[HTML][HTML] A symmetric DNA encryption process with a biotechnical hardware

E Şatir, O Kendirli - Journal of King Saud University-Science, 2022 - Elsevier
The growing rate of internet/network technologies day by day dramatically increases the
formation of data in the world. As the flow of information increases on the network, time …

An encryption based on DNA cryptography and steganography

KS Sajisha, S Mathew - 2017 international conference of …, 2017 - ieeexplore.ieee.org
The data security is a challenging issue nowadays with the increase of information capacity
and its transmission rate. The most common and widely used techniques in the data security …

A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography

K Jain, P Krishnan, VV Rao - 2021 Fourth International …, 2021 - ieeexplore.ieee.org
Cryptography is the science of encryption and decryption of data using the techniques of
mathematics to achieve secure communication. This enables the user to send the data in an …

Hybrid, randomized and high capacity conservative mutations DNA-based steganography for large sized data

G Hamed, M Marey, SES Amin, MF Tolba - Biosystems, 2018 - Elsevier
In this paper, a well secured, high capacity, preserved algorithm is proposed through
integrating the cryptography and steganography concepts with the molecular biology …

Data security with DNA cryptography

A Das, SK Sarma, S Deka - Transactions on Engineering Technologies …, 2021 - Springer
In the present day world, a lot of works have been done in making the data communication
safe and secured. But an illegal professional practice, ie stealing the data during …

Hybrid technique for steganography-based on DNA with n-bits binary coding rule

G Hamed, M Marey, SA El-Sayed… - 2015 7th International …, 2015 - ieeexplore.ieee.org
The information capacity is growing significantly as well as its level of importance and its
transformation rate. In this paper, a blind data hiding hybrid technique is introduced using …

Comparative study for various DNA based steganography techniques with the essential conclusions about the future research

G Hamed, M Marey, SA El-Sayed… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Information security and confidentiality has become of prime concern and importance as a
result of the notifiable and explosive growth of the internet. Also, with the growth of …

DNA based steganography: survey and analysis for parameters optimization

G Hamed, M Marey, S El-Sayed, F Tolba - Applications of Intelligent …, 2016 - Springer
Nowadays, cryptography and steganography are considered the most famous and secured
techniques used in the security field. This chapter introduces a survey on the recent DNA …

[PDF][PDF] Modified blowfish algorithm

TFG Quilala, AM Sison, RP Medina - Indonesian Journal of …, 2018 - researchgate.net
Cryptography guarantees security in communication through encryption. This paper
proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …

DNA computing in cryptography

J Gao, T **e - Advances in Computers, 2023 - Elsevier
Cryptography is used to prevent any unintentional party from reading or manipulating any
confidential information by converting it from the sender to the receiver and vice versa. It …