Open Access   Article Go Back

DNA Sequencing Based Image Encryption Methods: A Survey

S. Verma1 , S. Indora2

  1. CSE Dept, Deenbandhu chhotu ram University of Science and Technology , Murthal, India.

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 1049-1054, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.10491054

Online published on May 31, 2018

Copyright © S. Verma, S. Indora . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Verma, S. Indora, “DNA Sequencing Based Image Encryption Methods: A Survey,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1049-1054, 2018.

MLA Style Citation: S. Verma, S. Indora "DNA Sequencing Based Image Encryption Methods: A Survey." International Journal of Computer Sciences and Engineering 6.5 (2018): 1049-1054.

APA Style Citation: S. Verma, S. Indora, (2018). DNA Sequencing Based Image Encryption Methods: A Survey. International Journal of Computer Sciences and Engineering, 6(5), 1049-1054.

BibTex Style Citation:
@article{Verma_2018,
author = {S. Verma, S. Indora},
title = {DNA Sequencing Based Image Encryption Methods: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {1049-1054},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2107},
doi = {https://doi.org/10.26438/ijcse/v6i5.10491054}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.10491054}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2107
TI - DNA Sequencing Based Image Encryption Methods: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - S. Verma, S. Indora
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 1049-1054
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
484 193 downloads 219 downloads
  
  
           

Abstract

Cryptography is the best piece of the establishment of correspondence security and PC security. Regardless, there are a couple of torpid defects in different built up cryptography advances generally cryptography, for instance, RSA and DES computations—which are broken by some attack programs. DNA cryptography and learning science was considered a while later examination inside the field of DNA preparing field by Adleman. It has transformed into the forefront of all inclusive research on cryptography. Cryptography relies upon natural issues. In this theory, a DNA structure not simply has predictable enrolling power as a contemporary framework, in any case, it has productivity and capacity customary PCs can`t coordinate. Utilizing DNA in connection with cryptography is another and energizing investigation bearing. Shockingly, it needs a great deal of assets, it has cutting edge research facility necessities and a few computational constraints. Along these lines, the productive utilization of DNA cryptography is as yet troublesome from a functional perspective. This paper talks about DNA cryptosystem ideas in view of the work of art and present day stance and overviews DNA cryptosystem connected to picture Cryptography field.

Key-Words / Index Term

Cryptography, DNA, DNA Sequence, Encryption, Security

References

[1] Stallings, William. Cryptography and network security: principles and practices. Pearson Education India, 2006.
[2] Diffie, Whitfield, and Martin Hellman. "New directions in cryptography." IEEE transactions on Information Theory 22.6 (1976): 644-654.
[3] Pakshwar, Rinki, Vijay Kumar Trivedi, and Vineet Richhariya. "A survey on different image encryption and decryption techniques." International journal of computer science and information technologies 4.1 (2013): 113-116.
[4] Wong, Ping Wah, and Nasir Memon. "Secret and public key image watermarking schemes for image authentication and ownership verification." IEEE transactions on image processing 10.10 (2001): 1593-1601.
[5] Chen, Guanrong, Yaobin Mao, and Charles K. Chui. "A symmetric image encryption scheme based on 3D chaotic cat maps." Chaos, Solitons & Fractals 21.3 (2004): 749-761.
[6] Lindahl, Tomas. "The world of DNA in glycol solution." Nature Reviews Molecular Cell Biology 17.6 (2016): 335-336.
[7] Karimi, M., & Haider, W. (2017). Cryptography using DNA Nucleotides. Int. J. Comput. Appl, 168, 16-18.
[8] Wang, Xing-Yuan, Ying-Qian Zhang, and Xue-Mei Bao. "A novel chaotic image encryption scheme using DNA sequence operations." Optics and Lasers in Engineering 73 (2015): 53-61.
[9] Heider, Dominik, and Angelika Barnekow. "DNA-based watermarks using the DNA-Crypt algorithm." BMC bioinformatics 8.1 (2007): 176.
[10] Srinivasu, P. Naga, and Seshadri Rao. "A Multilevel Image Encryption based on Duffing map and Modified DNA Hybridization for Transfer over an Unsecured Channel." International Journal of Computer Applications 120.4 (2015).
[11] Garg, Aman, and Misal Choudhary. "Analysing And Obtaining The Most Efficient Dna Computing Algorithm." Journal of Computational Intelligence in Bioinformatics 8.1 (2015): 1-6.
[12] Anwar, Tausif, Sanchita Paul, and Shailendra Kumar Singh. "Message Transmission Based on DNA Cryptography: Review." International Journal of Bio-Science and Bio-Technology 6, no. 5 (2014): 215-222.
[13] Yang, Jing, Jingjing Ma, Shi Liu, and Cheng Zhang. "A molecular cryptography model based on structures of DNA self-assembly." Chinese science bulletin 59, no. 11 (2014): 1192-1198.
[14] Raj, Bonny B., J. Frank Vijay, and T. Mahalakshmi. "Secure Data Transfer through DNA Cryptography using Symmetric Algorithm." International Journal of Computer Applications 133, no. 2 (2016): 19-23.
[15] Kane, Amadou Moctar. "How DNA Cryptography can help whistleblowers and refugees." arXiv preprint arXiv:1606.06644 (2016).
[16] Hossain, Emtious Md Sazzad, Kazi Md Rokibul Alam, Md Rafiul Biswas, and Yasuhiko Morimoto. "A DNA cryptographic technique based on dynamic DNA sequence table." In Computer and Information Technology (ICCIT), 2016 19th International Conference on, pp. 270-275. IEEE, 2016.
[17] Kaur, Sarbjeet, and Sheenam Malhotra. "A Review on Image Encryption Using DNA Based Cryptography Techniques." International Journal 4, no. 3 (2016).
[18] Norouzi, Benyamin, and Sattar Mirzakuchaki. "Breaking a novel image encryption scheme based on an improper fractional order chaotic system." Multimedia Tools and Applications 76, no. 2 (2017): 1817-1826.
[19] Krishnamoorthy, Kuppusamy, and Mahalakshmi Jeyabalu. "A New Image Encryption Method Based on Improved Cipher Block Chaining with Optimization Technique." In Advanced Image Processing Techniques and Applications, pp. 133-149. IGI Global, 2017.
[20] Niu, Ying, Xuncai Zhang, and Feng Han. "Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database." Computational Intelligence and Neuroscience 2017 (2017).