메뉴 건너뛰기




Volumn 44, Issue 2, 2005, Pages

Information hiding based on DNA sequences

Author keywords

Cover; DNA sequences; Information hiding

Indexed keywords

CODING ERRORS; GENETIC ENGINEERING; INFORMATION TECHNOLOGY; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 18344378648     PISSN: 05296579     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (7)
  • 2
    • 0343867221 scopus 로고    scopus 로고
    • Applications for data hiding
    • BENDER W, GRUHL D, HWANG R, et al. Applications for data hiding[J]. IBM Systems J, 2003, 39(3-4): 547-568.
    • (2003) IBM Systems J , vol.39 , Issue.3-4 , pp. 547-568
    • Bender, W.1    Gruhl, D.2    Hwang, R.3
  • 3
    • 18344392653 scopus 로고    scopus 로고
    • Chinese source
  • 4
    • 18344365404 scopus 로고    scopus 로고
    • Basic cryptanalysis
    • Headquarters Department of the Army, Field Manual NO 34-40-2
    • THOMAS F S. Basic cryptanalysis. Headquarters Department of the Army, Field Manual NO 34-40-2. ftp://ftpp.ox.ac.uk/cryptanalysis/basjc-cryptanalysis.ps.tar.gz. 2000.
    • (2000)
    • Thomas, F.S.1
  • 5
    • 18344362459 scopus 로고    scopus 로고
    • The repeat masker server
    • SMIT A F A. The repeat masker server, http://repeatmasker.genome.Washington.edu/cgi-bin/RepeatMasker, 1996.
    • (1996)
    • Smit, A.F.A.1
  • 6
    • 84955601215 scopus 로고    scopus 로고
    • Computer based steganography: How it works and way therefore any restrictions on cryptography are nonsense, at best
    • MOLLER S, PFITZMANN A, STIRAND I. Computer based steganography: how it works and way therefore any restrictions on cryptography are nonsense, at best[C]. Information Hiding: First International Workshop, Proceedings, 1996, 1174: 7-21.
    • (1996) Information Hiding: First International Workshop, Proceedings , vol.1174 , pp. 7-21
    • Moller, S.1    Pfitzmann, A.2    Stirand, I.3
  • 7
    • 18344384235 scopus 로고    scopus 로고
    • Chinese source


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.