[HTML][HTML] Cancelable ECG biometric based on combination of deep transfer learning with DNA and amino acid approaches for human authentication
Recently, electrocardiogram (ECG) signals have received a high level of attention as a
physiological signal in the field of biometrics. It has presented great possibilities for its …
physiological signal in the field of biometrics. It has presented great possibilities for its …
High-capacity DNA-based steganography
In this paper, a Steganography algorithm is proposed to communicate data securely using
basic concepts and properties of the Deoxyribonucleic Acid (DNA). The proposed method is …
basic concepts and properties of the Deoxyribonucleic Acid (DNA). The proposed method is …
DNA-based cryptographic methods for data hiding in DNA media
Abstract Information security can be achieved using cryptography, steganography or a
combination of them, where data is firstly encrypted using any of the available cryptography …
combination of them, where data is firstly encrypted using any of the available cryptography …
[PDF][PDF] DNA-based data encryption and hiding using playfair and insertion techniques
In this paper, we propose a novel algorithm to communicate data securely. The proposed
technique is a composition of both encryption and data hiding using some properties of …
technique is a composition of both encryption and data hiding using some properties of …
Hybrid, randomized and high capacity conservative mutations DNA-based steganography for large sized data
In this paper, a well secured, high capacity, preserved algorithm is proposed through
integrating the cryptography and steganography concepts with the molecular biology …
integrating the cryptography and steganography concepts with the molecular biology …
A Review on DNA based Cryptography for Data hiding
S Singh, Y Sharma - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
In today's world, securing data is becoming one of the main issues, the elaboration of the
fusion of cryptography and steganography are contemplating as the sphere of on-going …
fusion of cryptography and steganography are contemplating as the sphere of on-going …
Hybrid technique for steganography-based on DNA with n-bits binary coding rule
G Hamed, M Marey, SA El-Sayed… - 2015 7th International …, 2015 - ieeexplore.ieee.org
The information capacity is growing significantly as well as its level of importance and its
transformation rate. In this paper, a blind data hiding hybrid technique is introduced using …
transformation rate. In this paper, a blind data hiding hybrid technique is introduced using …
Comparative study for various DNA based steganography techniques with the essential conclusions about the future research
G Hamed, M Marey, SA El-Sayed… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Information security and confidentiality has become of prime concern and importance as a
result of the notifiable and explosive growth of the internet. Also, with the growth of …
result of the notifiable and explosive growth of the internet. Also, with the growth of …
DNA based steganography: survey and analysis for parameters optimization
Nowadays, cryptography and steganography are considered the most famous and secured
techniques used in the security field. This chapter introduces a survey on the recent DNA …
techniques used in the security field. This chapter introduces a survey on the recent DNA …
[PDF][PDF] Secure blind data hiding into pseudo DNA sequences using playfair ciphering and generic complementary substitution
Steganography provides unconventional solutions to protect communication as well as
copyright of intellectual property. In this paper, we propose a steganographic method that …
copyright of intellectual property. In this paper, we propose a steganographic method that …