SwePub
Sök i LIBRIS databas

  Utökad sökning

WFRF:(Naidu P.)
 

Sökning: WFRF:(Naidu P.) > Genetic Privacy Shi...

Genetic Privacy Shields: A DNA Steganography Approach for Multi-Level Text Encryption : iling the Future of Genetic Data Protection

Harshita, S. (författare)
Amrita Vishwa Vidyapeetham, Amrita School of Computing, Department of Computer Science and Engineering (Artificial Intelligence), Chennai, India
Jayanth Adhitya, C. M. (författare)
Amrita Vishwa Vidyapeetham, Amrita School of Computing, Department of Computer Science and Engineering (Artificial Intelligence), Chennai, India
Geethika Naidu, P. (författare)
Amrita Vishwa Vidyapeetham, Amrita School of Computing, Department of Computer Science and Engineering (Artificial Intelligence), Chennai, India
visa fler...
Bashpika, T. (författare)
Amrita Vishwa Vidyapeetham, Amrita School of Computing, Department of Computer Science and Engineering (Artificial Intelligence), Chennai, India
Manikumar, V. S.S.S.R. (författare)
Amrita Vishwa Vidyapeetham, Amrita School of Computing, Department of Computer Science and Engineering (Artificial Intelligence), Chennai, India
Oviya, I. R. (författare)
Amrita Vishwa Vidyapeetham, Amrita School of Computing, Department of Computer Science and Engineering (Artificial Intelligence), Chennai, India
Divya, S. (författare)
Amrita Vishwa Vidyapeetham, Amrita School of Computing, Department of Computer Science and Engineering (Artificial Intelligence), Chennai, India
Kumar, Rajender (författare)
KTH,Glykovetenskap
visa färre...
 (creator_code:org_t)
Institute of Electrical and Electronics Engineers (IEEE), 2023
2023
Engelska.
Ingår i: 2023 1st International Conference on Advances in Electrical, Electronics and Computational Intelligence, ICAEECI 2023. - : Institute of Electrical and Electronics Engineers (IEEE). - 9798350342796
  • Konferensbidrag (refereegranskat)
Abstract Ämnesord
Stäng  
  • In the current era genetic sequencing has emerged as an indispensable methodology for examining diverse DNA profiles across domains encompassing healthcare, agriculture, and forensic science. To enhance precision, a range of techniques, including high-throughput shotgun sequencing, have evolved over time. Recent strides in next-generation sequencing methodologies have facilitated the embedding of data within DNA using synthesized oligonucleotides. Notably, significant efforts have been dedicated to embedding extensive volumes of information within living organisms to safeguard intellectual property. When it comes to DNA steganography, traditional detection methods, exemplified by frequency analysis-based approaches, often overlook crucial signals and are susceptible to newly emerging steganography techniques. This study undertakes a comprehensive analysis of inherent allocations, distribution variance computation, and the classification of sequences as coding or non-coding. Our research endeavors to devise an advanced security strategy employing DNA steganography. Central to our proposition is the utilization of DNA steganography to forge a robust security framework. In this study, we introduce the DNA-Genetic Encryption (D-GET) mechanism to augment security. The D-GET technique involves the binarization of digital data followed by its conversion into DNA sequences. Subsequently, a sequence of operations, including reshaping, encryption, crossover, and mutation, is performed iteratively to heighten the robustness and unpredictability of the technique. The core processes of D-GET are iterated at least three times. Encrypted data is transmitted in either text or image file formats. Upon reception, the D-GET approach is employed to decode and restore the acquired data to its original form. A distinguishing aspect of our approach is the transformation of textual content into visual representations and vice versa, augmenting security measures. Multiple key sequences are leveraged to amplify the degree of dispersion and ambiguity, rendering the final cipher data highly intricate to decipher. Empirical observations highlight that our proposed methodology affords multi-layered security attributes, fortified by multi-stage and genetic operations, rendering it resilient against diverse threats and affording an elevated level of safeguarding. Notably, the methodology's efficacy derives from the pronounced divergence between the transformed information and the confidential content, thereby reinforcing the integrity of the encryption framework.

Ämnesord

NATURVETENSKAP  -- Data- och informationsvetenskap -- Datavetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Computer Sciences (hsv//eng)

Nyckelord

bit exchange
DNA steganography
Genome sequencing
Mutation
Next generation sequencing style
Sequence analysis

Publikations- och innehållstyp

ref (ämneskategori)
kon (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy