{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:41:38Z","timestamp":1654126898154},"reference-count":7,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,1]]},"abstract":"<p>As the blueprint of vital activities of most living things on earth, DNA has important status and must be protected perfectly. And in current DNA databases, each sequence is stored with several notes that help to describe that sequence. However, these notes have no contribution to the protection of sequences. In this paper, the authors propose a reversible data hiding method for DNA sequences, which could be used either to embed sequence-related annotations, or to detect and restore tampers. When embedding sequence annotations, the methods works in low embedding rate mode. Only several bits of annotations are embedded. When used for tamper detection and tamper restoration, all possible embedding positions are utilized to assure the maximum restoration capacity.<\/p>","DOI":"10.4018\/ijdcf.2014100101","type":"journal-article","created":{"date-parts":[[2015,2,13]],"date-time":"2015-02-13T13:06:50Z","timestamp":1423832810000},"page":"1-13","source":"Crossref","is-referenced-by-count":5,"title":["Reversible Data Hiding for DNA Sequences and Its Applications"],"prefix":"10.4018","volume":"6","author":[{"given":"Qi","family":"Tang","sequence":"first","affiliation":[{"name":"School of Information Science, University of Science and Technology of China, Hefei, China"}]},{"given":"Guoli","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Information Science, University of Science and Technology of China, Hefei, China"}]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science, University of Science and Technology of China, Hefei, China"}]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Information Science, University of Science and Technology of China, Hefei, China"}]}],"member":"2432","reference":[{"issue":"5","key":"ijdcf.2014100101-0","first-page":"1145","article-title":"Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium","volume":"3","author":"C. C.Chang","year":"2007","journal-title":"International Journal of Innovative Computing, Information, & Control"},{"key":"ijdcf.2014100101-1","first-page":"139","article-title":"A new data hiding scheme based on DNA sequence","volume":"8","author":"C.Guo","year":"2012","journal-title":"International Journal of Innovative Computing, Information, & Control"},{"key":"ijdcf.2014100101-2","doi-asserted-by":"crossref","unstructured":"Naskar, R., & Rajat Subhra Chakraborty. (2013). A generalized tamper localization approach for reversible watermarking algorithms. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP). vol. 9. NCBI Database: National Center for Biotechnology Information, from http:\/\/www.ncbi.nlm.nih.gov\/","DOI":"10.1145\/2487268.2487272"},{"key":"ijdcf.2014100101-3","doi-asserted-by":"crossref","unstructured":"Shimanovsky, B. Jessica Feng, & Miodrag Potkonjak. (2003). Hiding data in DNA, Information Hiding (pp. 373\u2013386).","DOI":"10.1007\/3-540-36415-3_24"},{"key":"ijdcf.2014100101-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.030"},{"key":"ijdcf.2014100101-5","unstructured":"Wikipedia. (n.d.). Degenerate base symbols: A nucleic acid notation. Retrieved from http:\/\/en.wikipedia.org\/wiki\/Nucleic_acid_notation"},{"key":"ijdcf.2014100101-6","unstructured":"Wikipedia. (n.d.). IUPAC: International Union of Pure and Applied Chemistry. Retrieved from http:\/\/en.wikipedia.org\/wiki\/International_Union_of_Pure_and_Applied_Chemistry"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=123385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:02:09Z","timestamp":1654124529000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijdcf.2014100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,10,1]]},"references-count":7,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2014100101","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,1]]}}}