Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adjustment Hiding Method Based on Exploiting Modification Direction

In the exploiting modification direction (EMD) method, a secret digit in (2n+1)-ary notational system is embedded into a group that is consisted of n pixels. Only one pixel in a group at most is being modified by either increasing or decreasing one. Therefore, the maximum embedding rate of EMD method is (log2(2n+1))/n when n≧2. In order to increase the embedding capacity of EMD method, a new ad...

متن کامل

Data hiding schemes based on the formal improved exploiting modification direction method

Steganography is an important strategy in the field of data security. Its main purpose is to hide secret information by embedding it in a cover image. The quantity of data that can be hidden in a single cover image is also very important. Recently, a high capacity technique called Exploiting Modification Direction (EMD) data hiding was introduced by Zhang and Wang. In order to enhance embedding...

متن کامل

Improved Exploiting Modification Direction Method by Modulus Operation

The EMD method proposed by Zhang and Wang fully exploited modification directions. Modifications in different directions were used to represent different secret data. According to the experimental results, the highest capacity was demonstrated in the 5-ary notational system, where only one secret digit is embedded for each two pixels. But this is an inefficient method because it can be hidden m...

متن کامل

A Novel Text Encryption Algorithm

The encryption/decryption processes is applied to text. Both algorithms involved the use of the associative models, in particular we propose the Alpha-Beta associative memories. The original text is divide in sets of 9 elements, and together with a secret key they build an associative memory which represents the encrypted text. The advantage of our proposal is the cyphertext does not have the s...

متن کامل

Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-rand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: AL-Rafidain Journal of Computer Sciences and Mathematics

سال: 2021

ISSN: 2311-7990

DOI: 10.33899/csmj.2021.168266