Information Hiding Based on DNA Steganography

被引:0
|
作者
Wang, Zicheng [1 ]
Zhao, Xiaohang [1 ]
Wang, Hong [1 ]
Cui, Guangzhao [1 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Elect Informat Engn, Zhengzhou 450002, Peoples R China
来源
PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS) | 2012年
关键词
Message security; DNA steganography; Message decomposing; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As a special cryptography, DNA steganography is safer than ordinal cryptography, only if the primer sequences are concealed from an adversary. However, concealing the primer sequences from an adversary is not easy. Further more, it is possible for an adversary to decipher this special cryptography without the primer sequences. We have researched on how to overcome the security deficiency of DNA steganography and developed a message hiding method based on DNA steganography. We designed some procedures to encrypt a message and then decompose the cipher text into two parts. The sender uses DNA steganography to send one part. If the microdot is assumed or contaminated, the message will be encrypted and decomposed again and again until the microdot is not assumed or contaminated. If the microdot is not assumed or contaminated, the corresponding part will be publicly sent. The novelty of the proposed method is that introduced message decomposing to solve the security problem of DNA steganography. Security analysis shows that on the basis of the proposed method, the security problem of DNA steganography can be surmounted and then a message can be sent and concealed from an adversary.
引用
收藏
页码:946 / 949
页数:4
相关论文
共 50 条
  • [31] CASCADED DNA CRYPTOGRAPHY AND STEGANOGRAPHY
    Shweta
    Indora, Sanjeev
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 104 - 107
  • [32] A Novel Approach for Hiding Data in Videos Using Network Steganography Methods
    Sekhar, Amritha
    Kumar, Manoj G.
    Rahiman, M. Abdul
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 764 - 768
  • [33] Image Steganography : Hiding Short Audio Messages within Digital Images
    Khalil, M. I.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 68 - 73
  • [34] Analogy of Various DNA Based Security Algorithms Using Cryptography and Steganography
    Jain, Shipra
    Bhatnagar, Vishal
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 285 - 291
  • [35] A steganography embedding method based on CDF-DWT technique for data hiding application using Elgamal algorithm
    Sasirekha, K.
    Amali, Miruna Joe
    Swathy, M.
    Raghini, M.
    Darshini, B. Priya
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2023, 80
  • [36] CADS: CRISPR/Cas12a-Assisted DNA Steganography for Securing the Storage and Transfer of DNA-Encoded Information
    Li, Shi-Yuan
    Liu, Jia-Kun
    Zhao, Guo-Ping
    Wang, Jin
    ACS SYNTHETIC BIOLOGY, 2018, 7 (04): : 1174 - 1178
  • [37] Information-theoretic analysis of information hiding
    Moulin, P
    O'Sullivan, JA
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (03) : 563 - 593
  • [38] Hiding Relevant Information in an Image
    Das, Madhusmita
    Mohanty, Mahamaya
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 501 - +
  • [39] Understanding Information Hiding in iOS
    Caviglione, Luca
    Mazurczyk, Wojciech
    COMPUTER, 2015, 48 (01) : 62 - 65
  • [40] Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques
    Wahab, Osama Fouad Abdel
    Khalaf, Ashraf A. M.
    Hussein, Aziza I.
    Hamed, Hesham F. A.
    IEEE ACCESS, 2021, 9 : 31805 - 31815