期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
DNA Computing with Water Strider Based Vector Quantization for Data Storage Systems
1
作者 A.Arokiaraj Jovith S.Rama Sree +4 位作者 Gudikandhula Narasimha Rao K.Vijaya Kumar Woong Cho Gyanendra Prasad Joshi Sung Won Kim 《Computers, Materials & Continua》 SCIE EI 2023年第3期6429-6444,共16页
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of data.To accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can b... The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of data.To accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be employed,which encodes and decodes binary data to and from synthesized strands of DNA.Vector quantization(VQ)is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression efficiency.This article introduces a newDNAComputingwithWater StriderAlgorithm based Vector Quantization(DNAC-WSAVQ)technique for Data Storage Systems.The proposed DNAC-WSAVQ technique enables encoding data using DNA computing and then compresses it for effective data storage.Besides,the DNAC-WSAVQ model initially performsDNA encoding on the input images to generate a binary encoded form.In addition,aWater Strider algorithm with Linde-Buzo-Gray(WSA-LBG)model is applied for the compression process and thereby storage area can be considerably minimized.In order to generate optimal codebook for LBG,the WSA is applied to it.The performance validation of the DNAC-WSAVQ model is carried out and the results are inspected under several measures.The comparative study highlighted the improved outcomes of the DNAC-WSAVQ model over the existing methods. 展开更多
关键词 dna computing data storage image compression vector quantization ws algorithm space saving
下载PDF
Amino Acid Encryption Method Using Genetic Algorithm for Key Generation
2
作者 Ahmed S.Sakr M.Y.Shams +1 位作者 Amena Mahmoud Mohammed Zidan 《Computers, Materials & Continua》 SCIE EI 2022年第1期123-134,共12页
In this new information era,the transfer of data and information has become a very important matter.Transferred data must be kept secured from unauthorized persons using cryptography.The science of cryptography depend... In this new information era,the transfer of data and information has become a very important matter.Transferred data must be kept secured from unauthorized persons using cryptography.The science of cryptography depends not only on complex mathematical models but also on encryption keys.Amino acid encryption is a promising model for data security.In this paper,we propose an amino acid encryption model with two encryption keys.The first key is generated randomly using the genetic algorithm.The second key is called the protein key which is generated from converting DNA to a protein message.Then,the protein message and the first key are used in the modified Playfair matrix to generate the cypher message.The experimental results show that the proposed model survives against known attacks such as the Brute-force attack and the Ciphertext-only attack.In addition,the proposed model has been tested over different types of characters including white spaces and special characters,as all the data is encoded to 8-bit binary.The performance of the proposed model is compared with other models using encryption time and decryption time.The model also balances all three principles in the CIA triad. 展开更多
关键词 CRYPTOGRAPHY amino acid genetic algorithm playfair deep learning dna computing
下载PDF
Logic-Gated Plasmonic Nanodevices Based on DNA-Templated Assembly
3
作者 Fengsong Liu Qiao Jiang +7 位作者 Qing Liu Na Li Zihong Han Chao Liu Zhaoran Wang Yunfei Jiao Jiashu Sun Baoquan Ding 《CCS Chemistry》 CAS 2021年第3期985-993,共9页
Life has evolved numerous elegant molecular machines that recognize biological signals and affect mechanical changes precisely to achieve specific and versatile biofunctions.Inspired by nature,synthetic molecular mach... Life has evolved numerous elegant molecular machines that recognize biological signals and affect mechanical changes precisely to achieve specific and versatile biofunctions.Inspired by nature,synthetic molecular machines could be designed rationally to realize nanomechanical operations and autonomous computing.We constructed logic-gated plasmonic nanodevices through coassembly of two gold nanorods(AuNRs)and computing elements on a tweezer-shaped DNA origami template.After recognition of various molecular inputs,such as DNA strands,glutathione,or adenosine,the geometry and plasmonic circular dichroism(CD)signals of the AuNR–origami nanodevices produced corresponding changes.Then we designed and characterized a set of modular Boolean logic-gated nanodevices(YES,NOT,AND,OR)and proceeded to construct a complicated 3-input circuit capable of performing Boolean OR-NOT-AND operations.Our plasmonic logic devices transduced external inputs into conformational changes and near-infrared(NIR)chiral outputs.This DNA-based self-assembly strategy holds great potential for applications in programmable optical modulators,molecular information processing,and bioanalysis. 展开更多
关键词 dna origami self-assembly logic gate chiral plasmonic nanostructure dna computing
原文传递
