{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:53:20Z","timestamp":1770526400484,"version":"3.49.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/bmei.2014.7002894","type":"proceedings-article","created":{"date-parts":[[2015,1,13]],"date-time":"2015-01-13T20:09:10Z","timestamp":1421179750000},"page":"868-872","source":"Crossref","is-referenced-by-count":6,"title":["Fast tamper location of batch DNA sequences based on reversible data hiding"],"prefix":"10.1109","author":[{"given":"Juntao","family":"Fu","sequence":"first","affiliation":[]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Guoli","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Data hiding in DNA for authentication of plant variety rights","volume":"11","author":"tai","year":"2013","journal-title":"Journal of Electronic Science and Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22603-8_5"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/978-3-540-24676-3_32","article-title":"Merkle tree traversal in log space and time","author":"szydlo","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT 2004"},{"key":"ref6","article-title":"Proposed steganography approach using DNA properties","volume":"14","author":"mitrans","year":"2013","journal-title":"International Journal of Information Technology and Business Management"},{"key":"ref11","first-page":"1145","article-title":"Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium","volume":"3","author":"chang","year":"2007","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BMEI.2013.6746991"},{"key":"ref8","year":"0","journal-title":"IUPAC International Union of Pure and Applied Chemistry"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACES.2014.6807990"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.030"},{"key":"ref9","article-title":"Merkle tree traversal techniques, Darmstadt University of Technology","author":"ederov","year":"2007","journal-title":"Department of computer science cryptography and computer algebra"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.09.022"}],"event":{"name":"2014 7th International Conference on Biomedical Engineering and Informatics (BMEI)","location":"Dalian, China","start":{"date-parts":[[2014,10,14]]},"end":{"date-parts":[[2014,10,16]]}},"container-title":["2014 7th International Conference on Biomedical Engineering and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6992909\/7002728\/07002894.pdf?arnumber=7002894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T03:34:13Z","timestamp":1498188853000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7002894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/bmei.2014.7002894","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}