This paper introduces a hybrid coding table-based semi-reversible data hiding method using least significant bits (LSB) and encryption. The method involves concealing data in the least significant bits of an image usi...
详细信息
This paper introduces a hybrid coding table-based semi-reversible data hiding method using least significant bits (LSB) and encryption. The method involves concealing data in the least significant bits of an image using a coding table, followed by encryption and permutation. Subsequently, a second phase of data hiding is performed on the encrypted image by analyzing the most significant bits of pixels to create additional hiding space. Notably, the first phase remains irreversible, safeguarding embedded data while limiting full image recovery. With an impressive embedding rate averaging 4.86 bits per pixel (bpp), the method surpasses existing techniques by nearly 62%. Furthermore, it demonstrates robust resilience against adversarial attacks, including complexity analysis, Shannon entropy, and histogram analysis. This paper presents a significant advancement in data hiding, promising enhanced security and efficiency across various applications.
Since the identification of the Standard coding table as a "universal" method to translate genetic information into amino acids, exceptions to this rule have been reported, and to date there are nearly 20 al...
详细信息
Since the identification of the Standard coding table as a "universal" method to translate genetic information into amino acids, exceptions to this rule have been reported, and to date there are nearly 20 alternative genetic coding tables deployed by either nuclear genomes or organelles of organisms. Why are these codes still in use and why are new codon reassignments occurring? This present study aims to provide a new method to address these questions and to analyze whether these alternative codes present any advantages or disadvantages to the organisms or organelles in terms of robustness to error. We show that two of the alternative coding tables, The Ciliate, Dasycladacean and Hexamita Nuclear Code (CDH) and The Flatworm Mitochondrial Code (FMC), exhibit an advantage, while others such as The Yeast Mitochondrial Code (YMC) are at a significant disadvantage. We propose that the Standard Code is likely to have emerged as a "local minimum" and that the "coding landscape" is still being searched for a "global" minimum.
In this era, information security plays a crucial and sensitive task as this data is potentially vulnerable such that different types of attacks may happen and affects the data. This paper presents a new hybrid crypto...
详细信息
In this era, information security plays a crucial and sensitive task as this data is potentially vulnerable such that different types of attacks may happen and affects the data. This paper presents a new hybrid cryptosystem for DNA cryptography based on GA and a coding table. The encryption algorithm provides multi-layer security (jamming with spiral matrix, generating coding table, coding of DNA characters, XOR-crossover operation) for DNA sequence. The decryption algorithm follows these steps: binary and segment the ciphertext, applied XOR-crossover operation, Transform each block to ASCII code, decoding of characters, remove jamming and generate the plaintext. The performance evaluation of this algorithm is based on confusion and diffusion, avalanche effect, and encryption time. The experimental results show that these algorithms yield an average time 0.835 ms/0.78 ms for 1,000 bases. The result shows outperformance in security and a weak correlation coefficient between ciphertexts generated and plaintext.
A near-universal Standard Genetic Code (SGC) implies a single origin for present Earth life. To study this unique event, I compute paths to the SGC, comparing different plausible histories. Notably, SGC-like coding em...
详细信息
A near-universal Standard Genetic Code (SGC) implies a single origin for present Earth life. To study this unique event, I compute paths to the SGC, comparing different plausible histories. Notably, SGC-like coding emerges from traditional evolutionary mechanisms, and a superior route can be identified. To objectively measure evolution, progress values from 0 (random coding) to 1 (SGC-like) are defined: these measure fractions of random-code-to-SGC distance. Progress types are spacing/distance/delta Polar Requirement, detecting space between identical assignments/mutational distance to the SGC/chemical order, respectively. The coding system is based on selected RNAs performing aminoacyl-RNA synthetase reactions. Acceptor RNAs exhibit SGC-like Crick wobble;alternatively, non-wobbling triplets uniquely encode 20 amino acids/start/stop. Triplets acquire 22 functions by stereochemistry, selection, coevolution, or at random. Assignments also propagate to an assigned triplet's neighborhood via single mutations, but can also decay. A vast code universe makes futile evolutionary paths plentiful. Thus, SGC evolution is critically sensitive to disorder from random assignments. Evolution also inevitably slows near coding completion. The SGC likely avoided these difficulties, and two suitable paths are compared. In late wobble, a majority of non-wobble assignments are made before wobble is adopted. In continuous wobble, a uniquely advantageous early intermediate yields an ordered SGC. Revised coding evolution (limited randomness, late wobble, concentration on amino acid encoding, chemically conservative coevolution with a chemically ordered elite) produces varied full codes with excellent joint progress values. A population of only 600 independent coding tables includes SGC-like members;a Bayesian path toward more accurate SGC evolution is available.
Cloud computing has become a cornerstone of development during this era of computing. More and more users are turning to the cloud services provided by the third party service providers at cheaper costs and high avail...
详细信息
ISBN:
(纸本)9781538681909
Cloud computing has become a cornerstone of development during this era of computing. More and more users are turning to the cloud services provided by the third party service providers at cheaper costs and high availability. But protection and privacy of the data stored in the cloud is still a major concern since the users data is being controlled by a third -party in between. Encryption becomes an obvious choice though but is is still questionable on how well the data in its encrypted form can be managed at the cloud. We have proposed a method of applying partitioning techniques on the encrypted structured database in cloud. We have used the hash partitioning technique to partition our database. Our proposed method is compared against a traditional coding table method and it is found to be comaparitively efficient in terms of the running time of the queries.
暂无评论