[HTML][HTML] A symmetric DNA encryption process with a biotechnical hardware
The growing rate of internet/network technologies day by day dramatically increases the
formation of data in the world. As the flow of information increases on the network, time …
formation of data in the world. As the flow of information increases on the network, time …
An encryption based on DNA cryptography and steganography
KS Sajisha, S Mathew - 2017 international conference of …, 2017 - ieeexplore.ieee.org
The data security is a challenging issue nowadays with the increase of information capacity
and its transmission rate. The most common and widely used techniques in the data security …
and its transmission rate. The most common and widely used techniques in the data security …
A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography
Cryptography is the science of encryption and decryption of data using the techniques of
mathematics to achieve secure communication. This enables the user to send the data in an …
mathematics to achieve secure communication. This enables the user to send the data in an …
Hybrid, randomized and high capacity conservative mutations DNA-based steganography for large sized data
In this paper, a well secured, high capacity, preserved algorithm is proposed through
integrating the cryptography and steganography concepts with the molecular biology …
integrating the cryptography and steganography concepts with the molecular biology …
Data security with DNA cryptography
A Das, SK Sarma, S Deka - Transactions on Engineering Technologies …, 2021 - Springer
In the present day world, a lot of works have been done in making the data communication
safe and secured. But an illegal professional practice, ie stealing the data during …
safe and secured. But an illegal professional practice, ie stealing the data during …
Hybrid technique for steganography-based on DNA with n-bits binary coding rule
G Hamed, M Marey, SA El-Sayed… - 2015 7th International …, 2015 - ieeexplore.ieee.org
The information capacity is growing significantly as well as its level of importance and its
transformation rate. In this paper, a blind data hiding hybrid technique is introduced using …
transformation rate. In this paper, a blind data hiding hybrid technique is introduced using …
Comparative study for various DNA based steganography techniques with the essential conclusions about the future research
G Hamed, M Marey, SA El-Sayed… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Information security and confidentiality has become of prime concern and importance as a
result of the notifiable and explosive growth of the internet. Also, with the growth of …
result of the notifiable and explosive growth of the internet. Also, with the growth of …
DNA based steganography: survey and analysis for parameters optimization
Nowadays, cryptography and steganography are considered the most famous and secured
techniques used in the security field. This chapter introduces a survey on the recent DNA …
techniques used in the security field. This chapter introduces a survey on the recent DNA …
[PDF][PDF] Modified blowfish algorithm
Cryptography guarantees security in communication through encryption. This paper
proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …
proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …
DNA computing in cryptography
J Gao, T **e - Advances in Computers, 2023 - Elsevier
Cryptography is used to prevent any unintentional party from reading or manipulating any
confidential information by converting it from the sender to the receiver and vice versa. It …
confidential information by converting it from the sender to the receiver and vice versa. It …