HyDEn: A Hybrid Steganocryptographic Approach for Data Encryption Using Randomized Error-Correcting DNA Codes
暂无分享,去创建一个
[1] Ja-Ling Wu,et al. Digital invisible ink and its applications in steganography , 2006, MM&Sec '06.
[2] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[3] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[4] Neil J. A. Sloane,et al. The theory of error-correcting codes (north-holland , 1977 .
[5] Niema Aboluion,et al. Linear and nonlinear constructions of DNA codes with Hamming distance d, constant GC-content and a reverse-complement constraint , 2012 .
[6] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[7] Giuseppe Di Battista,et al. 26 Computer Networks , 2004 .
[8] Anne Condon,et al. Stochastic Local Search Algorithms for DNA Word Design , 2002, DNA.
[9] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[10] Mohammad Reza Najaf Torkaman,et al. INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USINGDNA STEGANOGRAPHY , 2012 .
[11] Amit Marathe,et al. On combinatorial DNA word design , 1999, DNA Based Computers.
[12] Hiroaki Kojima,et al. Design of True Random One-Time Pads in DNA XOR Cryptosystem , 2009, IWNC.
[13] M. Friedman. The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance , 1937 .
[14] Richard C. T. Lee,et al. Data hiding methods based upon DNA sequences , 2010, Inf. Sci..
[15] Patric R. J. Östergård,et al. Error-Correcting Codes over an Alphabet of Four Elements , 2001, Des. Codes Cryptogr..
[16] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[17] Viviana I. Risca. DNA-BASED STEGANOGRAPHY , 2001, Cryptologia.
[18] Masanori Arita,et al. Secret Signatures Inside Genomic DNA , 2004, Biotechnology progress.
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] Dominik Heider,et al. DNA-based watermarks using the DNA-Crypt algorithm , 2007, BMC Bioinformatics.
[21] Oliver D. King,et al. Linear constructions for DNA codes , 2005, Theor. Comput. Sci..
[22] Philip Zimmermann,et al. PGP source code and internals , 1995 .
[23] Holger H. Hoos,et al. Hybrid Randomised Neighbourhoods Improve Stochastic Local Search for DNA Code Design , 2003, Canadian Conference on AI.
[24] Oliver D. King,et al. Bounds for DNA Codes with Constant GC-Content , 2003, Electron. J. Comb..
[25] Koen De Bosschere,et al. Steganography for Executables and Code Transformation Signatures , 2004, ICISC.
[26] Pak Chung Wong,et al. Organic data memory using the DNA approach , 2003, CACM.
[27] John H. Reif,et al. DNA-based Cryptography , 1999, Aspects of Molecular Computing.
[28] Keshav P. Dahal,et al. Review on the Advancements of DNA Cryptography , 2010, ArXiv.
[29] A Leier,et al. Cryptography with DNA binary strands. , 2000, Bio Systems.
[30] Roberto Montemanni,et al. Construction of Constant GC-Content DNA Codes via a Variable Neighbourhood Search Algorithm , 2008, J. Math. Model. Algorithms.
[31] Eric Cole,et al. Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .
[32] Catherine Taylor Clelland,et al. Hiding messages in DNA microdots , 1999, Nature.
[33] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[34] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[35] K. Mullis,et al. Primer-directed enzymatic amplification of DNA with a thermostable DNA polymerase. , 1988, Science.
[36] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.