51,686 Hits in 4.5 sec

Security analysis of DNA based steganography techniques

Omnia Abdullah Al-Harbi, Walaa Essa Alahmadi, Asia Othman Aljahdali
2020 SN Applied Sciences  
This study investigates the most recent data hiding techniques based on DNA steganography, including the highly improved DNA-based steganography technique, the data hiding using double DNA sequences method  ...  The result shows that the enhanced DNA-based steganography technique hides 2 bpn, whereas the highly improved method can hide on average 1.46 bpn, which is higher than data hiding using double DNA sequences  ...  Data hiding using double DNA sequences techniques The technique is highly secure, for several reasons: the secret data is encrypted before being embedded in the DNA sequence.  ... 
doi:10.1007/s42452-019-1930-1 fatcat:tgm4igiaazdafdnvwv253n7r34

FBMC/OQAM security strategy based on diversity DNA encryption

Rong Tang, Bo Liu, Jianxin Ren, Yaya Mao, Jianye Zhao, Shun Han, Yang Han, Shuaidong Chen
2021 IEEE Photonics Journal  
The encryption process of bit data is dynamically controlled by the chaotic sequences generated by the hybrid chaotic system composed of improved-Logistic and delayed tent sine system, which enhances the  ...  Experimental results show that the diversity DNA encryption strategy can effectively ensure the security of transmitted data.  ...  the key space and improves the security of the system. improved -Logistic chaotic sequence.  ... 
doi:10.1109/jphot.2021.3054529 fatcat:2cjlql6q3zh7batg2mkxtxzpbi

Message Transmission Based on DNA Cryptography: Review

Tausif Anwar, Sanchita Paul, Shailendra Kumar Singh
2014 International Journal of Bio-Science and Bio-Technology  
Message transmission is a process to transmit encrypted data through secure communication channel using DNA cryptography. Text message is encoded in DNA sequence.  ...  DNA sequences based data encryption seems to be a promising strategy for fulfilling the current information security needs.  ...  In this paper, an algorithm using DNA sequences for data hiding is proposed and discussed for secure data transmission and reception.  ... 
doi:10.14257/ijbsbt.2014.6.5.22 fatcat:lrigiflopvgc5gu5ooupwrtszq

Securing M2M With Post-Quantum Public-Key Cryptography

Jie-Ren Shih, Yongbo Hu, Ming-Chun Hsiao, Ming-Shing Chen, Wen-Chung Shen, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng
2013 IEEE Journal on Emerging and Selected Topics in Circuits and Systems  
Basically, DNA is encrypted through symmetric key cryptography and the key used to encrypt the data symmetrically is itself encrypted asymmetrically through proposed modified RSA algorithm.  ...  In this paper we are integrating public key cryptography inside traditional DNA security algorithm.  ...  In the above technique, instead of using an actual DNA sequence, DNA functions are used. Thus it is called Pseudo DNA cryptography.  ... 
doi:10.1109/jetcas.2013.2244772 fatcat:5zlmvtstpbalfg3eyeco2jykfu

A Novel Hybrid Secure Method Based on DNA Encoding Encryption and Spiral Scrambling in Chaotic OFDM-PON

Yaoqiang Xiao, Yating Chen, Caixia Long, Jin Shi, Jie Ma, Jing He
2020 IEEE Photonics Journal  
In the improved DNA encoding encryption, the oddeven cross-bit DNA encoding, base scrambling and base-level substitution are determined by chaotic sequences.  ...  This paper proposes a novel hybrid secure method based on improved deoxyribonucleic acid (DNA) encoding encryption and spiral scrambling in chaotic OFDM-PON for enhancing the physical-layer security.  ...  and improve system security.  ... 
doi:10.1109/jphot.2020.2987317 fatcat:4zmqijhdd5cmnletxzefiymg44

Increasing Randomization of Ciphertext in DNA Cryptography

Maria Imdad, Sofia Najwa Ramli, Hairulnizam Mahdin
2021 International Journal of Advanced Computer Science and Applications  
Deoxyribonucleic acid (DNA) cryptography is becoming an emerging area in hiding messages, where DNA bases are used to encode binary data to enhance the randomness of the ciphertext.  ...  Therefore, this research aims to reassess the security of the existing DNA cryptography by modifying the steps in the DNA encryption technique and utilizing an existing DNA encoding/decoding table at a  ...  In [13] and [14] , a Dynamic DNA sequence table is used in combination with OTP to improve data security.  ... 
doi:10.14569/ijacsa.2021.0121047 fatcat:tspsxlyhmbhr7ajfkzx3iqzgri

An Enhanced Bilateral Information Security towards a Conventional Cryptographic System using DNA Sequences

K. Rama Devi, S. Prabakaran
2016 Indian Journal of Science and Technology  
Improvement: DNA based approach which is more immune to cryptographic attacks. DNA Cryptography is a new and potentially excellent area that enhances data security.  ...  In this method we use classical cryptographic technique of substitution method in DNA Cryptography.  ...  The contemporary algorithms were used for applying the DNA and Amino Acids notion to more conventional cryptographic algorithms to improve their security features.  ... 
doi:10.17485/ijst/2016/v9i39/102067 fatcat:rnslzsvzyfbx5loecphkdbpmh4

Multilayer Dynamic Encryption for Security OFDM-PON Using DNA-reconstructed Chaotic Sequences under Cryptanalysis

