2016
DOI: 10.1016/j.biosystems.2016.08.013
|View full text |Cite
|
Sign up to set email alerts
|

DNA-based cryptographic methods for data hiding in DNA media

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(25 citation statements)
references
References 8 publications
0
25
0
Order By: Relevance
“…Two types of the selected s are used. In recent years, many steganography were proposed with considering the cracking probability [44][45][46][47][48][49][50][51] under a brute force guessing. The threating mode evaluated here is based on the intruders knowing algorithms but without the order R. In practice, R is a private key and it should be transmitted via a secure channel.…”
Section: Performances Under Other Attacksmentioning
confidence: 99%
“…Two types of the selected s are used. In recent years, many steganography were proposed with considering the cracking probability [44][45][46][47][48][49][50][51] under a brute force guessing. The threating mode evaluated here is based on the intruders knowing algorithms but without the order R. In practice, R is a private key and it should be transmitted via a secure channel.…”
Section: Performances Under Other Attacksmentioning
confidence: 99%
“…AES is another method which has three options in terms of key size, either 256 or 192 or 128. This increase the security level of this technique as the key size has a positive correlation with security level [1]. In our proposed algorithm, the key size is composed of 16 amino acid letters.…”
Section: A Key Sizementioning
confidence: 99%
“…In RSA cipher case, there is a positive relation between the key size and the data size. Each amount of data should has an appropriate key size [1] . In this new method, the data size has no limitation.…”
Section: B Data Sizementioning
confidence: 99%
See 1 more Smart Citation
“…The estimation reveals that the P2Q method can considerably decrease the response time and offer high exploring effectiveness devoid of negotiating on exploration quality. Marwan et al [21] suggested an inclusive investigation among the DNA-dependent vigenere, play fair, AES ciphers and the RSA, all joined with a DNA screening method. Investigational studies authenticate such excellent performance in contrast with the entire examined combined methods.…”
Section: A State-of-the-art Of Contributionsmentioning
confidence: 99%