2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) 2016
DOI: 10.1109/icatcct.2016.7912037
|View full text |Cite
|
Sign up to set email alerts
|

Fast three level DNA Cryptographic technique to provide better security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…The execution time of the proposed technique compared with the related techniques is shown in Figure 4. The comparison involved two related techniques, [36] and [10]. The comparison was carried out on different file sizes including 1, 2, 5, 10, and 15 KB.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The execution time of the proposed technique compared with the related techniques is shown in Figure 4. The comparison involved two related techniques, [36] and [10]. The comparison was carried out on different file sizes including 1, 2, 5, 10, and 15 KB.…”
Section: Discussionmentioning
confidence: 99%
“…The comparison depends on many factors, including the number of security layers, encryption function, and steganography method use. Several papers used different techniques for the encryption process such as: XOR operation, complement rule, shift operation, LBP operation, MSB and LSB values, 2-bit or 4-bit DNA conversion, keccak, feistel network, amino acid based, AES, RSA, elgamal, paillier and payfair cipher techniques [35,36,37,38,10,39]. Additionally, they used several techniques for the hiding process such as: LSB, MSB, knight tour, ambiguity bits, lsbase, adjacent Base techniques [16,40,4].…”
Section: Motivationmentioning
confidence: 99%
“…Generally the adenine acid always pairs with thymine acid as same as the guanine nucleic acid will always pairs with cytosine nucleic acids. It is also known as Watsoncrick rule [3]. For example, in binary system if the adenine component is 00 means thymine component will be 11 similarly if the cytosine component is 10 means surely the guanine will be 01.…”
Section: B Dna Sequence Based Encryptionmentioning
confidence: 99%
“…Cryptography is the use of codes and cyphers in order to encrypt data to keep them safe, either in transmission between people as a message or safekeeping in storage [ 106 , 107 , 108 ]. Many multidisciplinary researchers have been applying their research to encryption, including, but not limited to, fluorescence [ 109 , 110 , 111 , 112 , 113 , 114 , 115 , 116 , 117 ], nuclear magnetic resonance (NMR) [ 118 ], bacteria [ 119 ], antibodies [ 120 ], and molecular computing systems [ 121 , 122 , 123 , 124 ], with the heaviest research in DNA applications [ 125 , 126 , 127 , 128 , 129 , 130 , 131 , 132 , 133 ].…”
Section: Introductionmentioning
confidence: 99%