp 380\u2013383","DOI":"10.1109\/ICCT.2000.889233"},{"key":"202_CR26","doi-asserted-by":"crossref","unstructured":"Fard A M, Akbarzadeh-T M-R, Varasteh-A F,Varasteh-A F (2006) A new genetic algorithm approach for securejpeg steganography. In: 2006 IEEE International conference on engineering of intelligent systems, IEEE, pp 1\u20136","DOI":"10.1109\/ICEIS.2006.1703168"},{"key":"202_CR27","unstructured":"Dailey\u00a0Paulson L (2006) New system fights steganography"},{"key":"202_CR28","doi-asserted-by":"crossref","unstructured":"Abdelwahab AA, Hassaan LA (2008) A discrete wavelet transform based technique for image data hiding. In: Radio science conference, NRSC National, IEEE, pp 1\u20139","DOI":"10.1109\/NRSC.2008.4542319"},{"key":"202_CR29","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"International workshop on digital watermarking","author":"P Sallee","year":"2004","unstructured":"Sallee P (2004) Model-based steganography. In: Kalker T, Cox I, Ro YM (eds) International workshop on digital watermarking, vol 2939. Springer, Berlin, Heidelberg, pp 154\u2013167"},{"key":"202_CR30","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1007\/978-3-540-30543-9_91","volume-title":"Advances in multimedia information processing\u2014PCM 2004","author":"C-C Chang","year":"2004","unstructured":"Chang C-C, Tsai P, Lin M-H (2004) Anadaptive steganography for index-based images using codewordgrouping. In: Aizawa K, Nakamura Y, Satoh S (eds) Advances in multimedia information processing\u2014PCM 2004, vol 3333. Springer, Berlin, Heidelberg, pp 731\u2013738"},{"key":"202_CR31","unstructured":"Hirohisa H (2002) A data embedding method using bpcs principle with new complexity measures. In: Proceedings of pacific rim workshop on digital steganography, pp 30\u201347"},{"issue":"1","key":"202_CR32","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/TSMCB.2005.852474","volume":"36","author":"Y-T Wu","year":"2006","unstructured":"Wu Y-T, Shih FY (2006) Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Trans Syst Man Cybern Part B (Cybernetics) 36(1):24\u201331","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybernetics)"},{"key":"202_CR33","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1038\/369040a0","volume":"369","author":"LM Adleman","year":"1994","unstructured":"Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Nature 369:40","journal-title":"Nature"},{"issue":"1","key":"202_CR34","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/S0166-218X(96)00058-3","volume":"71","author":"D Boneh","year":"1996","unstructured":"Boneh D, Dunworth C, Lipton RJ, Sgall J (1996) On the computational power of DNA. Discrete Appl Math 71(1):79\u201394","journal-title":"Discrete Appl Math"},{"issue":"2","key":"202_CR35","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/S0304-3975(99)00100-0","volume":"231","author":"L Kari","year":"2000","unstructured":"Kari L, Gloor G, Yu S (2000) Using DNA to solve the bounded post correspondence problem. Theor Comput Sci 231(2):193\u2013203","journal-title":"Theor Comput Sci"},{"key":"202_CR36","unstructured":"Ogihara M, Ray A (1999) Executing parallellogical operations with DNA. In: Evolutionary computation, 1999. CEC 99. Proceedings of the 1999 Congress on IEEE, vol\u00a02"},{"issue":"9","key":"202_CR37","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1038\/nbt862","volume":"21","author":"MN Stojanovic","year":"2003","unstructured":"Stojanovic MN, Stefanovic D (2003) A deoxyribozyme-based molecular automaton. Nat Biotechnol 21(9):1069\u20131074","journal-title":"Nat Biotechnol"},{"issue":"11","key":"202_CR38","doi-asserted-by":"crossref","first-page":"2598","DOI":"10.1021\/nl0620684","volume":"6","author":"J Macdonald","year":"2006","unstructured":"Macdonald J, Li Y, Sutovic M, Lederman H, Pendri K, Lu W, Andrews BL, Stefanovic D, Stojanovic MN (2006) Medium scale