Enhancement of Security in DNA Based Cryptography

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4

Abstract

Abstract: DNA containing data obtained from more conventional binary storage media. Plaintext messagedata encoded in DNA strands by use of a (publicly known) Key of alphabet of short oligonucleotide sequences

Authors and Affiliations

Ritu Mor , Praveen Kanth

Keywords

Related Articles

 An Efficient Model for Patent Search Pattern

 Abstract:Patents are very important for protecting the sophisticated property of individuals. Patent Searchhelps us to find the previously developed similar patents and used to certify the newly developing patentap...

 IPv4 to IPv6 Transition Complaint Mediastreaming UsingARM 11

 Abstract: Internet Protocol version 6 (IPv6) is the next version of Internet Protocol (IP) which is currently inthe transition phase from its predecessor, Internet Protocol version 4 (IPv4). With the number of IPv4...

 Face Recognition System under Varying Lighting Conditions

 Making recognition more reliable under uncontrolled lighting conditions is one of the most important challenges for practical face recognition systems. Other recognition systems don’t nullify most of the lighting...

Applications for Big Data in of Intelligent Distributed Processing

Abstract: Today, “Big Data” has posed new problem of over-information in many different areas. Such areasinclude health care (e.g., hospitals, bioinformatics), e-sciences (e.g., physics, chemistry, and geology), andsocia...

Remote Queue Handling At Filling Stations (EasyQ)

Abstract: In countries with social and economic disorder, people are daily part of different queues in different situations, especially for the working class after a hectic day at office when they have to be part of long...

Download PDF file
  • EP ID EP106122
  • DOI -
  • Views 121
  • Downloads 0

How To Cite

Ritu Mor, Praveen Kanth (2015).  Enhancement of Security in DNA Based Cryptography. IOSR Journals (IOSR Journal of Computer Engineering), 17(4), 31-34. https://europub.co.uk/articles/-A-106122