Information Hiding Based on DNA Steganography

被引:0
|
作者
Wang, Zicheng [1 ]
Zhao, Xiaohang [1 ]
Wang, Hong [1 ]
Cui, Guangzhao [1 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Elect Informat Engn, Zhengzhou 450002, Peoples R China
来源
PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS) | 2012年
关键词
Message security; DNA steganography; Message decomposing; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As a special cryptography, DNA steganography is safer than ordinal cryptography, only if the primer sequences are concealed from an adversary. However, concealing the primer sequences from an adversary is not easy. Further more, it is possible for an adversary to decipher this special cryptography without the primer sequences. We have researched on how to overcome the security deficiency of DNA steganography and developed a message hiding method based on DNA steganography. We designed some procedures to encrypt a message and then decompose the cipher text into two parts. The sender uses DNA steganography to send one part. If the microdot is assumed or contaminated, the message will be encrypted and decomposed again and again until the microdot is not assumed or contaminated. If the microdot is not assumed or contaminated, the corresponding part will be publicly sent. The novelty of the proposed method is that introduced message decomposing to solve the security problem of DNA steganography. Security analysis shows that on the basis of the proposed method, the security problem of DNA steganography can be surmounted and then a message can be sent and concealed from an adversary.
引用
收藏
页码:946 / 949
页数:4
相关论文
共 50 条
  • [21] A Review on DNA based Cryptography for Data hiding
    Singh, Shradhanjali
    Sharma, Yash
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019), 2019, : 282 - 285
  • [22] Highly Secure DNA-based Audio Steganography
    Shyamasree, C. M.
    Anees, Sheena
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 519 - 524
  • [23] Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons
    Adnan Gutub
    Faiza Al-Shaarani
    Arabian Journal for Science and Engineering, 2020, 45 : 2631 - 2644
  • [24] Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons
    Gutub, Adnan
    Al-Shaarani, Faiza
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2631 - 2644
  • [25] Dual Steganography for Hiding Text in Video by Linked List Method
    Selvigrija, P.
    Ramya, E.
    2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH), 2015, : 20 - 24
  • [26] Enhanced Data Hiding Audio Steganography Using Signal Ramping
    Choudhury, Somenath Nag
    2018 FOURTH IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2018, : 258 - 263
  • [27] A proposed Technique for Information Hiding Based on Hybrid Cryptography
    Abed, Fadhil Salmon
    ICECCO'12: 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION, 2012, : 305 - 309
  • [28] Data Hiding in Images Using Some Efficient Steganography Techniques
    Maiti, Chandreyee
    Baksi, Debanjana
    Zamider, Ipsita
    Gorai, Pinky
    Kisku, Dakshina Ranjan
    SIGNAL PROCESSING, IMAGE PROCESSING AND PATTERN RECOGNITION, 2011, 260 : 195 - 203
  • [29] Hiding Information in the DNA Sequence Using DNA Steganographic Algorithms with Double-Layered Security
    Vinodhini, R. E.
    Malathi, P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [30] An Improved Method for Reversible Data Hiding Steganography Combined with Cryptography
    Rashmi, N.
    Jyothi, K.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 81 - 84