2021
DOI: 10.1007/978-981-15-8711-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Information Embedding Using DNA Sequences for Covert Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 46 publications
0
5
0
Order By: Relevance
“…As shown in Table 8, the best algorithms in term of BPN for data hiding that based on DNA sequences is in [21][22][23] for hiding 20K Bytes data, since it uses a DNA bases to hide on maximum only two bits, while the suggested method doubles the hiding capacity (average BPN) by employing a base to hide up to four bits. The payload of the proposed method is Zero, since no expansion in the faked protein sequence after the embedding process.…”
Section: Comparisons the Proposed Methods With Other Existing Techniq...mentioning
confidence: 99%
See 1 more Smart Citation
“…As shown in Table 8, the best algorithms in term of BPN for data hiding that based on DNA sequences is in [21][22][23] for hiding 20K Bytes data, since it uses a DNA bases to hide on maximum only two bits, while the suggested method doubles the hiding capacity (average BPN) by employing a base to hide up to four bits. The payload of the proposed method is Zero, since no expansion in the faked protein sequence after the embedding process.…”
Section: Comparisons the Proposed Methods With Other Existing Techniq...mentioning
confidence: 99%
“…The number of the secret bits that can be embedded in the reference DNA sequence in each nucleotide(bpn) for this method is 2 bits which is low, the cracking probability is higher than our method, and when the size of the data is very large, the genetic algorithm takes a long time to find the hiding positions. Nabi et al [23] proposed two new methods based on DNA to hide and encrypt the data, the substitution and insertion methods. In the substitution method, the secret data is concealed in a DNA sequence by substituting each nucleotide base with another nucleotide base based on two bits of the secret data.…”
Section: Related Workmentioning
confidence: 99%
“…The thesis suggests using chaos theory, cryptography, and genetic coding to make a foolproof security system. Both a 1D-2logistic map and a 4D hyperchaotic map were used in the suggested approach [22].…”
Section: -In 2020(b Adithya and G Santhi) Proposed Work That Show How...mentioning
confidence: 99%
“…As a result, it gives us more peace of mind than any other kind of secrecy could. Shah Haris Nabi et al developed a state-of-the-art approach to data concealment using DNA sequences in 2021 [15]. A DNA sequence database is queried for the reference sequence.…”
Section: -0652mentioning
confidence: 99%
“…Tarek Hagras et al, 2022 [16] Study entitled " Anti-attacks encryption algorithm based on DNA computing and data encryption standard," An encryption/decryption technique for any form of data based on DES-DNA is presented in this work. There are two variants of the Encrypt algorithm.…”
Section: -Encryption Algorithm Using Dnamentioning
confidence: 99%