{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:54:58Z","timestamp":1729616098451,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/ipta.2017.8310153","type":"proceedings-article","created":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T21:52:17Z","timestamp":1520891537000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Image cryptography based on the imitation of gene fusion and horizontal gene transfer"],"prefix":"10.1109","author":[{"given":"Zoubir","family":"Hamici","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3024-6"},{"key":"ref11","first-page":"1","article-title":"Image Encryption Algorithm Based on Hyper-Chaotic Maps and Nucleotide Sequences Database","volume":"2017","author":"niu","year":"2017","journal-title":"Computational Intelligence and Neuroscience"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17781\/P001648"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2013.6508181"},{"key":"ref14","first-page":"781","article-title":"Securing Ad hoc Networks Using DNA Cryptography","author":"verma","year":"2006","journal-title":"IEEE International Conference on Computers and Devices for Communication (CODEC06)"},{"key":"ref15","first-page":"37","article-title":"An encryption scheme using DNA technology","author":"guangzhao","year":"2008","journal-title":"IEEE International Conference on Bio-Inspired Computing Theories and Applications"},{"key":"ref16","first-page":"264","article-title":"A novel generation key scheme based on DNA","author":"xin-she","year":"2008","journal-title":"International Conference on Computational Intelligence and Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ETNCC.2011.6255930"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2011.6100690"},{"key":"ref19","first-page":"179","article-title":"DNA cryptography based on DNA Fragment assembly","author":"zhang","year":"2012","journal-title":"International Conference on Information Science and Digital Content Technology (ICIDT)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.03.022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.pt.2013.05.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2014.7019805"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIP.2014.7010318"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363965"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.01.016"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3927.001.0001","author":"mitchell","year":"1998","journal-title":"An Introduction to Genetic Algorithms"},{"key":"ref9","first-page":"496","article-title":"A Comparative Study on DNA-Based Cryptosystem","author":"thangavel","year":"2017","journal-title":"Handbook of Research on Recent Developments in Intelligent Communication Applications IGI Global"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2011","author":"stallings","key":"ref1"},{"key":"ref20","first-page":"2036","article-title":"A Novel DNA based Encryption Algorithm for Multimedia information","volume":"5","author":"maniyath","year":"2016","journal-title":"International Journal of Advanced Computer Technology"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"19","DOI":"10.5120\/ijca2016907719","article-title":"Secure Data Transfer through DNA Cryptography using Symmetric Algorithm","volume":"133","author":"bonny","year":"2016","journal-title":"International Journal of Computer Applications"},{"key":"ref21","first-page":"291","article-title":"Inspired Pseudo Biotic DNA Based Cryptographic Mechanism against Adaptive Cryptographic Attacks","volume":"18","author":"babu","year":"2016","journal-title":"International Journal of Network Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/e17010181"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaj2038"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3153-y"}],"event":{"name":"2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","start":{"date-parts":[[2017,11,28]]},"location":"Montreal, QC","end":{"date-parts":[[2017,12,1]]}},"container-title":["2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8304402\/8310074\/08310153.pdf?arnumber=8310153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T06:30:58Z","timestamp":1603953058000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8310153\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ipta.2017.8310153","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}