Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    DNA Computing with Water Strider Based Vector Quantization for Data Storage Systems

    A. Arokiaraj Jovith1, S. Rama Sree2, Gudikandhula Narasimha Rao3, K. Vijaya Kumar4, Woong Cho5, Gyanendra Prasad Joshi6, Sung Won Kim7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6429-6444, 2023, DOI:10.32604/cmc.2023.031817

    Abstract The exponential growth of data necessitates an effective data storage scheme, which helps to effectively manage the large quantity of data. To accomplish this, Deoxyribonucleic Acid (DNA) digital data storage process can be employed, which encodes and decodes binary data to and from synthesized strands of DNA. Vector quantization (VQ) is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression efficiency. This article introduces a new DNA Computing with Water Strider Algorithm based Vector Quantization (DNAC-WSAVQ) technique for Data Storage Systems. The proposed DNAC-WSAVQ technique enables encoding data using… More >

  • Open Access

    ARTICLE

    A Novel Medical Image Encryption Using Rössler System

    K. Sundara Krishnan1,*, Syed Suhaila1, S. P. Raja2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1081-1101, 2022, DOI:10.32604/iasc.2022.024023

    Abstract The technological advances made possible by the Internet, coupled with the unforeseen critical circumstances set in motion by the Covid-19 pandemic, have greatly increased the generation and transmission of medical images every day. Medical image transmission over an unsecured public network threatens the privacy of sensitive patient information. We have, in this paper, designed a new secure color medical image encryption algorithm based on binary plane decomposition, DNA (deoxyribonucleic acid) computing, and the chaotic Rössler dynamical system. At first, a bit-by-bit swap is performed on twenty four binary planes of the input image and encoded using DNA encoding rules. Thereafter,… More >

  • Open Access

    ARTICLE

    Amino Acid Encryption Method Using Genetic Algorithm for Key Generation

    Ahmed S. Sakr1, M. Y. Shams2, Amena Mahmoud3, Mohammed Zidan4,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 123-134, 2022, DOI:10.32604/cmc.2022.019455

    Abstract In this new information era, the transfer of data and information has become a very important matter. Transferred data must be kept secured from unauthorized persons using cryptography. The science of cryptography depends not only on complex mathematical models but also on encryption keys. Amino acid encryption is a promising model for data security. In this paper, we propose an amino acid encryption model with two encryption keys. The first key is generated randomly using the genetic algorithm. The second key is called the protein key which is generated from converting DNA to a protein message. Then, the protein message… More >

  • Open Access

    ARTICLE

    ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing

    Jamal Kh-Madhloom1,2,*, Mohd Khanapi Abd Ghani1, Mohd Rizuan Baharon1

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 493-512, 2021, DOI:10.32604/iasc.2021.015129

    Abstract Over the decades, protecting the privacy of a health cloud using the design of a fog computing network is a very important field and will be more important in the near future. Current Internet of Things (IoT) research includes security and privacy due to their extreme importance in any growing technology that involves the implementation of cryptographic Internet communications (ICs) for protected IC applications such as fog computing and cloud computing devices. In addition, the implementation of public-key cryptography for IoT-based DNA sequence testing devices requires considerable expertise. Any key can be broken by using a brute-force attack with ample… More >

Displaying 1-10 on page 1 of 4. Per Page