{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:33:43Z","timestamp":1750224823320,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,25]]},"DOI":"10.1109\/iccta35431.2014.9521623","type":"proceedings-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T20:37:02Z","timestamp":1630096622000},"page":"32-38","source":"Crossref","is-referenced-by-count":1,"title":["An Advanced Data Security Algorithm Using cryptography and DNA-Based steganography"],"prefix":"10.1109","author":[{"given":"Essam M. Ramzy","family":"Hamed","sequence":"first","affiliation":[]},{"given":"Ayman E.","family":"Taha","sequence":"additional","affiliation":[]},{"given":"Ahmed Imad","family":"Hammoodi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"A proposed Algorithm using DNA-based cryptography and steganography Techniques","volume":"14","author":"tantawi","year":"2010","journal-title":"Computing & Information Systems EBSCO Host"},{"key":"ref3","article-title":"DNA-based cryptography","author":"gehani","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCOMM.2010.5509086"},{"year":"0","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ETNCC.2011.6255930"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2008.76"},{"key":"ref8","first-page":"373","volume":"2578","author":"shimanovsky","year":"2003","journal-title":"Hiding Data in DNA"},{"key":"ref7","first-page":"5","article-title":"Molecular Biology of the Cell: Fifth Edition","author":"alberts","year":"2008","journal-title":"New York and London Garland Science"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1126\/science.7973651","article-title":"Molecular computation of solution to combinatorial problems","volume":"266","author":"adleman","year":"1994","journal-title":"Science"},{"key":"ref9","first-page":"72","author":"pfleeger","year":"2006","journal-title":"Security in Computing 4th Edition"},{"key":"ref1","first-page":"8","author":"katzenbeisser","year":"2000","journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking"}],"event":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2014,10,25]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2014,10,27]]}},"container-title":["2014 24th International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521546\/9521602\/09521623.pdf?arnumber=9521623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T21:18:30Z","timestamp":1637615910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9521623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,25]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iccta35431.2014.9521623","relation":{},"subject":[],"published":{"date-parts":[[2014,10,25]]}}}