1 |
T. Kazuo, O. Akimitsu, and S. Isao, "Public- Key Systems using DNA as a One-Way Function for Key Distribution," BioSystems, Vol. 81, No. 1, pp. 25-29, 2005.
DOI
ScienceOn
|
2 |
A. Gehani, T. LaBean, and J. Reif, "DNAbased Cryptography," Aspects of Molecular Computing, Lecture Notes in Computer Science , Vol. 2950, pp. 34-50, 2004.
|
3 |
C.T. Clelland, V. Risca, and C. Bancroft, "Hiding Messages in DNA Microdots," Nature, Vol. 399, No. 6736, pp. 533-534, June 1999.
DOI
ScienceOn
|
4 |
A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, "Cryptography with DNA Binary Strands," Biosystems, Vol. 57, Issue 1, pp. 13-22, 2000.
DOI
ScienceOn
|
5 |
B. Shimanovsky, J. Feng, and M. Potkonjak, "Hiding Data in DNA," Proc. of the 5th Intl. Workshop in Information Hiding, pp. 373-386, 2002.
|
6 |
M. Arita, "Writing Information into DNA," Molecular Computing, Lecture Notes in Computer Science, Vol. 2950, pp. 23-35, 2004.
|
7 |
N. Yachie, K. Sekiyama, J. Sugahara, Y. Ohashi, and M. Tomita, "Alignment-based Approach for Durable Data Storage Into Living Organisms," Biotechnol. Prog. Vol. 23, No. 2, pp. 501-505, 2007.
DOI
ScienceOn
|
8 |
D. Heider and A. Barnekow, "DNA Watermarks in Non-Coding Regulatory Sequences," BMC Bioinformatics, Vol. 2, No. 125, doi:10.1186/1756-0500-2-125, 2009.
DOI
ScienceOn
|
9 |
D. Heider and A. Barnekow, "DNA-Based Watermarks using the DNA-Crypt Algorithm," BMC Bioinformatics, Vol. 8, No. 176, doi:10.1186/1471-2105-8-176, 2007.
DOI
|
10 |
D. Heider and A. Barnekow, "DNA Watermarks - A Proof of Concept," BMC Bioinformatics, Vol. 9, No. 40, doi:10.1186/1471-2199-9-40, 2008.
DOI
ScienceOn
|
11 |
J. Shuhong and R. Goutte, "Code for Encryption Hiding Data Into Genomic DNA of Living Organisms," International Conference on Signal Processing (ICSP) , pp. 2166-2169, 2008.
|
12 |
S.H. Lee and K.R. Kwon, "Robust DNA Watermarking Based on Coding DNA Sequence," The Institute of Electronics Engineers of Korea, Vol. 49-CI, No. 2, pp. 123-133, 2012.
과학기술학회마을
|
13 |
S.H. Lee, S.G. Kwon, and K.R. Kwon, "A Robust DNA Watermarking in Lifting Based 1D DWT Domain," The Institute of Electronics Engineers of Korea, , Vol. 49, No. 10, pp. 91-101, 2012.
과학기술학회마을
DOI
ScienceOn
|
14 |
F Balado, "On the Embedding Capacity of DNA Strands Under Insertion, Deletion and Substitution Mutations," SPIE Media Forensics and Security XII , Vol. 7541, 2010.
|
15 |
S. Mallat and S. Zhong, "Characterization of Signals from Multiscale Edges," IEEE Trans. Pattern Anal. Machine Intell., Vol. 14, Issue 7, pp. 710-732, 1992.
DOI
ScienceOn
|
16 |
W.J. Kim, T.Y. Seung, S.H. Lee, and K.R. Kwon, "An Information Security Scheme Based on Video Watermarking and Encryption for H.264 Scalable," Journal of Korea Multimedia Society, Vol. 15, No. 3, pp. 299-311, 2012.
과학기술학회마을
DOI
ScienceOn
|
17 |
B.J. Jang, S.H. Lee, and K.R. Kwon, "Active Video Watermarking Technique for Infectious Information Hiding System," Journal of Korea Multimedia Society, Vol. 15, No. 8, pp. 1017-1030, 2012.
과학기술학회마을
DOI
ScienceOn
|