2019
DOI: 10.1007/978-981-15-0361-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Data Security Techniques Based on DNA Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…DNA contains four bases: A, T, C, and G, and two binary numbers are needed to represent the four bases, such as A (00), T (11), C (01), G (10), so there are different representation methods. As we all know, A and T are complementary, and C and G are complementary.…”
Section: Dna Coding and Operationsmentioning
confidence: 99%
See 1 more Smart Citation
“…DNA contains four bases: A, T, C, and G, and two binary numbers are needed to represent the four bases, such as A (00), T (11), C (01), G (10), so there are different representation methods. As we all know, A and T are complementary, and C and G are complementary.…”
Section: Dna Coding and Operationsmentioning
confidence: 99%
“…To save data from robberies, secret writing methods were used, and the most popular ones are cryptography and steganography. DNA cryptography can encrypt or encode the data using DNA computing techniques due to the DNA properties like parallel molecular computing, storing, transmitting the data, and computing capabilities [11][12][13][14]. DNA is also used for other purposes like Cryptography, Intrusion detection systems, and Steganography.…”
Section: Introductionmentioning
confidence: 99%
“…Recovering the plain data from the cipher data can be evaluated by an occlusion attack. Some statistical criteria, such as MSE and PSNR, 37 are used to measure how well the original data are obtained from the encrypted data without certain data loss. Data transmission in a network may cause data SSIM x; y ð Þ¼…”
Section: Occlusion Attack Analysismentioning
confidence: 99%
“…All cryptographic algorithms require large memory and complex computations; DNA cryptography is beneficial because 1 g of DNA contains about 1,021 DNA bases and can store 108 terabytes. 37 Trillions of binary data bits can be stored in just 1 dm 3 of a DNA solution. 3 Moreover, DNA computing requires a shorter time compared with other cryptographic algorithms.…”
Section: Dna Cryptographymentioning
confidence: 99%
See 1 more Smart Citation