Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 8 SI
Page No. 10240 - 10244

ECC Based Blind Steganography-DNA for Hidden Information

Authors : Zena Ahmed, Saher Adil and Saif M. Kh. Al-Alak

References

Abbasy, M.R. and B. Shanmugam, 2011. Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences. Proceedings of the 2011 IEEE World Congress on Services, July 4-9, 2011, IEEE, Washington, DC, USA., ISBN:978-1-4577-0879-4, pp: 385-390.

Anderson, R., R. Needham and A. Shamir, 1998. The steganographic file system. Proceedings of the 2nd International Workshop on Information Hiding, Apr. 14-17, Portland, Oregon, USA., pp: 73-82.

Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
CrossRef  |  Direct Link  |  

Cherian, A., S.R. Raj and A. Abraham, 2013. A survey on different DNA cryptographic methods. Intl. J. Sci. Res., 2: 167-169.
Direct Link  |  

Ghosh, A. and M. Bansal, 2003. A glossary of DNA structures from A to Z. Acta Crystallogr. Sect. D. Biol. Crystallogr., 59: 620-626.
CrossRef  |  PubMed  |  Direct Link  |  

Khalifa, A., A. Elhadad and S. Hamad, 2016. Secure blind data hiding into pseudo DNA sequences using playfair ciphering and generic complementary substitution. Appl. Math. Inf. Sci., 10: 1483-1492.
Direct Link  |  

Lu, M., X. Lai, G. Xiao and L. Qin, 2007. Symmetric-key cryptosystem with DNA technology. Sci. China Ser. F: Inform. Sci., 50: 324-333.
CrossRef  |  

Lu, M., X. Lai, G. Xiao and L. Qin, 2007. Symmetric-key cryptosystem with DNA technology. Sci. China Ser. F: Inform. Sci., 50: 324-333.
CrossRef  |  

Murdoch, S.J. and S. Lewis, 2005. Embedding covert channels into TCP/IP. Proceedings of the 7th International Workshop on Information Hiding, June 6-8, 2005, Springer, Berlin, Germany, ISBN:978-3-540-29039-1, pp: 247-261.

Sabry, M., M. Hashem, T. Nazmy and M.E. Khalifa, 2010. A DNA and amino acids-based implementation of playfair cipher. Intl. J. Comput. Sci. Inf. Secur., 8: 129-136.

Shimanovsky, B., J. Feng and M. Potkonjak, 2003. Hiding Data in DNA. In: Information Hiding, Petitcolas, F.A.P. (Ed.). Springer, New York, ISBN: 9783540364153, pp: 373-386.

Shiu, H.J., K.L. Ng, J.F. Fang, R.C.T. Lee and C.H. Huang, 2010. Data hiding methods based upon DNA sequences. Inform. Sci., 180: 2196-2208.
CrossRef  |  

Yan, D., R. Wang, X. Yu and J. Zhu, 2012. Steganography for MP3 audio by exploiting the rule of window switching. Comput. Secur., 31: 704-716.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved