Hybrid Technique for Steganography-based on DNA with N-Bits Binary Coding Rule

被引:0
作者
Hamed, Ghada [1 ]
Marey, Mohammed [1 ]
El-Sayed, Safaa Amin [1 ]
Tolba, Mohamed Fahmy [1 ]
机构
[1] Ain Shams Univ, Fac Comp & Informat Sci, Cairo, Egypt
来源
PROCEEDINGS OF THE 2015 SEVENTH INTERNATIONAL CONFERENCE OF SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2015) | 2015年
关键词
Hybrid Technique; Cryptography; Steganography; Double Layer Security; Playfair Cipher; DNA; Amino Acids; Binary Coding Rule; Least Significant Base; Cracking Probability; Security parameters;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The information capacity is growing significantly as well as its level of importance and its transformation rate. In this paper, a blind data hiding hybrid technique is introduced using the concepts of cryptography and steganography in order to achieve double layer secured system. The proposed method consists of two phases: phase one is converting the message to DNA format using the proposed n-bits binary coding rule leading to high algorithm's cracking probability compared with those of other algorithms. Followed by applying the Playfair cipher based on DNA and amino acids to encrypt the secret message which generates ambiguity. Phase two is hiding the cipher secret message parts with the ambiguity results from from the first phase. The data is hidden using the least significant base (LSBase) only of each codon of a selected DNA reference sequence using 3:1 hiding strategy. The proposed technique achieves hiding the data in DNA with preserving its biological functions as possible without requiring any extra data to be sent to the receiver.
引用
收藏
页码:95 / 102
页数:8
相关论文
共 14 条
  • [1] Abo A. K., 2013, INT J INFORM TECHNOL, V14, P96
  • [2] [Anonymous], 2013, INT J COMPUTER SCI E
  • [3] Auto A., 2012, J Commun Comput Eng, V2, P44, DOI DOI 10.20454/jcce.2012.242
  • [4] Guo C., 2014, INT J INNOV COMPUT I, V8, P139
  • [5] Hamed G., 2015, APPL INTELLIGENT OPT, P47
  • [6] Kaundal A.K., 2014, INT J INF COMMUN TEC, V4, P693
  • [7] Khalifa A., 2012, INF SYST INFOS 8 INT
  • [8] Khalifa A, 2013, 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), P105, DOI 10.1109/ICCES.2013.6707182
  • [9] Maitra I. K, 2011, J GLOBAL RES COMPUT, V2, P1
  • [10] Sabry Mona, 2010, IJCSIS INT J COMPUTE, V8, P129