New Data hiding method based on DNA and Vigenere Autokey
DOI:
https://doi.org/10.25007/ajnu.v6n3a83Keywords:
Steganography, Cryptography, DNA, Vigenere Autokey, XORAbstract
People are always looking for secure methods to protect valuable information against unauthorized access or use. That's why; disciplines like cryptography and steganography are gaining a great interest among researchers. Recent steganographic techniques hide data into digital media such as sound, images, and videos. However, steganography took a step further to utilize the DNA as a carrier of secret information. DNA-based steganography techniques could be for either authentication or data storage. There is a special property for real DNA sequences, that is, there is almost no difference between a real DNA sequence and a fake one. This property has been be exploited in this study. A distinct type of hiding approach is adopted in this work to be applied on the DNA sequences based on cryptographic method called Vigenere Autokey. The proposed mechanism hides the secret message via converting it along with the key to the DNA sequences and then applying the Autokey cipher using a special table created via making use of DNA-XOR operator to increase the security of the proposed mechanism. So, it can meet the requirements of good steganographic system (with high embedding capacity, good visual imperceptibility, and reasonable level of security).
Downloads
References
Shiu, H. J., Ng, K. L., Fang, J. F., Lee, R. C., & Huang, C. H. (2010). Data hiding methods based upon DNA sequences. Information Sciences, 180(11), 2196-2208.
Shimanovsky, B., Feng, J., & Potkonjak, M. (2002, October). Hiding data in DNA. In International Workshop on Information Hiding (pp. 373-386). Springer, Berlin, Heidelberg.
Abbasy, M. R., & Shanmugam, B. (2011, July). Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences. In Services (SERVICES), 2011 IEEE World Congress on (pp. 385-390). IEEE.
Guo, C., Chang, C. C., & Wang, Z. H. (2012). A new data hiding scheme based on DNA sequence. Int. J. Innov. Comput. Inf. Control, 8(1), 139-149.
Bhattacharyya, D., & Bandyopadhyay, S. K. (2013). Hiding secret data in dna sequence. International Journal of Scientific &Engineering Research, 4(2).
Mousa, H., Moustafa, K., Abdel-Wahed, W., & Hadhoud, M. M. (2011). Data hiding based on contrast mapping using DNA medium. Int. Arab J. Inf. Technol., 8(2), 147-154.
Tuncer, T., & Avci, E. (2016). A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images. Displays, 41, 1-8.
Cui, G., Qin, L., Wang, Y., & Zhang, X. (2008, September). An encryption scheme using DNA technology. In Bio-Inspired Computing: Theories and Applications, 2008. BICTA 2008. 3rd International Conference on (pp. 37-42). IEEE.
Leier, A., Richter, C., Banzhaf, W., & Rauhe, H. (2000). Cryptography with DNA binary strands. Biosystems, 57(1), 13-22.
Kencl, L., & Loebl, M. (2010). DNA-inspired information concealing: A survey. Computer Science Review, 4(4), 251-262.
Cui, G., Qin, L., Wang, Y., & Zhang, X. (2007, April). Information security technology based on DNA computing. In Anti-counterfeiting, Security, Identification, 2007 IEEE International Workshop on (pp. 288-291). IEEE.
EMBL-EBI, The home for big data in biology. (n.d.). Retrieved from http://www.ebi.ac.uk/ [Last accessed on July 14, 2017]
Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright
The use of a Creative Commons License enables authors/editors to retain copyright to their work. Publications can be reused and redistributed as long as the original author is correctly attributed.
- Copyright
- The researcher(s), whether a single or joint research paper, must sell and transfer to the publisher (the Academic Journal of Nawroz University) through all the duration of the publication which starts from the date of entering this Agreement into force, the exclusive rights of the research paper/article. These rights include the translation, reuse of papers/articles, transmit or distribute, or use the material or parts(s) contained therein to be published in scientific, academic, technical, professional journals or any other periodicals including any other works derived from them, all over the world, in English and Arabic, whether in print or in electronic edition of such journals and periodicals in all types of media or formats now or that may exist in the future. Rights also include giving license (or granting permission) to a third party to use the materials and any other works derived from them and publish them in such journals and periodicals all over the world. Transfer right under this Agreement includes the right to modify such materials to be used with computer systems and software, or to reproduce or publish it in e-formats and also to incorporate them into retrieval systems.
- Reproduction, reference, transmission, distribution or any other use of the content, or any parts of the subjects included in that content in any manner permitted by this Agreement, must be accompanied by mentioning the source which is (the Academic Journal of Nawroz University) and the publisher in addition to the title of the article, the name of the author (or co-authors), journal’s name, volume or issue, publisher's copyright, and publication year.
- The Academic Journal of Nawroz University reserves all rights to publish research papers/articles issued under a “Creative Commons License (CC BY-NC-ND 4.0) which permits unrestricted use, distribution, and reproduction of the paper/article by any means, provided that the original work is correctly cited.
- Reservation of Rights
The researcher(s) preserves all intellectual property rights (except for the one transferred to the publisher under this Agreement).
- Researcher’s guarantee
The researcher(s) hereby guarantees that the content of the paper/article is original. It has been submitted only to the Academic Journal of Nawroz University and has not been previously published by any other party.
In the event that the paper/article is written jointly with other researchers, the researcher guarantees that he/she has informed the other co-authors about the terms of this agreement, as well as obtaining their signature or written permission to sign on their behalf.
The author further guarantees:
- The research paper/article does not contain any defamatory statements or illegal comments.
- The research paper/article does not violate other's rights (including but not limited to copyright, patent, and trademark rights).
This research paper/article does not contain any facts or instructions that could cause damages or harm to others, and publishing it does not lead to disclosure of any confidential information.