Private and Public Key DNA steganography

نویسندگان

  • Christoph Richter
  • André Leier
  • Wolfgang Banzhaf
  • Hilmar Rauhe
چکیده

In this paper steganographic approaches to DNA cryptography are presented. The rst approach shows how digital DNA strands can be used for steganography to provide rapid encryption and decryption. The second approach is based on a method of graphical subtraction of gel-images. It can be used to constitute a molecular checksum and can be combined with the rst approach to support encryption. The second part of this paper explains a public key steganographic system. It is based on the usage of a certain double stranded DNA ring molecule which can be constructed by means of grammar rule molecules.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public-key Steganography with Authentication Public-key Steganography with Authentication

Steganography is the science of sending messages hidden in harmless communications over a public channel so that an adversary eavesdropping on the channel cannot even detect the presence of the hidden messages. Several models for steganography have been introduced. Some are private-key settings, and the others are public-key settings. In this paper, we propose a model of public-key steganograph...

متن کامل

A Steganographic Design Paradigm for General Steganographic Objectives

Steganography is the task of concealing a message within a medium such that the presence of the hidden message cannot be detected. Beyond the standard scope of private-key steganography, steganography is also potentially interesting from other perspectives; for example, the prospect of steganographic parallels to components in public-key cryptography is particularly interesting. In this project...

متن کامل

Public-Key Steganography

Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary cannot even detect that these hidden messages are being sent. Unlike previous settings in which provable security has been applied to steganography, public-key steganography is information-theoretically impossible. In th...

متن کامل

A Secure Cyclic Steganographic Technique for Color Images using Randomization

There are five different types of steganography based on the carrier object that is used for embedding the secret information. The carrier object may be images, text, videos, audios or network protocol packets. If the image is used as a carrier, it is called image steganography. Similarly if video is used for hiding secret messages, we call it video steganography and so on[1, 5]. The diagrammat...

متن کامل

Towards the Investigation of Thin Clients

Public-private key pairs and the UNIVAC computer, while robust in theory, have not until recently been considered extensive [9]. Given the current status of event-driven epistemologies, futurists daringly desire the refinement of massive multiplayer online roleplaying games, which embodies the compelling principles of steganography. In order to overcome this grand challenge, we concentrate our ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000