1,050 research outputs found
Review on DNA Cryptography
Cryptography is the science that secures data and communication over the
network by applying mathematics and logic to design strong encryption methods.
In the modern era of e-business and e-commerce the protection of
confidentiality, integrity and availability (CIA triad) of stored information
as well as of transmitted data is very crucial. DNA molecules, having the
capacity to store, process and transmit information, inspires the idea of DNA
cryptography. This combination of the chemical characteristics of biological
DNA sequences and classical cryptography ensures the non-vulnerable
transmission of data. In this paper we have reviewed the present state of art
of DNA cryptography.Comment: 31 pages, 12 figures, 6 table
Reversible Data Hiding Scheme with High Embedding Capacity Using Semi-Indicator-Free Strategy
A novel reversible data-hiding scheme is proposed to embed secret data into a side-matched-vector-quantization- (SMVQ-) compressed image and achieve lossless reconstruction of a vector-quantization- (VQ-) compressed image. The rather random distributed histogram of a VQ-compressed image can be relocated to locations close to zero by SMVQ prediction. With this strategy, fewer bits can be utilized to encode SMVQ indices with very small values. Moreover, no indicator is required to encode these indices, which yields extrahiding space to hide secret data. Hence, high embedding capacity and low bit rate scenarios are deposited. More specifically, in terms of the embedding rate, the bit rate, and the embedding capacity, experimental results show that the performance of the proposed scheme is superior to those of the former data hiding schemes for VQ-based, VQ/SMVQ-based, and search-order-coding- (SOC-) based compressed images
State Amplification Subject To Masking Constraints
This paper considers a state dependent broadcast channel with one
transmitter, Alice, and two receivers, Bob and Eve. The problem is to
effectively convey ("amplify") the channel state sequence to Bob while
"masking" it from Eve. The extent to which the state sequence cannot be masked
from Eve is referred to as leakage. This can be viewed as a secrecy problem,
where we desire that the channel state itself be minimally leaked to Eve while
being communicated to Bob. The paper is aimed at characterizing the trade-off
region between amplification and leakage rates for such a system. An achievable
coding scheme is presented, wherein the transmitter transmits a partial state
information over the channel to facilitate the amplification process. For the
case when Bob observes a stronger signal than Eve, the achievable coding scheme
is enhanced with secure refinement. Outer bounds on the trade-off region are
also derived, and used in characterizing some special case results. In
particular, the optimal amplification-leakage rate difference, called as
differential amplification capacity, is characterized for the reversely
degraded discrete memoryless channel, the degraded binary, and the degraded
Gaussian channels. In addition, for the degraded Gaussian model, the extremal
corner points of the trade-off region are characterized, and the gap between
the outer bound and achievable rate-regions is shown to be less than half a bit
for a wide set of channel parameters.Comment: Revised versio
- …