[PDF][PDF] DNA based cryptographic techniques: A review

K Gupta, S Singh - International Journal of Advanced Research in …, 2013 - academia.edu
Today, information has become very important resource and so is its security. Many
traditional mathematical algorithms have been developed for encrypting the information or …

A technique for DNA cryptography based on dynamic mechanisms

MR Biswas, KMR Alam, S Tamura… - Journal of Information …, 2019 - Elsevier
This paper proposes a technique for DNA cryptography based on dynamic mechanisms
ie.'dynamic sequence table'and 'dynamic DNA encoding'. To form dynamic sequence table …

DWT based coding DNA watermarking for DNA copyright protection

SH Lee - Information Sciences, 2014 - Elsevier
DNA watermarking is a technique for copyright protection and ownership authentication of
DNA sequences and ensures the security of private genetic information. This paper …

DNA cryptography

S Pramanik, SK Setua - 2012 7th international conference on …, 2012 - ieeexplore.ieee.org
DNA cryptography is a new promising field in cryptography which emerged with the
progress of DNA computing. The concept of massive parallelism and large information …

A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography

K Jain, P Krishnan, VV Rao - 2021 Fourth International …, 2021 - ieeexplore.ieee.org
Cryptography is the science of encryption and decryption of data using the techniques of
mathematics to achieve secure communication. This enables the user to send the data in an …

[PDF][PDF] Inspired Pseudo Biotic DNA based Cryptographic Mechanism against Adaptive Cryptographic Attacks.

ES Babu, CN Raju, MHMK Prasad - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
DNA Cryptography is a new cryptographic paradigm from hastily growing bio molecular
computation, as its computational power will determine next generation computing. As …

A modified lightweight DNA‐based cryptography method for internet of things devices

B AL‐Shargabi, A Dar Assi - Expert Systems, 2023 - Wiley Online Library
The data generated by the applications of the internet of things (IoT) that transmit sensitive
and secret information via wireless sensor networks (WSN) must be safeguarded as major …

Construction of DNA Codes from composite matrices and a bio-inspired optimization algorithm

ST Dougherty, A Korban, S Şahinkaya… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this work, we present a new construction method for reversible codes. We employ
composite matrices derived from group rings and show how to construct these matrices so …

A Survey on DNA-Based Cryptography and Steganography

T Mahjabin, A Olteanu, Y **ao, W Han, T Li… - IEEE Access, 2023 - ieeexplore.ieee.org
This paper provides a comprehensive survey of different techniques for Deoxyribonucleic
acid (DNA)-based cryptography and steganography. DNA-based cryptography is an …

Comparative study for various DNA based steganography techniques with the essential conclusions about the future research

G Hamed, M Marey, SA El-Sayed… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Information security and confidentiality has become of prime concern and importance as a
result of the notifiable and explosive growth of the internet. Also, with the growth of …