DNA-Chip-Based Information Hiding Scheme Achieving Information-Theoretic Security

被引:1
作者
Fang, Xiwen [1 ]
Lai, Xuejia [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Technol, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
DNA Cryptology; DNA Chip; Information Hiding; TECHNOLOGY; MICROARRAY; SYSTEMS;
D O I
10.1166/jctn.2015.3904
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Previously a DNA-chip-based asymmetric encryption and signature system DNA-PKC was proposed. In this paper we prove that DNA-PKC enjoys a special feature: for two distinct messages which are of identical length, the corresponding ciphertexts can be identical. Taking advantage of this feature, we present DNA-IH, which is the first DNA-chip-based information hiding scheme. In our scheme, given an ordinary message M-o, a secret message M-s is incorporated into the microarray C which represents the signature of M-o. Only the intended recipient can retrieve the secret message M-s, while other members can only read the ordinary message M-o without knowing whether there exists any other secret message. Conventional information hiding process changes the statistical properties of the original data. The existence of secret messages embedded can be detected using statistical steganalysis schemes. In DNA-IH, for secret message and ordinary message, the corresponding DNA microarrays can be identical, statistical steganalysis is no longer able to detect whether or not a given DNA chip contains a secret message, i.e., in the aspect of preventing the adversary from distinguishing between the ordinary message microarray and the secret message microarray, information-theoretic security is achieved in DNA-IH.
引用
收藏
页码:1402 / 1407
页数:6
相关论文
共 19 条
  • [1] Digital steganography: Hiding data within data
    Artz, D
    [J]. IEEE INTERNET COMPUTING, 2001, 5 (03) : 75 - 80
  • [2] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [3] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [4] Davide F., 2013, QUANTUM MATTER, V2, P45
  • [5] DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys
    Fang XiWen
    Lai XueJia
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 10
  • [6] DNA SEQUENCING AND GENE STRUCTURE - NOBEL LECTURE, 8 DECEMBER 1980
    GILBERT, W
    [J]. BIOSCIENCE REPORTS, 1981, 1 (05) : 353 - 375
  • [7] Guillermo C., 2013, QUANTUM MATTER, V2, P364
  • [8] DNA microarray technology: Devices, systems, and applications
    Heller, MJ
    [J]. ANNUAL REVIEW OF BIOMEDICAL ENGINEERING, 2002, 4 : 129 - 153
  • [9] Deterministic solutions to QSAT and Q3SAT by spiking neural P systems with pre-computed resources
    Ishdorj, Tseren-Onolt
    Leporati, Alberto
    Pan, Linqiang
    Zeng, Xiangxiang
    Zhang, Xingyi
    [J]. THEORETICAL COMPUTER SCIENCE, 2010, 411 (25) : 2345 - 2358
  • [10] Khodor J., 1999, DNA BASED COMPUTERS, V48, P39