[HTML][HTML] Cancelable ECG biometric based on combination of deep transfer learning with DNA and amino acid approaches for human authentication

AS Sakr, P Pławiak, R Tadeusiewicz, M Hammad - Information Sciences, 2022 - Elsevier
Recently, electrocardiogram (ECG) signals have received a high level of attention as a
physiological signal in the field of biometrics. It has presented great possibilities for its …

High-capacity DNA-based steganography

A Khalifa, A Atito - 2012 8th international conference on …, 2012 - ieeexplore.ieee.org
In this paper, a Steganography algorithm is proposed to communicate data securely using
basic concepts and properties of the Deoxyribonucleic Acid (DNA). The proposed method is …

DNA-based cryptographic methods for data hiding in DNA media

S Marwan, A Shawish, K Nagaty - Biosystems, 2016 - Elsevier
Abstract Information security can be achieved using cryptography, steganography or a
combination of them, where data is firstly encrypted using any of the available cryptography …

[PDF][PDF] DNA-based data encryption and hiding using playfair and insertion techniques

A Atito, A Khalifa, SZ Rida - Journal of Communications and …, 2012 - researchgate.net
In this paper, we propose a novel algorithm to communicate data securely. The proposed
technique is a composition of both encryption and data hiding using some properties of …

Hybrid, randomized and high capacity conservative mutations DNA-based steganography for large sized data

G Hamed, M Marey, SES Amin, MF Tolba - Biosystems, 2018 - Elsevier
In this paper, a well secured, high capacity, preserved algorithm is proposed through
integrating the cryptography and steganography concepts with the molecular biology …

A Review on DNA based Cryptography for Data hiding

S Singh, Y Sharma - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
In today's world, securing data is becoming one of the main issues, the elaboration of the
fusion of cryptography and steganography are contemplating as the sphere of on-going …

Hybrid technique for steganography-based on DNA with n-bits binary coding rule

G Hamed, M Marey, SA El-Sayed… - 2015 7th International …, 2015 - ieeexplore.ieee.org
The information capacity is growing significantly as well as its level of importance and its
transformation rate. In this paper, a blind data hiding hybrid technique is introduced using …

Comparative study for various DNA based steganography techniques with the essential conclusions about the future research

G Hamed, M Marey, SA El-Sayed… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Information security and confidentiality has become of prime concern and importance as a
result of the notifiable and explosive growth of the internet. Also, with the growth of …

DNA based steganography: survey and analysis for parameters optimization

G Hamed, M Marey, S El-Sayed, F Tolba - Applications of Intelligent …, 2016 - Springer
Nowadays, cryptography and steganography are considered the most famous and secured
techniques used in the security field. This chapter introduces a survey on the recent DNA …

[PDF][PDF] Secure blind data hiding into pseudo DNA sequences using playfair ciphering and generic complementary substitution

A Khalifa, A Elhadad, S Hamad - Appl Math, 2016 - naturalspublishing.com
Steganography provides unconventional solutions to protect communication as well as
copyright of intellectual property. In this paper, we propose a steganographic method that …