2016 11th International Conference on Computer Engineering &Amp; Systems (ICCES) 2016
DOI: 10.1109/icces.2016.7822003
|View full text |Cite
|
Sign up to set email alerts
|

Comparative study for various DNA based steganography techniques with the essential conclusions about the future research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 15 publications
0
14
0
Order By: Relevance
“…= 24 encoding ways [28]. DNA is being proposed for use in many computational applications in a bid to solve many NP-complete and other hard problems [9]. The first experimental of data hiding technique in DNA had done successfully by Clelland using DNA microdots, for concealing secret data [29].…”
Section: Dnamentioning
confidence: 99%
See 2 more Smart Citations
“…= 24 encoding ways [28]. DNA is being proposed for use in many computational applications in a bid to solve many NP-complete and other hard problems [9]. The first experimental of data hiding technique in DNA had done successfully by Clelland using DNA microdots, for concealing secret data [29].…”
Section: Dnamentioning
confidence: 99%
“…The substitution ciphers encrypt the confidential data by substituting the data one piece at a time. While in the transposition cipher, the positions held by units of confidential data are shifted according to a regular system, so that the cipher data constitutes a permutation of the confidential data [9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…• Bits per nucleotides (bpn), it is the total number of bits hidden per character [21][22][23][24][25] Highly improved DNA based steganography techniques The algorithm has many features distinguishing it from other algorithms used in hiding data in DNA sequences. One of the most important advantages is that the probability of knowing the data inside the DNA sequence by an adversary is very small.…”
Section: Security Analysismentioning
confidence: 99%
“…Encryption and concealment of information are among the most widely used methods in networking and information security. Encryption and concealment of information (both similar concepts) are commonly used to keep communications secure [2,3] fact that both methods have the same purpose. Still, their development and use are vastly different.…”
Section: Introductionmentioning
confidence: 99%