A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security analysis of DNA based steganography techniques
2020
SN Applied Sciences
This study investigates the most recent data hiding techniques based on DNA steganography, including the highly improved DNA-based steganography technique, the data hiding using double DNA sequences method ...
The result shows that the enhanced DNA-based steganography technique hides 2 bpn, whereas the highly improved method can hide on average 1.46 bpn, which is higher than data hiding using double DNA sequences ...
Data hiding using double DNA sequences techniques The technique is highly secure, for several reasons: the secret data is encrypted before being embedded in the DNA sequence. ...
doi:10.1007/s42452-019-1930-1
fatcat:tgm4igiaazdafdnvwv253n7r34
FBMC/OQAM security strategy based on diversity DNA encryption
2021
IEEE Photonics Journal
The encryption process of bit data is dynamically controlled by the chaotic sequences generated by the hybrid chaotic system composed of improved-Logistic and delayed tent sine system, which enhances the ...
Experimental results show that the diversity DNA encryption strategy can effectively ensure the security of transmitted data. ...
the key space and improves the security of the system. improved -Logistic chaotic sequence. ...
doi:10.1109/jphot.2021.3054529
fatcat:2cjlql6q3zh7batg2mkxtxzpbi
Message Transmission Based on DNA Cryptography: Review
2014
International Journal of Bio-Science and Bio-Technology
Message transmission is a process to transmit encrypted data through secure communication channel using DNA cryptography. Text message is encoded in DNA sequence. ...
DNA sequences based data encryption seems to be a promising strategy for fulfilling the current information security needs. ...
In this paper, an algorithm using DNA sequences for data hiding is proposed and discussed for secure data transmission and reception. ...
doi:10.14257/ijbsbt.2014.6.5.22
fatcat:lrigiflopvgc5gu5ooupwrtszq
Securing M2M With Post-Quantum Public-Key Cryptography
2013
IEEE Journal on Emerging and Selected Topics in Circuits and Systems
Basically, DNA is encrypted through symmetric key cryptography and the key used to encrypt the data symmetrically is itself encrypted asymmetrically through proposed modified RSA algorithm. ...
In this paper we are integrating public key cryptography inside traditional DNA security algorithm. ...
In the above technique, instead of using an actual DNA sequence, DNA functions are used. Thus it is called Pseudo DNA cryptography. ...
doi:10.1109/jetcas.2013.2244772
fatcat:5zlmvtstpbalfg3eyeco2jykfu
A Novel Hybrid Secure Method Based on DNA Encoding Encryption and Spiral Scrambling in Chaotic OFDM-PON
2020
IEEE Photonics Journal
In the improved DNA encoding encryption, the oddeven cross-bit DNA encoding, base scrambling and base-level substitution are determined by chaotic sequences. ...
This paper proposes a novel hybrid secure method based on improved deoxyribonucleic acid (DNA) encoding encryption and spiral scrambling in chaotic OFDM-PON for enhancing the physical-layer security. ...
and improve system security. ...
doi:10.1109/jphot.2020.2987317
fatcat:4zmqijhdd5cmnletxzefiymg44
Increasing Randomization of Ciphertext in DNA Cryptography
2021
International Journal of Advanced Computer Science and Applications
Deoxyribonucleic acid (DNA) cryptography is becoming an emerging area in hiding messages, where DNA bases are used to encode binary data to enhance the randomness of the ciphertext. ...
Therefore, this research aims to reassess the security of the existing DNA cryptography by modifying the steps in the DNA encryption technique and utilizing an existing DNA encoding/decoding table at a ...
In [13] and [14] , a Dynamic DNA sequence table is used in combination with OTP to improve data security. ...
doi:10.14569/ijacsa.2021.0121047
fatcat:tspsxlyhmbhr7ajfkzx3iqzgri
An Enhanced Bilateral Information Security towards a Conventional Cryptographic System using DNA Sequences
2016
Indian Journal of Science and Technology
Improvement: DNA based approach which is more immune to cryptographic attacks. DNA Cryptography is a new and potentially excellent area that enhances data security. ...
In this method we use classical cryptographic technique of substitution method in DNA Cryptography. ...
The contemporary algorithms were used for applying the DNA and Amino Acids notion to more conventional cryptographic algorithms to improve their security features. ...
doi:10.17485/ijst/2016/v9i39/102067
fatcat:rnslzsvzyfbx5loecphkdbpmh4
Multilayer Dynamic Encryption for Security OFDM-PON Using DNA-reconstructed Chaotic Sequences under Cryptanalysis
2021
IEEE Access
Since an illegal ONU does not know the specific implementation rules adopted by the DNA-RCS, the correct data information cannot be recovered even if the security key is obtained. ...