integration of molecular logic gates in an automaton. Nano Lett 6(11):2598\u20132603","journal-title":"Nano Lett"},{"issue":"6990","key":"202_CR39","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1038\/nature02551","volume":"429","author":"Y Benenson","year":"2004","unstructured":"Benenson Y, Gil B, Ben-Dor U, Adar R, Shapiro E (2004) An autonomous molecular computer for logical control of gene expression. Nature 429(6990):423\u2013429","journal-title":"Nature"},{"key":"202_CR40","unstructured":"Nayebi A (2009) Fast matrix multiplication techniques based on the adleman-lipton model. arXiv preprintarXiv:0912.0750"},{"issue":"6132","key":"202_CR41","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1126\/science.1232758","volume":"340","author":"J Bonnet","year":"2013","unstructured":"Bonnet J, Yin P, Ortiz ME, Subsoontorn P, Endy D (2013) Amplifying genetic logic gates. Science 340(6132):599\u2013603","journal-title":"Science"},{"issue":"5","key":"202_CR42","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1038\/nmeth.2926","volume":"11","author":"JA Brophy","year":"2014","unstructured":"Brophy JA, Voigt CA (2014) Principles of genetic circuit design. Nat Methods 11(5):508\u2013520","journal-title":"Nat Methods"},{"key":"202_CR43","doi-asserted-by":"crossref","unstructured":"Nielsen A A, Der B S, Shin J,Vaidyanathan P, Paralanov V, Strychalski E A, Ross D,Densmore D, Voigt C A (2016) Genetic circuit design automation. Science 352(6281):aac7341","DOI":"10.1126\/science.aac7341"},{"issue":"4356","key":"202_CR44","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"J Watson","year":"1953","unstructured":"Watson J, Crick F (1953) Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171(4356):737\u2013738","journal-title":"Nature"},{"key":"202_CR45","volume-title":"Molecular biology of the gene","author":"J Watson","year":"2008","unstructured":"Watson J, Baker T, Bell S, Gann A, Levine M, Losich R (2008) Molecular biology of the gene, 6th edn. Pearson, London","edition":"6"},{"issue":"6","key":"202_CR46","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1002\/biot.201000332","volume":"6","author":"E Angov","year":"2011","unstructured":"Angov E (2011) Codon usage: nature\u2019s roadmap to expression and folding of proteins. Biotechnol J 6(6):650\u2013659","journal-title":"Biotechnol J"},{"key":"202_CR47","doi-asserted-by":"crossref","unstructured":"Consortium et\u00a0al EP (2012) An integrated encyclopedia of DNA elements in the human genome. Nature 489(414):57\u201374","DOI":"10.1038\/nature11247"},{"issue":"5331","key":"202_CR48","doi-asserted-by":"crossref","first-page":"1453","DOI":"10.1126\/science.277.5331.1453","volume":"277","author":"FEA Blattner","year":"1997","unstructured":"Blattner FEA (1997) The complete genome sequence of Escherichia coli k-12. Science 277(5331):1453\u20131462","journal-title":"Science"},{"issue":"10","key":"202_CR49","doi-asserted-by":"crossref","first-page":"2587","DOI":"10.1093\/emboj\/20.10.2587","volume":"20","author":"E Viguera","year":"2001","unstructured":"Viguera E, Conceill D, Ehrlich S (2001) Replication slippage involves DNA polymerase pausing and dissociation. Embo J 20(10):2587\u20132595","journal-title":"Embo J"},{"key":"202_CR50","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1023\/A:1024539608706","volume":"25","author":"G Smith","year":"2003","unstructured":"Smith G, Fiddles C, Hawkins J, Cox J (2003) Some possible codes for encrypting data in DNA. Biotechnol Lett 25:1125\u20131130","journal-title":"Biotechnol Lett"},{"key":"202_CR51","doi-asserted-by":"crossref","unstructured":"Brenner S, Williams SR, Vermaas EH, Storck T, Moon K, McCollum C, Mao JI, Luo S, Kirchner JJ, Eletr S, DuBridge RB (2000) In:vitro cloning of complex mixtures of DNA on micro beads: physical separation of differentially expressed CDNAS. Proc Natl Acad Sci 