Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence
碩士 === 國立臺北大學 === 電機工程學系 === 102 === Due to Internet and the rapid development of computer technology, Make a copy and send digital data becomes simple and fast. But derivative confidential information was easily illegally stealing and tampering issues. How to ensure the security of data transmiss...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/42671455575202391398 |
id |
ndltd-TW-102NTPU0442011 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102NTPU04420112016-07-02T04:20:42Z http://ndltd.ncl.edu.tw/handle/42671455575202391398 Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence 利用生物資訊演算法最佳化資料隱蔽並藉由RSA公鑰系統與混沌地圖加密 Tsung-Hua, Lu 呂琮華 碩士 國立臺北大學 電機工程學系 102 Due to Internet and the rapid development of computer technology, Make a copy and send digital data becomes simple and fast. But derivative confidential information was easily illegally stealing and tampering issues. How to ensure the security of data transmission becomes a very important issue. The use of information hiding technology to protect confidential information, In recent years become a hot research topic. And in recent years data hiding technique into a new research direction, we hope to use this technique can actually complete a hiding of confidential information into the DNA sequence, and use the properties of DNA sequences then using RSA public-key cryptography to encrypt it in order to improve security and successfully extracted ability. And a excellent information hiding technique that can be several ways to assess the strength and toughness, not visible resistance, capacity and security. However, these features are conflicting each other, such as instructions to improve the capacity of hidden data, that will reduce the hidden nature of the data and toughness. Therefore, the development can meet the above requirements hiding technology, is currently the biggest challenge researchers. This paper will against information hiding literature have been published in recent years , do the focused management style and discussion, to provide experts and scholars engaged in the study of information hiding in the reference design algorithms. Shen-Hui, Ho 何善輝 2014 學位論文 ; thesis 67 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺北大學 === 電機工程學系 === 102 === Due to Internet and the rapid development of computer technology, Make a copy and send digital data becomes simple and fast. But derivative confidential information was easily illegally stealing and tampering issues. How to ensure the security of data transmission becomes a very important issue. The use of information hiding technology to protect confidential information, In recent years become a hot research topic.
And in recent years data hiding technique into a new research direction, we hope to use this technique can actually complete a hiding of confidential information into the DNA sequence, and use the properties of DNA sequences then using RSA public-key cryptography to encrypt it in order to improve security and successfully extracted ability. And a excellent information hiding technique that can be several ways to assess the strength and toughness, not visible resistance, capacity and security. However, these features are conflicting each other, such as instructions to improve the capacity of hidden data, that will reduce the hidden nature of the data and toughness. Therefore, the development can meet the above requirements hiding technology, is currently the biggest challenge researchers. This paper will against information hiding literature have been published in recent years , do the focused management style and discussion, to provide experts and scholars engaged in the study of information hiding in the reference design algorithms.
|
author2 |
Shen-Hui, Ho |
author_facet |
Shen-Hui, Ho Tsung-Hua, Lu 呂琮華 |
author |
Tsung-Hua, Lu 呂琮華 |
spellingShingle |
Tsung-Hua, Lu 呂琮華 Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence |
author_sort |
Tsung-Hua, Lu |
title |
Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence |
title_short |
Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence |
title_full |
Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence |
title_fullStr |
Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence |
title_full_unstemmed |
Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence |
title_sort |
utilizing dna coding and chaotic maps along with bioinformatics rsa public-key cryptosystem in bioinformatics optimization approach applied for data hiding into dna sequence |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/42671455575202391398 |
work_keys_str_mv |
AT tsunghualu utilizingdnacodingandchaoticmapsalongwithbioinformaticsrsapublickeycryptosysteminbioinformaticsoptimizationapproachappliedfordatahidingintodnasequence AT lǚcónghuá utilizingdnacodingandchaoticmapsalongwithbioinformaticsrsapublickeycryptosysteminbioinformaticsoptimizationapproachappliedfordatahidingintodnasequence AT tsunghualu lìyòngshēngwùzīxùnyǎnsuànfǎzuìjiāhuàzīliàoyǐnbìbìngjíyóursagōngyàoxìtǒngyǔhùndùndetújiāmì AT lǚcónghuá lìyòngshēngwùzīxùnyǎnsuànfǎzuìjiāhuàzīliàoyǐnbìbìngjíyóursagōngyàoxìtǒngyǔhùndùndetújiāmì |
_version_ |
1718332589817724928 |