PRINCIPLE The schematic diagram of the proposed multilayer dynamic encryption scheme using DNA-RCS is shown in Fig. 1 . At the OLT, a pseudo-random binary sequence (PRBS) is used as input data. ...
doi:10.1109/access.2021.3054380
fatcat:zazeqk5jnbccbj5mxd2m5znsda
A Review of Modern DNA-based Steganography Approaches
2021
International Journal of Advanced Computer Science and Applications
In the last two decades, the field of DNA-based steganography has emerged as a promising domain to provide security for sensitive information transmitted over an untrusted channel. ...
DNA is strongly nominated by researchers in this field to exceed other data covering mediums like video, image, and text due to its structural characteristics. ...
Data are firstly using Playfair and concealed in a randomly generated DNA sequence. Then, the DNA sequence is embedded in an audio file. ...
doi:10.14569/ijacsa.2021.0121021
fatcat:4x7bfkmuujadnf3a4lzlnyti3y
Secure DNA and Morse code based Profile access control models for Cloud Computing Environment
2020
Procedia Computer Science
The model is based on an integrated DNA morse code pattern that provides data security against collision, man-in-the-middle, and internal attacks. ...
The model is based on an integrated DNA morse code pattern that provides data security against collision, man-in-the-middle, and internal attacks. ...
Murugan et al. in 2017 [5] and 2018 [6] proposed a secured cloud computing environment by encrypting the original data before transmission using an integrated method comprising DNA, Morse Code, and ...
doi:10.1016/j.procs.2020.03.317
fatcat:253qzmqjzjatxl2q7adaujp5dy
New Data hiding method based on DNA and Vigenere Autokey
2017
Academic Journal of Nawroz University
The proposed mechanism hides the secret message via converting it along with the key to the DNA sequences and then applying the Autokey cipher using a special table created via making use of DNA-XOR operator ...
People are always looking for secure methods to protect valuable information against unauthorized access or use. ...
Where, the proposed method made use of the special properties of DNA Sequences for data hiding which is, there is almost no difference between a real DNA sequence and a fake one therefore hiding data in ...
doi:10.25007/ajnu.v6n3a83
fatcat:cgxpdgat5rhanhkfdrroey5kna
Hybrid Cryptosystem with DNA Based Key for Wireless Sensor Networks
2016
International Journal of Wireless & Mobile Networks
In the proposed work, a secret key is introduced which is purely based on DNA sequence named as DNA stego key and is only known to sender and receiver. ...
This DNA stego key is used to hide information and is stored in a carrier. The proposed technique is implemented using java to verify its correctness. ...
DNA steganography with vigenere keys and primer sequences are used to secure data but the main weakness of this method is not to provide fully secure system [16] . ...
doi:10.5121/ijwmn.2016.8602
fatcat:th2enxaiyndq3lgxmftfjscfeq
Secure data storage on DNA hard drives
[article]
2019
bioRxiv
pre-print
The use of DNA base pairing allows for secure encryption on DNA-HDs that requires a physical key and nanopore sensing for decoding. ...
Our study opens a novel pathway for rewritable and secure data storage with DNA.One Sentence SummaryStoring digital information on molecules along DNA hard drives for rewritable and secure data storage ...
In the future, ever-improving methods under development in DNA nanotechnology will undoubtedly improve both writing capabilities and data security. ...
doi:10.1101/857748
fatcat:7frxmvqolfe27o2qmueoh7ejzu
DNA Cryptography with Chaotic Mapping on Images: A Comparative Study
2014
International Journal of Computer Applications
With the research of DNA computing has began, DNA cryptography is born as a new cryptographic field, in which DNA is used as information carrier and the modern biological technology is used as an implementation ...
Dna cryptography can be applied along with chaotic encryption for better performance. ...
The method can be used for both gray and color images.
CONCLUSION DNA cryptography is an art of securing data using DNA sequences. ...
doi:10.5120/17827-8613
fatcat:4erox257abcqjnma5t46czuyza
Improved Security using DNA Cryptography in Wireless Sensor Networks
2016
International Journal of Computer Applications
DNA cryptography depicts a crucial part in the area of security. In DNA cryptography, DNA nucleotide bases are used to store huge amount of data. ...
This paper includes a new security technique based on DNA concept that enhance the security of the wireless sensor networks by including false data in original data, which results a DNA sequence in terms ...
The final data is in the form of nucleotide bases which is then stored as a DNA sequence. ...
doi:10.5120/ijca2016912565
fatcat:6njsweio6zgg5kbt3aagb7jxsy
« Previous
Showing results 1 — 15 out of 51,686 results