2020
DOI: 10.1016/j.matpr.2020.09.790
|View full text |Cite|
|
Sign up to set email alerts
|

WITHDRAWN: DNA based SHA512-ECC cryptography and CM-CSA based steganography for data security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…To encrypt and disguise the user data in the video, Jose et al [16] proposed a combination of cryptography and steganography. For generating keys, they developed SHA512-ECC, which combines the SHA512 hash function with the elliptic curve-ECC.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To encrypt and disguise the user data in the video, Jose et al [16] proposed a combination of cryptography and steganography. For generating keys, they developed SHA512-ECC, which combines the SHA512 hash function with the elliptic curve-ECC.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Finally, in the mid of the 20th century, the properties of P -codes were studied by the leading scholars in the area, including Shannon, Fano, Huffman, etc. Nowadays, one area of cryptography which employs prefix codes is the DNA cryptography [13], in which many cryptosystems utilize binary prefix codes as the plaintext space [7], [12].…”
Section: Introductionmentioning
confidence: 99%
“…Many studies were done on the topic of DNA cryptography and steganography. The previous study that discussed DNA cryptography are DNA techniques with RSA [13], DNA technique with Playfair cipher [12,14], DNA-based encryption using pointers [15], DNA encryption using ECC [16], DNA encryption using El Gamal [17], DNA symmetric encryption using Feistel network coding [18], DNA encryption for cloud data sharing using proxy [19], DNA encryption for cloud computing based on genetics technique combined with logicalmathematic function [20], DNA cryptography based on genetic algorithm [21], and DNA encryption using PCR [22]. On the other hand, there is a researcher that discusses DNA steganography.…”
Section: Introductionmentioning
confidence: 99%