2021
DOI: 10.14569/ijacsa.2021.0121021
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Modern DNA-based Steganography Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 40 publications
0
0
0
Order By: Relevance
“…This connection is not formed randomly. Double hydrogen bonds always exist between A and T, while triple hydrogen bonds always exist between C and G [24]. Fig.…”
Section: Encryption Based On the Sequence Of Dnamentioning
confidence: 93%
See 1 more Smart Citation
“…This connection is not formed randomly. Double hydrogen bonds always exist between A and T, while triple hydrogen bonds always exist between C and G [24]. Fig.…”
Section: Encryption Based On the Sequence Of Dnamentioning
confidence: 93%
“…Instead of using electronic chips, DNA computing uses molecular biology, technology, and biochemistry [21].The DNA molecule stores genetic information in the form of code. DNA is made up of two long strands that are twisted on each other, These two strands are linked together by units known as nucleotides, giving DNA the structure of a helix ladder [24].which is made up of four chemical components [25]. In DNA computing, the four nitrogen bases (Adenine, Guanine, Cytosine, and Thymine) are used to represent data in the same way that the human genetic code uses them [26].…”
Section: Encryption Based On the Sequence Of Dnamentioning
confidence: 99%
“…However, the availability of the ciphertext raises suspicions and draws the attention of opponents. On the other hand, steganography seems to be more appropriate and has recently received much attention, since it does not give rise to any signs detectable by the human eyes [2]. Steganography is the science of hiding relatively smaller information in a larger multimedia cover.…”
Section: Introductionmentioning
confidence: 99%
“…To protect against cybercrime and ensure safe data transmission, data scientists and researchers are working hard to implement multiple methods and techniques. Photos have been used to pass on secrets from one person to another for years [1]. However, recently, the focus has been on making this process as safe as possible.…”
Section: Introductionmentioning
confidence: 99%