97(4):1665\u20131670","DOI":"10.1073\/pnas.97.4.1665"},{"issue":"2","key":"202_CR52","first-page":"147","volume":"8","author":"H Mousa","year":"2011","unstructured":"Mousa H, Moustafa K, Abdel-Wahed W, Hadhoud MM (2011) Data biding based on contrast mapping using DNA medium. Int Arab J Inform Technolol 8(2):147\u2013154","journal-title":"Int Arab J Inform Technolol"},{"key":"202_CR53","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1021\/bp049917i","volume":"20","author":"M Arita","year":"2004","unstructured":"Arita M, Yoshiaki O (2004) Secret signatures inside genomic DNA. Biotechnol Progr 20:1605\u20131607","journal-title":"Biotechnol Progr"},{"key":"202_CR54","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1186\/1471-2105-8-176","volume":"8","author":"D Heider","year":"2007","unstructured":"Heider D, Barnekow A (2007) DNA-based watermarks using the DNA-crypt algorithm. BMC Bioinform 8:176. https:\/\/doi.org\/10.1186\/1471-2105-8-176","journal-title":"BMC Bioinform"},{"key":"202_CR55","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1371\/journal.pone.0042465","volume":"7","author":"M Liss","year":"2012","unstructured":"Liss M, Daubert D, Kliche K, Hammes U, Leiherer A, Wagner R (2012) Embedding permanent watermarks in synthetic genes. PLOS One 7:8","journal-title":"PLOS One"},{"issue":"5","key":"202_CR56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9734\/BJMCS\/2015\/19561","volume":"11","author":"A Khalifa","year":"2015","unstructured":"Khalifa A, Hamad S (2015) Hiding secret information in DNA sequences using silent mutations. Br J Math Comput Sci 11(5):1\u201311","journal-title":"Br J Math Comput Sci"},{"issue":"1","key":"202_CR57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1471-2105-14-121","volume":"14","author":"D Haughton","year":"2013","unstructured":"Haughton D, Balado F (2013) Biocode: two biologically compatible algorithms for embedding data in non-coding and coding regions of DNA. BMC Bioinform 14(1):1","journal-title":"BMC Bioinform"},{"key":"202_CR58","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2014.03.039","volume":"273","author":"S Lee","year":"2014","unstructured":"Lee S (2014) Dwt based coding DNA watermarking for DNA copyright protection. Inform Sci 273:263\u2013286","journal-title":"Inform Sci"},{"issue":"1","key":"202_CR59","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1145\/602421.602426","volume":"46","author":"P Wong","year":"2003","unstructured":"Wong P, Wong K, Foote H (2003) Organic data memory using the DNA approach. Commun ACM 46(1):95\u201398","journal-title":"Commun ACM"},{"key":"202_CR60","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1021\/bp060261y","volume":"23","author":"N Yachie","year":"2007","unstructured":"Yachie N, Sekiyama K, Sugahard J, Ohashi Y, Tomita M (2007) Alignment-based approach for durable data storage into living organisms. Biotechnol Progr 23:501\u2013505","journal-title":"Biotechnol Progr"},{"key":"202_CR61","doi-asserted-by":"crossref","first-page":"747","DOI":"10.2144\/000113218","volume":"47","author":"M Ailenberg","year":"2009","unstructured":"Ailenberg M, Rotstein O (2009) An improved huffman coding method for archiving text, images, and music characters in DNA. BioTechniques 47:747\u2013754","journal-title":"BioTechniques"},{"key":"202_CR62","doi-asserted-by":"crossref","unstructured":"Haughton D, Balado F (2011) Repetition coding as an effective error correction code for information encodedin DNA. In: 2011 IEEE 11th International Conference on Bioinformatics and Bioengineering. IEEE, Taichung, Taiwan","DOI":"10.1109\/BIBE.2011.45"},{"key":"202_CR63","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1186\/1756-0500-2-125","volume":"2","author":"D Heider","year":"2009","unstructured":"Heider D, Pyka M, Barnekow A (2009) DNA watermarks in non-coding regulatory sequences. BMC Res Notes 2:123","journal-title":"BMC