Mengwei Cui, Chongfu Zhang, Yuhang Chen, Zhi Zhang, Tingwei Wu, Heping Wen
2021 IEEE Access  
Since an illegal ONU does not know the specific implementation rules adopted by the DNA-RCS, the correct data information cannot be recovered even if the security key is obtained.  ...  PRINCIPLE The schematic diagram of the proposed multilayer dynamic encryption scheme using DNA-RCS is shown in Fig. 1 . At the OLT, a pseudo-random binary sequence (PRBS) is used as input data.  ... 
doi:10.1109/access.2021.3054380 fatcat:zazeqk5jnbccbj5mxd2m5znsda

A Review of Modern DNA-based Steganography Approaches

Omar Haitham Alhabeeb, Fariza Fauzi, Rossilawati Sulaiman
2021 International Journal of Advanced Computer Science and Applications  
In the last two decades, the field of DNA-based steganography has emerged as a promising domain to provide security for sensitive information transmitted over an untrusted channel.  ...  DNA is strongly nominated by researchers in this field to exceed other data covering mediums like video, image, and text due to its structural characteristics.  ...  Data are firstly using Playfair and concealed in a randomly generated DNA sequence. Then, the DNA sequence is embedded in an audio file.  ... 
doi:10.14569/ijacsa.2021.0121021 fatcat:4x7bfkmuujadnf3a4lzlnyti3y

Secure DNA and Morse code based Profile access control models for Cloud Computing Environment

Monika Yadav, Manvi Breja
2020 Procedia Computer Science  
The model is based on an integrated DNA morse code pattern that provides data security against collision, man-in-the-middle, and internal attacks.  ...  The model is based on an integrated DNA morse code pattern that provides data security against collision, man-in-the-middle, and internal attacks.  ...  Murugan et al. in 2017 [5] and 2018 [6] proposed a secured cloud computing environment by encrypting the original data before transmission using an integrated method comprising DNA, Morse Code, and  ... 
doi:10.1016/j.procs.2020.03.317 fatcat:253qzmqjzjatxl2q7adaujp5dy

New Data hiding method based on DNA and Vigenere Autokey

Wafaa Abduallah, Subhi Mohammed Zeebaree
2017 Academic Journal of Nawroz University  
The proposed mechanism hides the secret message via converting it along with the key to the DNA sequences and then applying the Autokey cipher using a special table created via making use of DNA-XOR operator  ...  People are always looking for secure methods to protect valuable information against unauthorized access or use.  ...  Where, the proposed method made use of the special properties of DNA Sequences for data hiding which is, there is almost no difference between a real DNA sequence and a fake one therefore hiding data in  ... 
doi:10.25007/ajnu.v6n3a83 fatcat:cgxpdgat5rhanhkfdrroey5kna

Hybrid Cryptosystem with DNA Based Key for Wireless Sensor Networks

Monika Poriye, Shuchita Upadhyaya
2016 International Journal of Wireless & Mobile Networks  
In the proposed work, a secret key is introduced which is purely based on DNA sequence named as DNA stego key and is only known to sender and receiver.  ...  This DNA stego key is used to hide information and is stored in a carrier. The proposed technique is implemented using java to verify its correctness.  ...  DNA steganography with vigenere keys and primer sequences are used to secure data but the main weakness of this method is not to provide fully secure system [16] .  ... 
doi:10.5121/ijwmn.2016.8602 fatcat:th2enxaiyndq3lgxmftfjscfeq

Secure data storage on DNA hard drives [article]

Kaikai Chen, Jinbo Zhu, Filip Boskovic, Ulrich F. Keyser
2019 bioRxiv   pre-print
The use of DNA base pairing allows for secure encryption on DNA-HDs that requires a physical key and nanopore sensing for decoding.  ...  Our study opens a novel pathway for rewritable and secure data storage with DNA.One Sentence SummaryStoring digital information on molecules along DNA hard drives for rewritable and secure data storage  ...  In the future, ever-improving methods under development in DNA nanotechnology will undoubtedly improve both writing capabilities and data security.  ... 
doi:10.1101/857748 fatcat:7frxmvqolfe27o2qmueoh7ejzu

DNA Cryptography with Chaotic Mapping on Images: A Comparative Study

Siyamol Chirakkarottu, Anil Johny, Sheena Mathew
2014 International Journal of Computer Applications  
With the research of DNA computing has began, DNA cryptography is born as a new cryptographic field, in which DNA is used as information carrier and the modern biological technology is used as an implementation  ...  Dna cryptography can be applied along with chaotic encryption for better performance.  ...  The method can be used for both gray and color images. CONCLUSION DNA cryptography is an art of securing data using DNA sequences.  ... 
doi:10.5120/17827-8613 fatcat:4erox257abcqjnma5t46czuyza

Improved Security using DNA Cryptography in Wireless Sensor Networks

Monika Poriye, Shuchita Upadhyaya
2016 International Journal of Computer Applications  
DNA cryptography depicts a crucial part in the area of security. In DNA cryptography, DNA nucleotide bases are used to store huge amount of data.  ...  This paper includes a new security technique based on DNA concept that enhance the security of the wireless sensor networks by including false data in original data, which results a DNA sequence in terms  ...  The final data is in the form of nucleotide bases which is then stored as a DNA sequence.  ... 
doi:10.5120/ijca2016912565 fatcat:6njsweio6zgg5kbt3aagb7jxsy
« Previous Showing results 1 — 15 out of 51,686 results