{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:35:31Z","timestamp":1770845731837,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1109\/bibm66473.2025.11356262","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:19:40Z","timestamp":1769721580000},"page":"897-904","source":"Crossref","is-referenced-by-count":0,"title":["xLSTM-Stega: A Novel Framework for Secure Information Hiding in DNA Storage Systems"],"prefix":"10.1109","author":[{"given":"Weikun","family":"Fan","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Huaqiao University,Xiamen,China"}]},{"given":"Zhenyi","family":"Tu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Huaqiao University,Xiamen,China"}]},{"given":"Yanju","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Huaqiao University,Xiamen,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Data age 2025: The digitization of the world from edge to core","author":"Reinsel","year":"2018","journal-title":"IDC, Tech. Rep."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.synbio.2025.03.006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.1226355"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/nature12323"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-19148-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s43588-025-00793-x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-24677-5"},{"key":"ref8","author":"Guo","year":"2011","journal-title":"A new data hiding scheme based on dna sequence"},{"key":"ref9","first-page":"6585","article-title":"Data hiding in dna sequences based on table lookup substitution","volume":"8","author":"Taur","year":"2012","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-14-121"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18576\/amis\/100427"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2024.3443513"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3285045"},{"key":"ref15","first-page":"3046","article-title":"Provably secure generative linguistic steganography","author":"Zhang","year":"2021","journal-title":"Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872397"},{"key":"ref17","article-title":"xLSTM: Extended long short-term memory","volume-title":"The Thirty-eighth Annual Conference on Neural Information Processing Systems","author":"Beck","year":"2024"},{"key":"ref18","article-title":"Bio-xLSTM: Generative modeling, representation and in-context learning of biological and chemical sequences","volume-title":"The Thirteenth International Conference on Learning Representations","author":"Schmidinger","year":"2025"},{"key":"ref19","first-page":"6837","article-title":"A framework for designing provably secure steganography","volume-title":"34th USENIX Security Symposium","author":"Liao","year":"2025"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49660.2025.10888607"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNANO.2019.2904842"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1181"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2020.3017191"}],"event":{"name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","location":"Wuhan, China","start":{"date-parts":[[2025,12,15]]},"end":{"date-parts":[[2025,12,18]]}},"container-title":["2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11355913\/11355975\/11356262.pdf?arnumber=11356262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:51:32Z","timestamp":1770843092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11356262\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/bibm66473.2025.11356262","relation":{},"subject":[],"published":{"date-parts":[[2025,12,15]]}}}