{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:47:09Z","timestamp":1770846429415,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1109\/bibm66473.2025.11356545","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:19:40Z","timestamp":1769721580000},"page":"905-912","source":"Crossref","is-referenced-by-count":0,"title":["DNA-Stega: Biologically Plausible DNA Steganography Based on Variational Autoencoder and Distribution Copies"],"prefix":"10.1109","author":[{"given":"Weikun","family":"Fan","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Huaqiao University,Xiamen,China"}]},{"given":"Zhenyi","family":"Tu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Huaqiao University,Xiamen,China"}]},{"given":"Yanju","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Huaqiao University,Xiamen,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/356778.356782"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646128"},{"key":"ref3","article-title":"Sparsamp: Efficient provably secure steganography based on sparse sampling","volume-title":"34th USENIX Security Symposium (USENIX Security 25)","author":"Wang"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3539832"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.110026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2025.3586104"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41570-024-00576-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.synbio.2025.03.006"},{"key":"ref9","author":"Guo","year":"2011","journal-title":"A new data hiding scheme based on dna sequence"},{"key":"ref10","first-page":"6585","article-title":"Data hiding in dna sequences based on table lookup substitution","volume":"8","author":"Taur","year":"2012","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18576\/amis\/100427"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-14-121"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3285045"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.268"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-2585-4_20"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2024.3443513"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btab083"},{"key":"ref20","author":"Pace","year":"1998","journal-title":"The codebreakers: The comprehensive history of secret communication from ancient times to the internet"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872397"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179287"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNANO.2019.2904842"},{"key":"ref24","article-title":"Decoding methods for dna steganalysis","volume-title":"6th International Conference on Bioinformatics and Computational Biology (BICoB)","author":"Beck"},{"key":"ref25","article-title":"Fast approximation of the sliced-wasserstein distance using concentration of random projections","author":"Nadjahi","year":"2021","journal-title":"Neural Information Processing Systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1181"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2020.3017191"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871746"}],"event":{"name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","location":"Wuhan, China","start":{"date-parts":[[2025,12,15]]},"end":{"date-parts":[[2025,12,18]]}},"container-title":["2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11355913\/11355975\/11356545.pdf?arnumber=11356545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:53:25Z","timestamp":1770843205000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11356545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/bibm66473.2025.11356545","relation":{},"subject":[],"published":{"date-parts":[[2025,12,15]]}}}