Real-time medical systems based on human biometric steganography: A systematic review

AH Mohsin, AA Zaidan, BB Zaidan, SA Ariffin… - Journal of medical …, 2018 - Springer
In real-time medical systems, the role of biometric technology is significant in authentication
systems because it is used in verifying the identity of people through their biometric features …

[PDF][PDF] DNA Cryptography for Secure Data Storage in Cloud.

SC Sukumaran, M Misbahuddin - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Cloud computing has revolutionized the way the data is stored, processed and made
available. It has evolved in various forms of utility computing by sharing resources …

A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography

K Jain, P Krishnan, VV Rao - 2021 Fourth International …, 2021 - ieeexplore.ieee.org
Cryptography is the science of encryption and decryption of data using the techniques of
mathematics to achieve secure communication. This enables the user to send the data in an …

[HTML][HTML] PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing

SC Sukumaran, M Misbahuddin - … of King Saud University-Computer and …, 2021 - Elsevier
Cloud computing technology got relevance as computing paradigm, which delivers
massively scalable computing technologies based on the Internet for the organizations …

All-encompassing review of biometric information protection in fingerprints based steganography

MM Hashim, AK Mohsin, MSM Rahim - Proceedings of the 2019 3rd …, 2019 - dl.acm.org
In ascertaining the authenticity of a person's identity, the techniques that utilises Biometric
Technology and its vital aspects and attributes are essential in endorsing this endeavour …

A novel DNA based password authentication system for global roaming in resource-limited mobile environments

R Madhusudhan, R Shashidhara - Multimedia Tools and Applications, 2020 - Springer
Mobile environments are highly vulnerable to security threats and pose a great challenge for
the wireless and mobile networks being used today. Because the mode of a wireless …

An efficient solution for remote user authentication using DNA crypto and steganography

M Misbahuddin - … of the International Conference on Security …, 2018 - search.proquest.com
Authentication is a procedure of validating the user to access the system based on the user
credentials to prove identity. It is regarded as one of the crucial characteristics of information …

Secure key exchange scheme: a DNA computing-based approach to resist MITM in DHKE

CS Sreeja, M Misbahuddin - International Journal of …, 2021 - inderscienceonline.com
Diffie-Hellman key exchange (DHKE) protocol was a pioneering work and considered as a
new direction in the field of cryptography though it is not an encryption protocol. DHKE is a …

Image Processing Using Quantum Computing: Trends and Challenges

B Dolly, D Raj - Limitations and Future Applications of Quantum …, 2021 - igi-global.com
Image processing via the quantum platform is an emerging area for researchers.
Researchers are more interested to move on towards quantum image processing instead of …

DNA Based Cryptography to Improve Usability of Authenticated Access of Electronic Health Records

CS Sreeja, M Misbahuddin… - … and Network Computing …, 2018 - Springer
The quality of health care has been drastically improved with the evolution of Internet.
Electronic health records play a major role in interoperability and accessibility of patient's …