Page 186 - The-5th-MCAIT2021-eProceeding
P. 186

References

        Abd El-Latif, E. I., & Moussa, M. I., (2019). Information hiding using artificial DNA sequences based on
        Gaussian kernel function. Journal of Information and Optimization Sciences.
        Bhimani, P. (2018). A Review on cryptography techniques using DNA computing. International Journal of
        Computer Engineering in Research Trends. 5(6), 187-191.
        Kamaraj, A., Bhavithara, M., & Bhrintha, A. P. (2016). DNA-based encryption and decryption using FPGA.
        International Journal of Current Research and Modern Education (IJCRME’16), 89-94.
        Kaundal,  A.  K.,  &  Verma,  A.  K.  (2014).  DNA  based  cryptography:  a  review.  International  Journal  of
        Information and Computation Technology, 4(7), 693-698.
        Keerthi,  K.,  &  Surendiran,  B.  (2017).  Elliptic  curve  cryptography  for  secured  text  encryption. 2017
        International Conference on Circuit, Power and Computing Technologies (ICCPCT), 1-5.
        Lin, C. H., Wu, J. X., Chen, P., Li, C. M., Pai, N. S., & Kuo, C. L. (2021) Symmetric cryptography with a
        chaotic map and a multilayer machine learning network for physiological signal infosecurity: case study in
        electrocardiogram. IEEE Access, 9, 26451-26467.
        Raghunandan, K. R., Shetty, R., & Aithal, G. (2017). Key generation and security analysis of text cryptography
        using cubic power of Pell's equation. 2017 International Conference on Intelligent Computing, Instrumentation
        and Control Technologies (ICICICT), 1496-1500.
        Raj, B. B., & Panchami, V., (2015). DNA-based cryptography using permutation and random key generation
        method. International Journal of Innovative Research in Science, Engineering and Technology, 3(5), 263-267.
        Roy, S. S., Shahriyar, S. A., Asaf-Uddowla, M., Alam, K. M. R., & Morimoto, Y. (2017). A novel encryption
        model for text messages using delayed chaotic neural network and DNA cryptography. 2017 20th International
        Conference of Computer and Information Technology (ICCIT), 1-6.
        Singh, L. D., & Singh, K. M. (2015). Implementation of text encryption using elliptic curve cryptography.
        Procedia Computer Science, 54, 73-82.
        Smith, A. (2008). Nucleic acids to amino acids: DNA specifies protein. Nature Education, 1(1), 126.
        UbaidurRahman, N. H., Balamurugan, C., & Mariappan, R. (2015). A novel string matrix data structure for
        DNA encoding algorithm. Procedia Computer Science, 46, 820-832.
        Viral, G. M., Jain, D. K., & Ravin, S. (2014). A real-Time approach for secure text transmission using video
        cryptography. 2014 Fourth International Conference on Communication Systems and Network Technologies,
        635-638.


































        E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021)   [173]
        Artificial Intelligence in the 4th Industrial Revolution
   181   182   183   184   185   186   187   188   189   190   191