A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure
S Namasudra - Computers and Electrical Engineering, 2022 - Elsevier
In this digital era, most of the data of an Internet of Things (IoT) infrastructure are
communicated over the internet and they are stored in a cloud environment. As there are …
communicated over the internet and they are stored in a cloud environment. As there are …
Protecting health data in the cloud through steganography: a table-driven, blind method using neural networks and bit-shuffling algorithm
Securing health data stored in the cloud, including DNA sequences, patient information, and
treatment histories, has become increasingly difficult due to modern cyber threats. To …
treatment histories, has become increasingly difficult due to modern cyber threats. To …
Developing a novel DNA-based steganography algorithm using random table generation with segmentation
OH Alhabeeb, F Fauzi, R Sulaiman - Multimedia Tools and Applications, 2024 - Springer
Genome steganography has emerged as a promising field for transmitting large amounts of
data over an untrusted channel in the last two decades. DNA has many advantages over …
data over an untrusted channel in the last two decades. DNA has many advantages over …
DNA Steganography using RNA codons and Amino acids
P Malathi, K Praneeth, PT GVS… - 2023 14th …, 2023 - ieeexplore.ieee.org
The research paper proposes a novel algorithm for DNA steganography, a technique that
involves hiding information within DNA sequences. Our algorithm is based on amino acids …
involves hiding information within DNA sequences. Our algorithm is based on amino acids …
Hiding information in an image using DNA cryptography
In this digital era, all communications are executed over the internet. As there are numerous
users and attackers over the internet, confidential data face many security issues …
users and attackers over the internet, confidential data face many security issues …
DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks
M Nahar, AHM Kamal - International Journal of Computers and …, 2024 - Taylor & Francis
Cyber threats pose a significant challenge to protecting cloud-based health data, including
DNA sequences and patient information. Steganography is a well-known solution to this …
DNA sequences and patient information. Steganography is a well-known solution to this …
[PDF][PDF] Unprecedented Security Analysis Results for a Novel Steganography Approach Based on Protein Sequences.
RJ Kadhim, HK Khafaji - International Journal of Intelligent …, 2023 - researchgate.net
With the rapid advancement of the digital network, information technology, digital libraries,
and especially the services of the world wide web, many types of information can be …
and especially the services of the world wide web, many types of information can be …
An efficient use of toffoli quantum gate for boosting the embedding capacity in DNA sequence
M Nahar, AHM Kamal - 2022 IEEE Asia-Pacific Conference on …, 2022 - ieeexplore.ieee.org
While hiding data in DNA sequence, the steganograpy schemes try to increase the
embedding payload, enhance the security of implanted data, protect the stego expansion …
embedding payload, enhance the security of implanted data, protect the stego expansion …
An effective image steganography scheme based on least significant bits and cover image transportation
ALO Alrwegaoi - 2022 - openaccess.altinbas.edu.tr
In this era of information security and communication, a high priority is achieving a robust
and secure steganography scheme when considering information concealment. Developing …
and secure steganography scheme when considering information concealment. Developing …
[PDF][PDF] An improved image steganography scheme based on distinction grade value and secret message encryption
MS Taha - 2020 - eprints.utm.my
Steganography is an emerging and greatly demanding technique for secure information
communication over the internet using a secret cover object. It can be used for a wide range …
communication over the internet using a secret cover object. It can be used for a wide range …