scispace - formally typeset
Search or ask a question
Book ChapterDOI

Data Security Techniques Based on DNA Encryption

TL;DR: In this work, DNA encryption and its different approaches are discussed to give a brief overview on the data security methods based on DNA encryption.
Abstract: Security of the digital data is one of the major concerns of the today’s world. There are several methods for digital data security that can be found in the literature. Biological sequences have some features that make it worthy for the digital data security processes. In this work, DNA encryption and its different approaches are discussed to give a brief overview on the data security methods based on DNA encryption. This work can be highly beneficial for future research on DNA encryption and can be applied on different domains.
Citations
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: In this chapter, a comprehensive overview of the deep learning-assisted biomedical image analysis methods is presented and can be helpful for the researchers to understand the recent developments and drawbacks of the present systems.
Abstract: Biomedical image analysis methods are gradually shifting towards computer-aided solutions from manual investigations to save time and improve the quality of the diagnosis. Deep learning-assisted biomedical image analysis is one of the major and active research areas. Several researchers are working in this domain because deep learning-assisted computer-aided diagnostic solutions are well known for their efficiency. In this chapter, a comprehensive overview of the deep learning-assisted biomedical image analysis methods is presented. This chapter can be helpful for the researchers to understand the recent developments and drawbacks of the present systems. The discussion is made from the perspective of the computer vision, pattern recognition, and artificial intelligence. This chapter can help to get future research directions to exploit the blessings of deep learning techniques for biomedical image analysis.

28 citations

Journal ArticleDOI
TL;DR: A new method has been eliciting for encoding 2D and 3D color images using DNA strand construction as the basis for structuring the method, which achieved good results when compared with the results of other methods in terms of quality and time.
Abstract: — In this study, a new method has been eliciting for encoding 2D and 3D color images. The DNA strand construction was used as the basis for structuring the method. This method consisted of two main stages, the encryption and decryption stages. As each stage includes several operations to reach the desired goal. In the coding stage, a special table was prepared to show the mechanism of work. It starts with encoding the DNA bases into two binary orders, then two zeros are added to the string to finally consist of four binary bits whose size is parallel to the representation of a set of hexadecimal numbers represented in binary, where the XOR operation is then done between the two values to be the result is completely different from the original code. Then the binary values we obtained are converted to decimal values that are placed in an array with the same size as the image to be encoded. Finally, this last array was processed with the exponential function factor, so the final result is a 100% encoded image. In the decoding stage, another algorithm was built that reflects the work of what preceded it in the encryption stage, where the result was an exact copy of the original image. It is worth noting that standard images of different sizes were used as testing images. The performance evaluation of the method was calculated based on several factors: MSE, peak PSNR, and the time required to perform the encoding and decoding process. The method achieved good results when compared with the results of other methods in terms of quality and time.

14 citations

Book ChapterDOI
01 Jan 2021
TL;DR: In this article, a biomedical image segmentation process using fractional order Darwinian Particle Swarm Optimization (FODPSO) and thresholding is proposed, which is tested both visually and quantitatively and the results speaks itself about the efficiency of the proposed work.
Abstract: Image segmentation is one of the inevitable parts of the digital image processing and very useful to solve different real life problems. Biomedical image segmentation is a prime domain of application of digital image processing. and automated computer aided diagnostics process has high dependency on it. Automated identification of different regions of an image are often required by the human experts. Moreover, accurate detection and identification of a region of interest is possible using the automated methods. Errors are common for the human experts and can be reduced and faster results can be achieved with the help of automated and intelligent systems. This work proposes a biomedical image segmentation process using Fractional Order Darwinian Particle Swarm Optimization (FODPSO) and thresholding. The efficiency of the proposed method is tested both visually and quantitatively and the results speaks itself about the efficiency of the proposed work.

