2016
DOI: 10.5815/ijcnis.2016.07.01
|View full text |Cite
|
Sign up to set email alerts
|

DNA-Genetic Encryption Technique

Abstract: Abstract-In this paper, we propose DNA-Genetic Encryption Technique (D-GET) in order to make the technique more secure and less predictable. In this technique, binaries any type of digital data and convert it to DNA sequencing, reshape, encrypt, crossover, mutate and then reshape. The main stages of D-GET are repeated three times or more. Transmit the encrypted data in text/image format file. In other side, the receiver uses the D-GET to decrypt the received data and reshape it to original format. This Techniq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…Differences from the existing scenario where a user code/decode of data on a laptop mechanism only. [17] We use crypto (symmetric encryption and decryption algorithms) power-resourcefully requirement to understand the interaction between power utilization and encryption and decryption constraint shown in table no-1 which shows the original message convert into ASCII code .We use the formula for encrypting original message and got the quotient and reminder . After decrypting received the message by using formula and get the ASCII value and then convert into the original message.…”
Section: Mutationmentioning
confidence: 99%
“…Differences from the existing scenario where a user code/decode of data on a laptop mechanism only. [17] We use crypto (symmetric encryption and decryption algorithms) power-resourcefully requirement to understand the interaction between power utilization and encryption and decryption constraint shown in table no-1 which shows the original message convert into ASCII code .We use the formula for encrypting original message and got the quotient and reminder . After decrypting received the message by using formula and get the ASCII value and then convert into the original message.…”
Section: Mutationmentioning
confidence: 99%
“…Shared Mixed Polarity Reed- Genetic Algorithm (GA) is a meta-heuristic search algorithm that stochastically exploits within a population of the solution to solve optimization problem [30]. GA, a popular optimization algorithm finds its application from healthcare to general studies [31][32][33]. In the algorithmic process, each solution in a population is assigned a fitness value and behave analogous manner to natural selection as proposed by Darwin.…”
Section: Power-density Esimationmentioning
confidence: 99%
“…There are researchers proposed encryption systems using 1-D and high-dimensional chaotic maps [15][16][17]. Some authors consider using a combination of DNA and chaotic maps in cryptosystems to realize authentication and confidentiality for digital data [18][19][20]. Many researchers proposed cryptosystems to enhance the quality of the encrypted data using evolutionary computation, metaheuristic algorithms, and fuzzy logic systems [21][22][23].…”
Section: Introductionmentioning
confidence: 99%