Hiding Information in the DNA Sequence Using DNA Steganographic Algorithms with Double-Layered Security

被引:1
作者
Vinodhini, R. E. [1 ]
Malathi, P. [1 ]
机构
[1] Amrita Sch Engn, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Addition/Subtraction Operator; Complementary Algorithm; DNA Steganography; Insertion Method; RSA Algorithm; Triplet DNA Bases; XOR Substitution Method;
D O I
10.4018/IJISP.300322
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Due to the rapid growth of the internet, data can now be stored digitally and exchanged easily by people. While sharing the data through the internet, the attackers can easily access the data. This may cause data privacy issues. Steganography is a kind of information security that makes it possible to hide secret information in a variety of formats like images, text, audio, video, networks, and DNA (deoxyribonucleic acid). Here, DNA steganography is used to protect secret data from intruders. In this paper, three different algorithms of DNA steganography are introduced. The algorithms are an RSA-based insertion algorithm, a complementary algorithm using the addition/subtraction rule, a combination of insertion and substitution method with XOR operation. Cracking probability, payload, capacity, and BPN are calculated to check the performance of the proposed algorithms. As a result, this paper concludes that the proposed techniques yield better results than existing algorithms and have a low cracking probability, in addition to providing double-layered security to the information.
引用
收藏
页数:20
相关论文
共 31 条
  • [1] Abbasy Mohammad Reza, 2012, International Journal of New Computer Architectures and their Applications, V2, P183
  • [2] Agrawal R, 2014, 2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), P35
  • [3] Security analysis of DNA based steganography techniques
    Al-Harbi, Omnia Abdullah
    Alahmadi, Walaa Essa
    Aljahdali, Asia Othman
    [J]. SN APPLIED SCIENCES, 2020, 2 (02):
  • [4] Amal K., 2015, British Journal of Mathematics Computer Science, V11, P1, DOI DOI 10.9734/BJMCS/2015/19561
  • [5] Amritha PP, 2011, CYBER SECURITY, CYBER CRIME AND CYBER FORENSICS: APPLICATIONS AND PERSPECTIVES, P250, DOI 10.4018/978-1-60960-123-2.ch018
  • [6] [Anonymous], 2017, 2017 4 INT C ADV COM, DOI DOI 10.1109/ICACCS.2017.8014670
  • [7] [Anonymous], 2013, INT J COMPUTER SCI E
  • [8] Atito A., 2012, J Commun Comput Eng, V2, P44, DOI DOI 10.20454/jcce.2012.242
  • [9] Chakraborty M. S., 2015, INT J ADV INFORM SCI, V44, P44
  • [10] Analysis of various data security techniques of steganography: A survey
    Dhawan, Sachin
    Gupta, Rashmi
    [J]. INFORMATION SECURITY JOURNAL, 2021, 30 (02): : 63 - 87