A Novel Image Encryption Algorithm Using DNA Cryptography
DOI:
https://doi.org/10.32628/IJSRST52310269Keywords:
Encryption, Decryption, DNA Cryptography, Security, Privacy.Abstract
Many different technologies are used to encode and decode photos. However, the DNA cryptography method is the most significant of all of these. The study of DNA computing has given rise to a brand-new instinctive cryptographic field called DNA cryptography. Data transfers in today's environment require the highest level of security because they can be insecure. To safeguard the data from unauthorized recipients, our picture encryption technology either modifies the original image's pixels or inserts information inside them using the image as a cover. The image's pixels are transformed into DNA molecules of the form A C G T before being shared with recipients, who may then use decryption techniques to access the data.
References
- Javier Resano, “A Hardware Implementation of the Smith-Waterman Algorithm for DNA Comparison”, IEEE 2012.
- Radu Terec et al, “DNA Security using Symmetric and Asymmetric Cryptography”, IJNCAA (ISSN 2220- 9085), 2011 [3] Yunpeng Zhang and Liu He Bochen Fu. “Research on DNA Cryptography, Applied Cryptography and Network Security”, Dr. Jaydip Sen (Ed.), ISBN: 978-953-51-0218-2, InTech, 2012. [4] Zhihua Chen et el. “Efficient DNA Sticker Algorithms for DES”, IEEE 3rd international conference on Bio-inspired computing, 2012
- Taylor C. et al, “Hiding Messages in DNA Microdots”, Nature 1999
- M. Reza Najaf Torkaman et al, “Innovative Approach to Improve Hybrid Cryptography by using DNA Steganography”, IJNCAA 2012
- L. M. Adleman, “Molecular Computation of Solutions to Combinatorial Problems”, Science- 266:1021 {1024}, 1994
- Ashish Gehani et al, “DNA Based Cryptography”, DIMACS Series in Discrete Mathematics and Theoretical Computer Science Volume 54, 2000
- David Kahn, “The Codebreakers”, Macmillan, NY, 1967
- Naveen Jarold K. et al, “Hardware Implementation of DNA Based Cryptography”, IEEE (Conference of ICT), 2013.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.