[PDF][PDF] DNA based cryptographic techniques: A review
K Gupta, S Singh - International Journal of Advanced Research in …, 2013 - academia.edu
Today, information has become very important resource and so is its security. Many
traditional mathematical algorithms have been developed for encrypting the information or …
traditional mathematical algorithms have been developed for encrypting the information or …
A technique for DNA cryptography based on dynamic mechanisms
This paper proposes a technique for DNA cryptography based on dynamic mechanisms
ie.'dynamic sequence table'and 'dynamic DNA encoding'. To form dynamic sequence table …
ie.'dynamic sequence table'and 'dynamic DNA encoding'. To form dynamic sequence table …
DWT based coding DNA watermarking for DNA copyright protection
SH Lee - Information Sciences, 2014 - Elsevier
DNA watermarking is a technique for copyright protection and ownership authentication of
DNA sequences and ensures the security of private genetic information. This paper …
DNA sequences and ensures the security of private genetic information. This paper …
DNA cryptography
S Pramanik, SK Setua - 2012 7th international conference on …, 2012 - ieeexplore.ieee.org
DNA cryptography is a new promising field in cryptography which emerged with the
progress of DNA computing. The concept of massive parallelism and large information …
progress of DNA computing. The concept of massive parallelism and large information …
A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography
Cryptography is the science of encryption and decryption of data using the techniques of
mathematics to achieve secure communication. This enables the user to send the data in an …
mathematics to achieve secure communication. This enables the user to send the data in an …
[PDF][PDF] Inspired Pseudo Biotic DNA based Cryptographic Mechanism against Adaptive Cryptographic Attacks.
DNA Cryptography is a new cryptographic paradigm from hastily growing bio molecular
computation, as its computational power will determine next generation computing. As …
computation, as its computational power will determine next generation computing. As …
A modified lightweight DNA‐based cryptography method for internet of things devices
B AL‐Shargabi, A Dar Assi - Expert Systems, 2023 - Wiley Online Library
The data generated by the applications of the internet of things (IoT) that transmit sensitive
and secret information via wireless sensor networks (WSN) must be safeguarded as major …
and secret information via wireless sensor networks (WSN) must be safeguarded as major …
Construction of DNA Codes from composite matrices and a bio-inspired optimization algorithm
In this work, we present a new construction method for reversible codes. We employ
composite matrices derived from group rings and show how to construct these matrices so …
composite matrices derived from group rings and show how to construct these matrices so …
A Survey on DNA-Based Cryptography and Steganography
This paper provides a comprehensive survey of different techniques for Deoxyribonucleic
acid (DNA)-based cryptography and steganography. DNA-based cryptography is an …
acid (DNA)-based cryptography and steganography. DNA-based cryptography is an …
Comparative study for various DNA based steganography techniques with the essential conclusions about the future research
G Hamed, M Marey, SA El-Sayed… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Information security and confidentiality has become of prime concern and importance as a
result of the notifiable and explosive growth of the internet. Also, with the growth of …
result of the notifiable and explosive growth of the internet. Also, with the growth of …