[PDF][PDF] Encryption of Color Image Based on DNA Strand and Exponential Factor.

IA Aljazaery, HTH Salim ALRikabi… - … Journal of Online & …, 2022 - pdfs.semanticscholar.org
In this study, a new method has been eliciting for encoding 2D and 3D color images. The
DNA strand construction was used as the basis for structuring the method. This method …

Enhanced flipping technique to reduce variability in image steganography

S Kamil, SNHS Abdullah, MK Hasan, FA Bohani - IEEE Access, 2021 - ieeexplore.ieee.org
Steganography algorithms hide the secret message in the cover image and provide
imperceptibility to the attacker. The Least Significant Bit (LSB) algorithm is the preferred data …

New data hiding approach based on biological functionality of DNA sequence

AA Abdullah, AS Eesa, AM Abdo - Science Journal of University …, 2019 - sjuoz.uoz.edu.krd
Data hiding or steganography has been used ever since a secret message was needed to
be transferred. Data hiding methods need a medium to be cover for secret message that is to …

[PDF][PDF] Coverless data hiding in VoIP based on DNA steganography with authentication.

D Soundararajan, S Ramakrishnan - Int. Arab J. Inf. Technol., 2023 - ccis2k.org
Data hiding in Voice over Internet Protocol (VoIP) using coverless approach improves the
undetectability by preserving the cover bits from modification. This paper focuses on hiding …

Binary nonogram puzzle based data hiding technique for data security

S Kamil, SNHS Abdullah, MK Hasan… - Multimedia Tools and …, 2024 - Springer
Data security is one of the critical challenges for digital information. The existing
steganography algorithms hide confidential data in the cover media to preserve the …

DNA-Based LSB Steganography

A Khobzaoui, B Mansouri, K Benyahia - International Journal of …, 2022 - igi-global.com
The integrity and confidentiality of transmitted data are the main requirements of any data
security system. To achieve these goals, many techniques have been developed, including …

An Improved Dna Cryptography Algorithm Using Residue Number System

HL Salaudeen - 2021 - search.proquest.com
In this information rich era, data protection is needed to ensure swift and secure
communication through a digital medium. Data need to be protected from unauthorized …