Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Encoding table for a = 2.

More »

Table 1 Expand

Table 2.

16 × 16 matrix.

More »

Table 2 Expand

Table 3.

Initial confusion encoding table.

More »

Table 3 Expand

Fig 1.

DNA structure design for sequencing.

(a) DNA sequencing structure. Each DNA sequencing structure length is 200nt, including 160nt DNA ciphertext information and 20nt reassembly parts at both ends. Reassembly part contains 15nt adapter and 5nt index. (b) Construction of DNA mixtures. The DNA mixtures consists of synthetic DNA sequencing structures.

More »

Fig 1 Expand

Fig 2.

Security parameters confusion.

More »

Fig 2 Expand

Fig 3.

Confounding parameters encryption.

More »

Fig 3 Expand

Fig 4.

Confounding parameters decryption.

More »

Fig 4 Expand

Fig 5.

Security parameters decryption.

More »

Fig 5 Expand

Fig 6.

Flow chart of encryption and decryption algorithm.

The algorithm includes data and parameters cipher. The security parameters used in data cipher algorithm include key0, μ0, g0, μ1, g1, r, and the confounding parameters used in parameter cipher algorithm include key1, key2, Pk.

More »

Fig 6 Expand

Fig 7.

Parameters plaintext characters frequency.

More »

Fig 7 Expand

Fig 8.

Parameters ciphertext characters frequency.

More »

Fig 8 Expand

Fig 9.

Parameters ciphertext characters frequency for key1 = 5.

More »

Fig 9 Expand

Fig 10.

Parameters ciphertext characters frequency for key2 = 6.

More »

Fig 10 Expand

Fig 11.

Parameters ciphertext characters frequency for Pk = 2.

More »

Fig 11 Expand

Fig 12.

Frequency analysis of original and encrypted image.

(a) and (b) are original image pixel frequency histograms. (c) and (d) are encrypted image pixel frequency histograms.

More »

Fig 12 Expand

Table 4.

Variance analysis for the uniformity of encrypted image.

More »

Table 4 Expand

Table 5.

Information entropy of encrypted image.

More »

Table 5 Expand

Table 6.

Encryption time comparison(s).

More »

Table 6 Expand

Table 7.

Total encryption time comparison of the algorithms.

More »

Table 7 Expand

Table 8.

The features of effective DNA cryptography schemes.

More »

Table 8 Expand

Table 9.

The features comparison of DNA-based one-time-pad schemes.

More »

Table 9 Expand

Table 10.

The key space comparison of DNA encryption algorithms.

More »

Table 10 Expand

Fig 13.

Key sensitivity of (μ0, g0).

(a) Original Lena image. (b) Ciphered Lena image using (μ0, g0) = (3.78, 0.51). (c) Ciphered Lena image using (μ0, g0) = (3.780000000001, 0.510000000001). (d) Difference between (b) and (c).

More »

Fig 13 Expand

Fig 14.

Key sensitivity of (μ1, g1).

(a) Original Lena image. (b) Ciphered Lena image using (μ1, g1) = (3.92, 0.44). (c) Ciphered Lena image using (μ1, g1) = (3.920000000001, 0.440000000001). (d) Difference between (b) and (c).

More »

Fig 14 Expand

Table 11.

NPCR and UACR performance of ciphered Lena image.

More »

Table 11 Expand

Fig 15.

The biological encryption process for the data.

More »

Fig 15 Expand