Real-time medical systems based on human biometric steganography: A systematic review

AH Mohsin, AA Zaidan, BB Zaidan, SA Ariffin… - Journal of medical …, 2018 - Springer
In real-time medical systems, the role of biometric technology is significant in authentication
systems because it is used in verifying the identity of people through their biometric features …

A survey on biometric authentication: Toward secure and privacy-preserving identification

Z Rui, Z Yan - IEEE access, 2018 - ieeexplore.ieee.org
In order to overcome the difficulty of password management and improve the usability of
authentication systems, biometric authentication has been widely studied and has attracted …

[PDF][PDF] Significant features for steganography techniques using deoxyribonucleic acid: a review

NA Zebari, DA Zebari, DQ Zeebaree… - Indonesian Journal of …, 2021 - academia.edu
Information security and confidentiality are the prime concern of any type of communication.
Rapidly evolution of technology recently, leads to increase the intruder's ability and a main …

Multi-level of DNA encryption technique based on DNA arithmetic and biological operations

DA Zebari, H Haron, SRM Zeebaree… - … on Advanced Science …, 2018 - ieeexplore.ieee.org
Networks have evolved very rapidly, which allow secret data transformation speedily
through the Internet. However, the security of secret data has posed a serious threat due to …

[PDF][PDF] DNA Cryptography for Secure Data Storage in Cloud.

SC Sukumaran, M Misbahuddin - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Cloud computing has revolutionized the way the data is stored, processed and made
available. It has evolved in various forms of utility computing by sharing resources …

A comparative review on symmetric and asymmetric DNA-based cryptography

BT Hammad, AM Sagheer, IT Ahmed, N Jamil - Bulletin of Electrical …, 2020 - beei.org
Current researchers have focused on DNA-based cryptography, in fact, DNA or
deoxyribonucleic acid, has been applied in cryptography for performing computation as well …

[HTML][HTML] A novel hybrid secure image encryption based on the shuffle algorithm and the hidden attractor chaos system

X Jin, X Duan, H Jin, Y Ma - Entropy, 2020 - mdpi.com
Aiming at the problems of small key space, low security of encryption structure, and easy to
crack existing image encryption algorithms combining chaotic system and DNA sequence …

Biomedical image security using matrix manipulation and DNA encryption

M Roy, S Chakraborty, K Mali, A Banerjee… - … of International Ethical …, 2020 - Springer
Biomedical image analysis is an integral part of the modern healthcare industry and has a
huge impact on the modern world. Automated computer-aided systems are highly beneficial …

[HTML][HTML] PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing

SC Sukumaran, M Misbahuddin - … of King Saud University-Computer and …, 2021 - Elsevier
Cloud computing technology got relevance as computing paradigm, which delivers
massively scalable computing technologies based on the Internet for the organizations …

A DNA based framework for securing information using asymmetric encryption

M Poriye, S Upadhyaya - Wireless Personal Communications, 2023 - Springer
The current status of DNA cryptography (biological) is much far away from real scenario and
can be carried out by only using chemical reactions in biological based laboratory. The …