Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence

碩士 === 國立臺北大學 === 電機工程學系 === 102 ===   Due to Internet and the rapid development of computer technology, Make a copy and send digital data becomes simple and fast. But derivative confidential information was easily illegally stealing and tampering issues. How to ensure the security of data transmiss...

Full description

Bibliographic Details
Main Authors: Tsung-Hua, Lu, 呂琮華
Other Authors: Shen-Hui, Ho
Format: Others
Language:en_US
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/42671455575202391398
id ndltd-TW-102NTPU0442011
record_format oai_dc
spelling ndltd-TW-102NTPU04420112016-07-02T04:20:42Z http://ndltd.ncl.edu.tw/handle/42671455575202391398 Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence 利用生物資訊演算法最佳化資料隱蔽並藉由RSA公鑰系統與混沌地圖加密 Tsung-Hua, Lu 呂琮華 碩士 國立臺北大學 電機工程學系 102   Due to Internet and the rapid development of computer technology, Make a copy and send digital data becomes simple and fast. But derivative confidential information was easily illegally stealing and tampering issues. How to ensure the security of data transmission becomes a very important issue. The use of information hiding technology to protect confidential information, In recent years become a hot research topic.   And in recent years data hiding technique into a new research direction, we hope to use this technique can actually complete a hiding of confidential information into the DNA sequence, and use the properties of DNA sequences then using RSA public-key cryptography to encrypt it in order to improve security and successfully extracted ability. And a excellent information hiding technique that can be several ways to assess the strength and toughness, not visible resistance, capacity and security. However, these features are conflicting each other, such as instructions to improve the capacity of hidden data, that will reduce the hidden nature of the data and toughness. Therefore, the development can meet the above requirements hiding technology, is currently the biggest challenge researchers. This paper will against information hiding literature have been published in recent years , do the focused management style and discussion, to provide experts and scholars engaged in the study of information hiding in the reference design algorithms. Shen-Hui, Ho 何善輝 2014 學位論文 ; thesis 67 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺北大學 === 電機工程學系 === 102 ===   Due to Internet and the rapid development of computer technology, Make a copy and send digital data becomes simple and fast. But derivative confidential information was easily illegally stealing and tampering issues. How to ensure the security of data transmission becomes a very important issue. The use of information hiding technology to protect confidential information, In recent years become a hot research topic.   And in recent years data hiding technique into a new research direction, we hope to use this technique can actually complete a hiding of confidential information into the DNA sequence, and use the properties of DNA sequences then using RSA public-key cryptography to encrypt it in order to improve security and successfully extracted ability. And a excellent information hiding technique that can be several ways to assess the strength and toughness, not visible resistance, capacity and security. However, these features are conflicting each other, such as instructions to improve the capacity of hidden data, that will reduce the hidden nature of the data and toughness. Therefore, the development can meet the above requirements hiding technology, is currently the biggest challenge researchers. This paper will against information hiding literature have been published in recent years , do the focused management style and discussion, to provide experts and scholars engaged in the study of information hiding in the reference design algorithms.
author2 Shen-Hui, Ho
author_facet Shen-Hui, Ho
Tsung-Hua, Lu
呂琮華
author Tsung-Hua, Lu
呂琮華
spellingShingle Tsung-Hua, Lu
呂琮華
Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence
author_sort Tsung-Hua, Lu
title Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence
title_short Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence
title_full Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence
title_fullStr Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence
title_full_unstemmed Utilizing DNA Coding and Chaotic Maps Along with Bioinformatics RSA Public-key Cryptosystem in Bioinformatics Optimization Approach Applied for Data Hiding into DNA Sequence
title_sort utilizing dna coding and chaotic maps along with bioinformatics rsa public-key cryptosystem in bioinformatics optimization approach applied for data hiding into dna sequence
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/42671455575202391398
work_keys_str_mv AT tsunghualu utilizingdnacodingandchaoticmapsalongwithbioinformaticsrsapublickeycryptosysteminbioinformaticsoptimizationapproachappliedfordatahidingintodnasequence
AT lǚcónghuá utilizingdnacodingandchaoticmapsalongwithbioinformaticsrsapublickeycryptosysteminbioinformaticsoptimizationapproachappliedfordatahidingintodnasequence
AT tsunghualu lìyòngshēngwùzīxùnyǎnsuànfǎzuìjiāhuàzīliàoyǐnbìbìngjíyóursagōngyàoxìtǒngyǔhùndùndetújiāmì
AT lǚcónghuá lìyòngshēngwùzīxùnyǎnsuànfǎzuìjiāhuàzīliàoyǐnbìbìngjíyóursagōngyàoxìtǒngyǔhùndùndetújiāmì
_version_ 1718332589817724928