2018
DOI: 10.1016/j.biosystems.2018.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid, randomized and high capacity conservative mutations DNA-based steganography for large sized data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…It is usually measured by the number of bits per nucleotide (BPN). A higher data capacity is obtained with a higher (BPN) value [23].…”
Section: Dna Nucleotide Binary Formmentioning
confidence: 97%
“…It is usually measured by the number of bits per nucleotide (BPN). A higher data capacity is obtained with a higher (BPN) value [23].…”
Section: Dna Nucleotide Binary Formmentioning
confidence: 97%
“…These amino acids are further converted to binary and embedded within cover image using 2-3-3 embedding technique and transmitted through the communication channel to the receiver. Ghada Hamed et al, [16] proposed, an algorithm integrating between cryptography and steganography to achieve well secured and high capacity, that algorithm depends on molecular biology concepts. That algorithm is achieved by two phases.…”
Section: B Cryptographymentioning
confidence: 99%
“…However, in 1994, Leonard Adleman demonstrated that by applying stepby-step DNA biochemical reactions, a process like a computer science algorithm, the directed Hamiltonian path problem could be solved efficiently due to the large number of simultaneous DNA reactions [5]. Since then, DNA computing has become an eye-catching branch in computer science [2,3,6,7,8,9,10,11,12]. In 1999, Clelland et al encoded a secret message as a DNA fragment (the secret-message DNA) and hid it among many other "junk" DNA fragments.…”
Section: Related Workmentioning
confidence: 99%
“…www.ijacsa.thesai.org There are three classical methods to hide data into DNA sequences, namely the insertion method, the complementary pair method, and the substitution method [4]. Several revisions of these methods were proposed, but the fundamental techniques keep the same [7,9,11]. All the methods require a binary coding rule to convert between binary digits and nucleotide bases (A, C, G, T).…”
Section: Related Workmentioning
confidence: 99%