PM3 computation for the DNA complementary base paircross-linked by the metabolite of Benzo[a] pyrene
4
《Chinese Science Bulletin》 SCIE CAS 1998年第2期175-175,共1页
关键词 BASE PM3 computation for the dna complementary base paircross-linked by the metabolite of Benzo[a PYRENE dna
原文传递
Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things
5
作者 Vivek V.Jog Senthil Murugan,T. 《International Journal of Intelligent Computing and Cybernetics》 EI 2017年第2期241-256,共16页
Purpose-Due to the connectivity of the multiple devices and the systems on the same network,rapid development has become possible in Internet of Things(IoTs)for the last decade.But,IoT is mostly affected with severe s... Purpose-Due to the connectivity of the multiple devices and the systems on the same network,rapid development has become possible in Internet of Things(IoTs)for the last decade.But,IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors,devices and system.In order to handle the security challenges,literature presents a handful of security protocols for IoT.The purpose of this paper is to present a threat profiling and elliptic curve cryptography(ECC)-based mutual and multi-level authentication for the security of IoTs.This work contains two security attributes like memory and machine-related attributes for maintaining the profile table.Also,the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol.Furthermore,three entities like,IoT device,server and authorization centre(AC)performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks.Finally,DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks.Design/methodology/approach-In this work,the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs.This work contains two security attributes like memory and machine-related attributes for maintaining the profile table.Also,the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol.Furthermore,three entities like,IoT device,server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks.Findings-DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks.Also,attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack,impersonation attack,server spoofing attack,stolen verifier attack and reply attack.Originality/value-This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. 展开更多
关键词 SECURITY AUTHENTICATION Internet of Things(IoT) Manufacturing systems Networked control dna computing Elliptic curve cryptography(ECC) Profile table
原文传递
Wavelet transform-based steganographic method for secure data communication using OFDM system
6
作者 Sanjay I.Nipanikar V.Hima Deepthi 《International Journal of Intelligent Computing and Cybernetics》 EI 2017年第3期362-386,共25页
Purpose–Fueled by the rapid growth of internet,steganography has emerged as one of the promising techniques in the communication system to obscure the data.Steganography is defined as the process of concealing the da... Purpose–Fueled by the rapid growth of internet,steganography has emerged as one of the promising techniques in the communication system to obscure the data.Steganography is defined as the process of concealing the data or message within media files without affecting the perception of the image.Media files,like audio,video,image,etc.,are utilized to embed the message.Nowadays,steganography is also used to transmit the medical information or diagnostic reports.The paper aims to discuss these issues.Design/methodology/approach–In this paper,the novel wavelet transform-based steganographic method is proposed for secure data communication using OFDM system.The embedding and extraction process in the proposed steganography method exploits the wavelet transform.Initially,the cost matrix is estimated by the following three aspects:pixel intensity,edge transformation and wavelet transform.The cost estimation matrix provides the location of the cover image where the message is to be entrenched.Then,the wavelet transform is utilized to embed the message into the cover image according to the cost value.Subsequently,in the extraction process,the wavelet transform is applied to the embedded image to retrieve the message efficiently.Finally,in order to transfer the secret information over the channel,the newly developed wavelet-based steganographic method is employed for the OFDM system.Findings–The experimental results are evaluated and performance is analyzed using PSNR and MSE parameters and then compared with existing systems.Thus,the outcome of our wavelet transform steganographic method achieves the PSNR of 71.5 dB which ensures the high imperceptibility of the image.Then,the outcome of the OFDM-based proposed steganographic method attains the higher PSNR of 71.07 dB that proves the confidentiality of the message.Originality/value–In the authors’previous work,the embedding and extraction process was done based on the cost estimation matrix.To enhance the security throughout the communication system,the novel wavelet-based embedding and extraction process is applied to the OFDM system in this paper.The idea behind this method is to attain a higher imperceptibility and robustness of the image. 展开更多
关键词 Data mining dna computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部