Figure - uploaded by Mahmoud Y. Shams
Content may be subject to copyright.
Converting 8-bit binary format to DNA

Converting 8-bit binary format to DNA

Source publication
Article
Full-text available
In this new information era, the transfer of data and information has become a very important matter. Transferred data must be kept secured from unauthorized persons using cryptography. The science of cryptography depends not only on complex mathematical models but also on encryption keys. Amino acid encryption is a promising model for data securit...

Citations

... The experimental results showed that the intelligent system of power grid could resist various intrusion behaviors of unknown data sources under the optimization of the algorithm. 11 Song et al. combined a MO-GA and a discrete phase model to improve the separator. The experimental results showed that the pressure drop and separation efficiency of the separator were significantly improved under the optimal design of the algorithm. ...
Article
Full-text available
Industrial robot is a and multi‐output complex system with strong coupling and high nonlinearity. The motion control accuracy of the system is affected by many factors. To solve the difficulty in establishing the input and output characteristics of robot dynamics modeling, the robot motion model is established through the Lagrangian energy function. At the same time, the nonlinear relationship between angular velocity, angular acceleration, and robot torque is accurately expressed through improved cascaded neural network. In addition, the optimal time planning of the robot's trajectory in joint space is studied using multinomial interpolation method and the particle swarm optimization (PSO). In the simulation experiment, the effect of the proposed dynamic model fitting was outstanding. Under the mixed multinomial difference calculation planning, the angular position trajectories of the three joints changed very smoothly. In the data set application test, the average error of the PSO algorithm was 0.4061 mm and the average task time was 9.101 s, which were lower than other planning algorithms. Experiments showed that the Lagrangian dynamic model analysis based on genetic algorithm cascaded neural network and PSO trajectory scheduling method under mixed multinomial difference had better trajectory planning performance in handling tasks.
... Then the protein message and the first key are used in the modified Playfair matrix to encrypt the amino acid). The encryption technique is too simple used basic biological operations (Sakr et al., 2022). ...
Article
In this era, information security plays a crucial and sensitive task as this data is potentially vulnerable such that different types of attacks may happen and affects the data. This paper presents a new hybrid cryptosystem for DNA cryptography based on GA and a coding table. The encryption algorithm provides multi-layer security (jamming with spiral matrix, generating coding table, coding of DNA characters, XOR-crossover operation) for DNA sequence. The decryption algorithm follows these steps: binary and segment the ciphertext, applied XOR-crossover operation, Transform each block to ASCII code, decoding of characters, remove jamming and generate the plaintext. The performance evaluation of this algorithm is based on confusion and diffusion, avalanche effect, and encryption time. The experimental results show that these algorithms yield an average time 0.835 ms/0.78 ms for 1,000 bases. The result shows outperformance in security and a weak correlation coefficient between ciphertexts generated and plaintext.
... Then the protein message and the first key are used in the modified Playfair matrix to encrypt the amino acid). The encryption technique is too simple used basic biological operations (Sakr et al., 2022). ...
... They employed Bidirectional Associative Memory Neural Network (BAMNN) as a key generation with a high level of security compared with conventional cryptography algorithms. Sakr et al. [48], presented an amino acid encryption model for key generation using GA. They generated two keys, one is generated using GA, and the second key is by converting DNA to a protein message. ...
... The model is tested over different attacks and proved that DNA with amino acids can be used for encryption tasks. According to the mentioned studies [26][27][28]48], which prove that DNA and amino acid can be used for encryption, we proposed our system using DNA with an amino acid as a non-invertible transform method based on ECG for human authentication. ...
Article
Full-text available
Recently, electrocardiogram (ECG) signals have received a high level of attention as a physiological signal in the field of biometrics. It has presented great possibilities for its strength against counterfeit. However, the ECG feature templates are irreplaceable, and a compromised template implies a permanent loss of identity. Therefore, several studies have been introduced biometric template protection techniques such as cancelable techniques to protect the original template in case it is stolen or lost. In this research, a cancelable ECG approach is proposed to protect the ECG feature template for human authentication. In our system, we first employed some image processing techniques for preprocessing the input ECG signals. Then, a deep transfer learning approach is employed to extract the deep ECG features. Later, the proposed cancelable approach based on DNA and amino acid is applied to protect the deep feature templates. Lastly, a Support Vector Machine (SVM) is employed for authentication. Extensive experiments on two commonly used datasets coupled with comprehensive theoretical analysis demonstrate the highest accuracy of the proposed system and the strong resilience of the system to various security and privacy attacks. Results show that the proposed cancelable method meets all requirements of cancelable biometrics such as irreversibility, revocability, and unlinkability.
Article
Cryptography allows our data to be transmitted without giving sensitive information away. This is the art of hiding the information from the malicious third party and making the data accessible to only the sender and the receiver. Building a complex cryptosystem has always been a challenge that can provide relentless security and is infeasible to break. This paper discusses a hybrid cryptosystem that is inspired by the concepts of DNA cryptography and it is further strengthened using multiple components. A random key is used which is generated using the run test of randomness, different DNA encoding combinations, and a state-changing random state mealy machine is used for further strengthening the security. This paper provides a detailed discussion regarding every component the authors used to build the system and also discusses about the vulnerabilities that they found in the existing works with also an overview on how they have addressed them. This paper also discusses the effectiveness and the performance of the proposed system to give an overview of its security measures and also provides some comparative analysis with existing works to back the claim on improved security features.