A Blind DNA-Steganography Approach using Ciphering and Random Sequence Splicing
暂无分享,去创建一个
[1] A. Khalifa,et al. Secure Blind Data Hiding into Pseudo DNA Sequences Using Playfair Ciphering and Generic Complementary Substitution , 2016 .
[2] Dominik Heider,et al. DNA-based watermarks using the DNA-Crypt algorithm , 2007, BMC Bioinformatics.
[3] Dominik Heider,et al. DNA watermarks in non-coding regulatory sequences , 2009, BMC Research Notes.
[4] Safwat Hamad. A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data , 2014 .
[5] Manju Bansal,et al. A glossary of DNA structures from A to Z. , 2003, Acta crystallographica. Section D, Biological crystallography.
[6] Amal Said Khalifa,et al. Robust video steganography algorithm using adaptive skin-tone detection , 2015, Multimedia Tools and Applications.
[7] David A. Dampier,et al. Methods of Information Hiding and Detection in File Systems , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[8] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[9] Amal Khalifa,et al. DNA Watermarking Using Codon Postfix Technique , 2018, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[10] Richard C. T. Lee,et al. Data hiding methods based upon DNA sequences , 2010, Inf. Sci..
[11] Chinchen Chang,et al. REVERSIBLE DATA HIDING SCHEMES FOR DEOXYRIBONUCLEIC ACID (DNA) MEDIUM , 2007 .
[12] Subhi R. M. Zeebaree,et al. Security Issues in DNA Based on Data Hiding : A Review , 2018 .
[13] Suk Hwan Lee. Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting , 2018, Secur. Commun. Networks.
[14] Viviana I. Risca. DNA-BASED STEGANOGRAPHY , 2001, Cryptologia.
[15] Masanori Arita,et al. Secret Signatures Inside Genomic DNA , 2004, Biotechnology progress.
[16] S. Jiao,et al. Hiding data in DNA of living organisms , 2009 .
[17] Amal Khalifa,et al. DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques , 2011 .
[18] Sonal K. Jagtap,et al. Audio Steganography Used for Secure Data Transmission , 2013 .
[19] Amal Khalifa. LSBase: A key encapsulation scheme to improve hybrid crypto-systems using DNA steganography , 2013, 2013 8th International Conference on Computer Engineering & Systems (ICCES).
[20] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[21] I-Ting Chi,et al. A Vertex-Based 3D Authentication Algorithm Based on Spatial Subdivision , 2018, Symmetry.