2010
DOI: 10.1016/j.ins.2010.01.030
|View full text |Cite
|
Sign up to set email alerts
|

Data hiding methods based upon DNA sequences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
156
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 164 publications
(156 citation statements)
references
References 15 publications
0
156
0
Order By: Relevance
“…Thus, they did not recommend integrating a watermark sequence into a noncoding regulatory sequence. Therefore, noncoding DNA in nonliving organisms or primitive organisms, such as bacteria, is suitable for DNA storage [1][2][3], DNA steganography [4][5][6], reversible DNA data hiding [17][18][19][20][30][31][32], or fragile DNA watermarking requiring high data capacity.…”
Section: Requirements Of Reversible Data Hiding In Dna Sequencementioning
confidence: 99%
See 1 more Smart Citation
“…Thus, they did not recommend integrating a watermark sequence into a noncoding regulatory sequence. Therefore, noncoding DNA in nonliving organisms or primitive organisms, such as bacteria, is suitable for DNA storage [1][2][3], DNA steganography [4][5][6], reversible DNA data hiding [17][18][19][20][30][31][32], or fragile DNA watermarking requiring high data capacity.…”
Section: Requirements Of Reversible Data Hiding In Dna Sequencementioning
confidence: 99%
“…Other methods [30][31][32][33] use substitution by the complementary rule of base pairs with a reference DNA sequence. Although these methods cannot change the length of a DNA sequence, they can introduce false start codons [19,20,[30][31][32][33], require a reference sequence to detect and recover nonblind sequences, [31][32][33], or have extremely low watermark capacity [20].…”
Section: Introductionmentioning
confidence: 99%
“…In 2010, H.Shiu et~al proposed three data hiding schemes based on DNA sequence named as : the insertion method, the complementary base-pair method and the substitution method. The most significant one was the substitution method, yet its hiding capacity is not efficient enough [10]. In 2012, A.Khalifa proposed a steganography technique, where data is encrypted using DNA-based playfair cipher, then it's hidden into a real DNA sequence using a modified substitution technique to increase its hiding capacity.…”
Section: Related Workmentioning
confidence: 99%
“…Two types of the selected s are used. In recent years, many steganography were proposed with considering the cracking probability [44][45][46][47][48][49][50][51] under a brute force guessing. The threating mode evaluated here is based on the intruders knowing algorithms but without the order R. In practice, R is a private key and it should be transmitted via a secure channel.…”
Section: Performances Under Other Attacksmentioning
confidence: 99%