9 citations

Journal ArticleDOI
TL;DR: The simulation, detailed analysis, and comparative studies of the proposed overall image encryption framework will help to understand the strengths and weaknesses of it and show the prospects of chaos theory and its usage in the field of data security.
Abstract: A novel image encryption framework is proposed in this article A new chaotic map and a pseudorandom bit generator are proposed Apart from this, a novel image encryption system is designed based on the proposed map and the proposed pseudorandom bit generator These three are the major contributions of this work that makes a complete cryptosystem The proposed new chaotic map is proposed which will be known as the ‘RCM map’ and its chaotic property is studied based on Devaney’s theory The proposed pseudorandom bit generator is tested using the NIST test suite The proposed method is simple to implement and does not involve any highly complex operations Moreover, the proposed method is completely lossless, and therefore cent percent of data can be recovered from the encrypted image The decryption process is also simple to implement ie just reverse of the encryption procedure A scrambling algorithm is also proposed to further enhance the security of the overall system The simulation, detailed analysis, and comparative studies of the proposed overall image encryption framework will help to understand the strengths and weaknesses of it The experimental results are very promising and show the prospects of chaos theory and its usage in the field of data security

8 citations

Journal ArticleDOI
TL;DR: In this paper , a visually meaningful encrypted image algorithm that hides a secret image and a digital signature which provides authenticity and confidentiality has been proposed, which is used for the purpose of identity authentication while the secret image is encrypted to protect its confidentiality.

8 citations

References
More filters
Journal ArticleDOI
01 Nov 1994-Science
TL;DR: This experiment demonstrates the feasibility of carrying out computations at the molecular level by solving an instance of the directed Hamiltonian path problem with standard protocols and enzymes.
Abstract: The tools of molecular biology were used to solve an instance of the directed Hamiltonian path problem. A small graph was encoded in molecules of DNA, and the "operations" of the computation were performed with standard protocols and enzymes. This experiment demonstrates the feasibility of carrying out computations at the molecular level.

4,266 citations

Journal ArticleDOI
28 Apr 1995-Science
TL;DR: DNA experiments are proposed to solve the famous "SAT" problem of computer science and have the potential to yield vast speedups over conventional electronic-based computers for such search problems.
Abstract: DNA experiments are proposed to solve the famous "SAT" problem of computer science. This is a special case of a more general method that can solve NP-complete problems. The advantage of these results is the huge parallelism inherent in DNA-based computing. It has the potential to yield vast speedups over conventional electronic-based computers for such search problems.

1,038 citations

Journal ArticleDOI
17 Oct 1997-Science
TL;DR: The maximal clique problem has been solved by means of molecular biology techniques and the algorithm is highly parallel and has satisfactory fidelity, representing further evidence for the ability of DNA computing to solve NP-complete search problems.
Abstract: The maximal clique problem has been solved by means of molecular biology techniques. A pool of DNA molecules corresponding to the total ensemble of six-vertex cliques was built, followed by a series of selection processes. The algorithm is highly parallel and has satisfactory fidelity. This work represents further evidence for the ability of DNA computing to solve NP-complete search problems.

610 citations

Book ChapterDOI
TL;DR: Some procedures for DNA-based cryptography based on one-time-pads that are in principle unbreakable are presented, and a class of DNA steganography systems, which secretly tag the input DNA and then hide it within collections of other DNA are examined.
Abstract: Recent research has considered DNA as a medium for ultra-scale computation and for ultra-compact information storage. One potential key application is DNA-based, molecular cryptography systems. We present some procedures for DNA-based cryptography based on one-time-pads that are in principle unbreakable. Practical applications of cryptographic systems based on one-time-pads are limited in conventional electronic media by the size of the one-time-pad; however DNA provides a much more compact storage medium, and an extremely small amount of DNA suffices even for huge one-time-pads. We detail procedures for two DNA one-time-pad encryption schemes: (i) a substitution method using libraries of distinct pads, each of which defines a specific, randomly generated, pair-wise mapping; and (ii) an XOR scheme utilizing molecular computation and indexed, random key strings. These methods can be applied either for the encryption of natural DNA or for artificial DNA encoding binary data. In the latter case, we also present a novel use of chip-based DNA micro-array technology for 2D data input and output. Finally, we examine a class of DNA steganography systems, which secretly tag the input DNA and then hide it within collections of other DNA. We consider potential limitations of these steganographic techniques, proving that in theory the message hidden with such a method can be recovered by an adversary. We also discuss various modified DNA steganography methods which appear to have improved security.

348 citations

Posted Content
16 Jul 2013
TL;DR: Simulation result shows that the proposed algorithm has a large secret key space and strong secret key sensitivity, and can resist exhaustive attack, statistical attack, and thus it is suitable for RGB image encryption.

235 citations