Res Notes"},{"key":"202_CR64","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1186\/s12859-015-0482-7","volume":"16","author":"D Kracht","year":"2015","unstructured":"Kracht D, Schober S (2015) Insertion and deletion correcting DNA barcodes based watermarks. BMC Bioinform 16:50","journal-title":"BMC Bioinform"},{"key":"202_CR65","first-page":"121","volume":"14","author":"J Chun","year":"2013","unstructured":"Chun J, Lee H, Yoon J (2013) Passing go with DNA sequencing: delivering messages in a covert transgenic channel. IEEE CS Secur Priv Workshop 14:121","journal-title":"IEEE CS Secur Priv Workshop"},{"key":"202_CR66","doi-asserted-by":"publisher","first-page":"8072463","DOI":"10.1155\/2016\/8072463","volume":"2016","author":"P De Silva","year":"2016","unstructured":"De Silva P, Ganegoda G (2016) New trends ofdigital data storage in DNA. Biomed Res Int 2016:8072463. https:\/\/doi.org\/10.1155\/2016\/8072463","journal-title":"Biomed Res Int"},{"issue":"17","key":"202_CR67","doi-asserted-by":"crossref","first-page":"1961","DOI":"10.1093\/bioinformatics\/btn342","volume":"24","author":"D Heider","year":"2008","unstructured":"Heider D, Kessler D, Barnekow A (2008) Watermarking sexually reproducing diploid organisms. Bioinformatics 24(17):1961\u20131962","journal-title":"Bioinformatics"},{"key":"202_CR68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0378-1119(00)00582-5","volume":"263","author":"R Garesse","year":"2001","unstructured":"Garesse R, Vallejo C (2001) Animal mitochondrial biogenesis and function: a regulatory cross-talk between two genomes. Gene 263:1\u201316","journal-title":"Gene"},{"issue":"3","key":"202_CR69","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1002\/bies.20342","volume":"28","author":"D Ratel","year":"2006","unstructured":"Ratel D, Ravanat J, Berger F, Wion D (2006) N6-methyladenine: the other methylated base of DNA. Bioessays 28(3):309\u2013315","journal-title":"Bioessays"},{"issue":"3","key":"202_CR70","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1162\/evco.1994.2.3.221","volume":"2","author":"N Srinivas","year":"1994","unstructured":"Srinivas N, Deb K (1994) Muiltiobjective optimization using nondominated sorting in genetic algorithms. Evol Comput 2(3):221\u2013248","journal-title":"Evol Comput"},{"key":"202_CR71","doi-asserted-by":"crossref","unstructured":"Dorigo M, St\u00fctzle T (2004) Ant colony optimization. Bradford Company","DOI":"10.7551\/mitpress\/1290.001.0001"},{"issue":"41","key":"202_CR72","doi-asserted-by":"crossref","first-page":"E6117","DOI":"10.1073\/pnas.1606724113","volume":"113","author":"Z Zhou","year":"2016","unstructured":"Zhou Z, Dang Y, Zhou M, Li L, Yu C-H, Fu J, Chen S, Liu Y (2016) Codon usage is an important determinant of gene expression levels largely through its effects on transcription. Proc Natl Acad Sci 113(41):E6117\u2013E6125","journal-title":"Proc Natl Acad Sci"},{"issue":"17","key":"202_CR73","doi-asserted-by":"crossref","first-page":"16895","DOI":"10.1074\/jbc.R400006200","volume":"279","author":"TA Kunkel","year":"2004","unstructured":"Kunkel TA (2004) DNA replication fidelity. J Biol Chem 279(17):16895\u201316898","journal-title":"J Biol Chem"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-019-00202-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-019-00202-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-019-00202-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T06:16:51Z","timestamp":1622441811000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-019-00202-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,7]]},"references-count":73,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["202"],"URL":"https:\/\/doi.org\/10.1007\/s12065-019-00202-z","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,7]]},"assertion":[{"value":"25 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}