{"id":"https://openalex.org/W7126100460","doi":"https://doi.org/10.1109/bibm66473.2025.11356545","title":"DNA-Stega: Biologically Plausible DNA Steganography Based on Variational Autoencoder and Distribution Copies","display_name":"DNA-Stega: Biologically Plausible DNA Steganography Based on Variational Autoencoder and Distribution Copies","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W7126100460","doi":"https://doi.org/10.1109/bibm66473.2025.11356545"},"language":null,"primary_location":{"id":"doi:10.1109/bibm66473.2025.11356545","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bibm66473.2025.11356545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054864889","display_name":"Weikun Fan","orcid":"https://orcid.org/0000-0001-6892-673X"},"institutions":[{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weikun Fan","raw_affiliation_strings":["College of Computer Science and Technology, Huaqiao University,Xiamen,China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Huaqiao University,Xiamen,China","institution_ids":["https://openalex.org/I119045251"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124272206","display_name":"Zhenyi Tu","orcid":null},"institutions":[{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyi Tu","raw_affiliation_strings":["College of Computer Science and Technology, Huaqiao University,Xiamen,China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Huaqiao University,Xiamen,China","institution_ids":["https://openalex.org/I119045251"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101575637","display_name":"Yanju Zhang","orcid":"https://orcid.org/0000-0002-8629-258X"},"institutions":[{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanju Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Huaqiao University,Xiamen,China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Huaqiao University,Xiamen,China","institution_ids":["https://openalex.org/I119045251"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054864889"],"corresponding_institution_ids":["https://openalex.org/I119045251"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67386441,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"905","last_page":"912"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.8894000053405762,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.8894000053405762,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.036400001496076584,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10207","display_name":"Advanced biosensing and bioanalysis techniques","score":0.00800000037997961,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8582000136375427},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8241000175476074},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.7706999778747559},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6031000018119812},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5108000040054321},{"id":"https://openalex.org/keywords/dna","display_name":"DNA","score":0.49790000915527344},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.4546000063419342},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4487000107765198},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4129999876022339}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8582000136375427},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8241000175476074},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.7706999778747559},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6031000018119812},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6031000018119812},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5284000039100647},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5108000040054321},{"id":"https://openalex.org/C552990157","wikidata":"https://www.wikidata.org/wiki/Q7430","display_name":"DNA","level":2,"score":0.49790000915527344},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.4546000063419342},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4487000107765198},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4129999876022339},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39070001244544983},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C83762044","wikidata":"https://www.wikidata.org/wiki/Q411641","display_name":"G-quadruplex","level":3,"score":0.3646000027656555},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35989999771118164},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.3386000096797943},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3287999927997589},{"id":"https://openalex.org/C207390915","wikidata":"https://www.wikidata.org/wiki/Q1230525","display_name":"Divergence (linguistics)","level":2,"score":0.32589998841285706},{"id":"https://openalex.org/C171752962","wikidata":"https://www.wikidata.org/wiki/Q255166","display_name":"Kullback\u2013Leibler divergence","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.30300000309944153},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.2863999903202057},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.28519999980926514},{"id":"https://openalex.org/C70721500","wikidata":"https://www.wikidata.org/wiki/Q177005","display_name":"Computational biology","level":1,"score":0.2809999883174896},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C149441793","wikidata":"https://www.wikidata.org/wiki/Q200726","display_name":"Probability distribution","level":2,"score":0.27469998598098755},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C51679486","wikidata":"https://www.wikidata.org/wiki/Q380546","display_name":"DNA sequencing","level":3,"score":0.2662000060081482},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25949999690055847}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bibm66473.2025.11356545","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bibm66473.2025.11356545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7264789938926697,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1574356452","https://openalex.org/W1832693441","https://openalex.org/W2064675550","https://openalex.org/W2071328640","https://openalex.org/W2139172211","https://openalex.org/W2293634425","https://openalex.org/W2333320475","https://openalex.org/W2467495890","https://openalex.org/W2893556909","https://openalex.org/W2925006293","https://openalex.org/W3079675143","https://openalex.org/W3127238141","https://openalex.org/W3175755605","https://openalex.org/W4380032289","https://openalex.org/W4384948607","https://openalex.org/W4391693770","https://openalex.org/W4395078780","https://openalex.org/W4401633911","https://openalex.org/W4405965359","https://openalex.org/W4407247376","https://openalex.org/W4408434166","https://openalex.org/W4412030624"],"related_works":[],"abstract_inverted_index":{"Steganography":[0],"conceals":[1],"the":[2,84,101,141],"existence":[3],"of":[4,104,160],"sensitive":[5],"information":[6,89,187],"by":[7,165],"embedding":[8],"it":[9],"into":[10],"an":[11,79],"innocuous":[12],"carrier":[13],"in":[14,128],"a":[15,21,32,63,70,74,177],"manner":[16],"imperceptible":[17,185],"to":[18,47,53,98,153],"observers.":[19],"As":[20],"novel":[22,64],"physical":[23],"carrier,":[24],"DNA":[25,30,43,65,106,122,191],"exhibits":[26,150],"unique":[27],"properties,":[28],"making":[29],"steganography":[31,44,66],"promising":[33],"method":[34,95],"for":[35,87,182],"data":[36,49],"security.":[37],"Despite":[38],"recent":[39],"advancements,":[40],"most":[41],"existing":[42],"methods":[45,167],"fail":[46],"guarantee":[48],"confidentiality":[50],"when":[51],"subjected":[52],"adversarial":[54],"steganalysis.":[55],"To":[56],"address":[57],"this":[58],"vulnerability,":[59],"we":[60],"present":[61],"DNA-Stega,":[62],"framework":[67],"that":[68],"integrates":[69],"Variational":[71],"Autoencoder":[72],"with":[73,83,168],"pre-trained":[75],"DNABERT":[76,97],"encoder":[77],"and":[78,115,134,137,145,179,184],"LSTM":[80],"decoder,":[81],"along":[82],"Discop":[85],"algorithm":[86],"secret":[88],"hiding.":[90],"Unlike":[91],"previous":[92],"approaches,":[93],"our":[94],"leverages":[96],"precisely":[99],"model":[100],"complex":[102],"patterns":[103],"natural":[105],"chains":[107,123],"before":[108],"pseudo-sequence":[109],"generation,":[110],"significantly":[111,189],"enhancing":[112],"both":[113],"perceptual":[114,129],"statistical":[116,138],"imperceptibility.":[117],"Experimental":[118],"evaluation":[119],"on":[120],"four":[121],"demonstrates":[124],"DNAStega's":[125],"superior":[126],"performance":[127],"imperceptibility":[130,139],"(with":[131],"minimal":[132],"compositional":[133],"thermodynamic":[135],"deviations)":[136],"(achieving":[140],"lowest":[142],"KL":[143],"divergence":[144],"Sliced-Wasserstein":[146],"Distance).":[147],"Furthermore,":[148],"DNA-Stega":[149,175],"remarkable":[151],"resistance":[152],"state-of-the-art":[154],"steganalysis":[155],"techniques,":[156],"which":[157],"are":[158],"capable":[159],"identifying":[161],"pseudo-DNA":[162],"sequences":[163],"generated":[164],"traditional":[166],"near-perfect":[169],"accuracy.":[170],"These":[171],"comprehensive":[172],"results":[173],"establish":[174],"as":[176],"robust":[178],"effective":[180],"solution":[181],"secure":[183],"DNA-based":[186],"hiding,":[188],"advancing":[190],"steganography.":[192]},"counts_by_year":[],"updated_date":"2026-02-01T03:34:12.195049","created_date":"2026-01-30T00:00:00"}
