Page 186 - The-5th-MCAIT2021-eProceeding
P. 186
References
Abd El-Latif, E. I., & Moussa, M. I., (2019). Information hiding using artificial DNA sequences based on
Gaussian kernel function. Journal of Information and Optimization Sciences.
Bhimani, P. (2018). A Review on cryptography techniques using DNA computing. International Journal of
Computer Engineering in Research Trends. 5(6), 187-191.
Kamaraj, A., Bhavithara, M., & Bhrintha, A. P. (2016). DNA-based encryption and decryption using FPGA.
International Journal of Current Research and Modern Education (IJCRME’16), 89-94.
Kaundal, A. K., & Verma, A. K. (2014). DNA based cryptography: a review. International Journal of
Information and Computation Technology, 4(7), 693-698.
Keerthi, K., & Surendiran, B. (2017). Elliptic curve cryptography for secured text encryption. 2017
International Conference on Circuit, Power and Computing Technologies (ICCPCT), 1-5.
Lin, C. H., Wu, J. X., Chen, P., Li, C. M., Pai, N. S., & Kuo, C. L. (2021) Symmetric cryptography with a
chaotic map and a multilayer machine learning network for physiological signal infosecurity: case study in
electrocardiogram. IEEE Access, 9, 26451-26467.
Raghunandan, K. R., Shetty, R., & Aithal, G. (2017). Key generation and security analysis of text cryptography
using cubic power of Pell's equation. 2017 International Conference on Intelligent Computing, Instrumentation
and Control Technologies (ICICICT), 1496-1500.
Raj, B. B., & Panchami, V., (2015). DNA-based cryptography using permutation and random key generation
method. International Journal of Innovative Research in Science, Engineering and Technology, 3(5), 263-267.
Roy, S. S., Shahriyar, S. A., Asaf-Uddowla, M., Alam, K. M. R., & Morimoto, Y. (2017). A novel encryption
model for text messages using delayed chaotic neural network and DNA cryptography. 2017 20th International
Conference of Computer and Information Technology (ICCIT), 1-6.
Singh, L. D., & Singh, K. M. (2015). Implementation of text encryption using elliptic curve cryptography.
Procedia Computer Science, 54, 73-82.
Smith, A. (2008). Nucleic acids to amino acids: DNA specifies protein. Nature Education, 1(1), 126.
UbaidurRahman, N. H., Balamurugan, C., & Mariappan, R. (2015). A novel string matrix data structure for
DNA encoding algorithm. Procedia Computer Science, 46, 820-832.
Viral, G. M., Jain, D. K., & Ravin, S. (2014). A real-Time approach for secure text transmission using video
cryptography. 2014 Fourth International Conference on Communication Systems and Network Technologies,
635-638.
E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021) [173]
Artificial Intelligence in the 4th Industrial Revolution