Affiliation:
1. Department of Computer Science, AL-Rafidain University College, Baghdad, Iraq
Abstract
The arms of the Internet octopus have reached the ends of the planet. As it has become indispensable in our daily lives, huge amounts of information are transmitted through this network, and it is growing momentarily, which has led to an increase in the number of attacks on this information. Keeping the security of this information has become a necessity today. Therefore, the scientists of cryptography and steganography have seen a great and rapid development in the previous years to the present day, where various security and protection techniques have been used in these two technologies. In this research, it was emphasized to secure the confidentiality and security of the transmitted data between the sending and receiving parties by using both techniques of encryption and steganography. In contrast, where genetic algorithms and logic gates are exploited in an encryption process, in an unprecedented approach, protein motifs are used to mask the encoded message, gaining more dispersion because there are 20 bases used to represent the protein. The real payload gained ranges between 0.8 and 2.666, which outperforms the algorithms that depend on DNA sequences.
Subject
Computer Science Applications,Software
Reference29 articles.
1. Text Encryption Algorithm based on Chaotic Map;M. Y. T. Irsan;Journal of Physics: Conference Series,2019
2. Implementation of RSA cryptography Algorithm in language C in Exchange of text messages;R. S. S. Ítalo;International Journal for Innovation Education and Researchwww.ijier.net,2019
3. Genetic algorithm: reviews, implementations, and applications;T. Alam;International Journal of Engineering Pedagogy (IJEP),2020
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献