Subhajit Manna, S. Roy, Pabitra Roy, S. Bandyopadhyay
{"title":"Modified technique of insertion methods for data hiding using DNA sequences","authors":"Subhajit Manna, S. Roy, Pabitra Roy, S. Bandyopadhyay","doi":"10.1109/ACES.2014.6807990","DOIUrl":null,"url":null,"abstract":"Cryptographic applications require several biological techniques and hence they have become more popular recently. In one of the most interesting techniques data is hidden in Deoxyribo Nuclic Acid (DNA). In this paper we have proposed a Data Hiding Insertion Method based upon DNA sequence. In this method we hide information data into DNA sequence randomly using certain techniques. In this method we use several procedures as: random key generation, selection of the succeeding prime number of key value, cumulative XOR operation of key value, selection of look up table index mapping.","PeriodicalId":353124,"journal":{"name":"2014 First International Conference on Automation, Control, Energy and Systems (ACES)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 First International Conference on Automation, Control, Energy and Systems (ACES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACES.2014.6807990","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Cryptographic applications require several biological techniques and hence they have become more popular recently. In one of the most interesting techniques data is hidden in Deoxyribo Nuclic Acid (DNA). In this paper we have proposed a Data Hiding Insertion Method based upon DNA sequence. In this method we hide information data into DNA sequence randomly using certain techniques. In this method we use several procedures as: random key generation, selection of the succeeding prime number of key value, cumulative XOR operation of key value, selection of look up table index mapping.