Information Hiding Based on DNA Steganography

被引:0
作者
Wang, Zicheng [1 ]
Zhao, Xiaohang [1 ]
Wang, Hong [1 ]
Cui, Guangzhao [1 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Elect Informat Engn, Zhengzhou 450002, Peoples R China
来源
PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS) | 2012年
关键词
Message security; DNA steganography; Message decomposing; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As a special cryptography, DNA steganography is safer than ordinal cryptography, only if the primer sequences are concealed from an adversary. However, concealing the primer sequences from an adversary is not easy. Further more, it is possible for an adversary to decipher this special cryptography without the primer sequences. We have researched on how to overcome the security deficiency of DNA steganography and developed a message hiding method based on DNA steganography. We designed some procedures to encrypt a message and then decompose the cipher text into two parts. The sender uses DNA steganography to send one part. If the microdot is assumed or contaminated, the message will be encrypted and decomposed again and again until the microdot is not assumed or contaminated. If the microdot is not assumed or contaminated, the corresponding part will be publicly sent. The novelty of the proposed method is that introduced message decomposing to solve the security problem of DNA steganography. Security analysis shows that on the basis of the proposed method, the security problem of DNA steganography can be surmounted and then a message can be sent and concealed from an adversary.
引用
收藏
页码:946 / 949
页数:4
相关论文
共 50 条
  • [41] The study results steganography hiding messages in image files as vehicle security software
    Navrotskyi, D. O.
    VISNYK NTUU KPI SERIIA-RADIOTEKHNIKA RADIOAPARATOBUDUVANNIA, 2012, (50): : 121 - 128
  • [42] Study on steganographic security in information hiding based on coding transition diagram
    Song, Hui
    Kong, Xiang-Wei
    You, Xin-Gang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (SUPPL.): : 2322 - 2326
  • [43] Advancing DNA Steganography with Incorporation of Randomness
    Cui, Meiying
    Zhang, Yixin
    CHEMBIOCHEM, 2020, 21 (17) : 2503 - 2511
  • [44] A Secure Image-Based Authentication Scheme Employing DNA Crypto and Steganography
    Misbahuddin, Mohammed
    Sreeja, C. S.
    PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 595 - 601
  • [45] A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks
    Badhan, Savita
    Juneja, Mamta
    INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, 2015, 309 : 183 - 190
  • [46] VisKey- An Implementation for Hiding Information
    Murthy, Aishwarya Ganesh
    Reshma, R.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [47] MUSIPHER: HIDING INFORMATION IN MUSIC COMPOSITION
    Spacek, Peter
    Sobota, Pavol
    RAD HRVATSKE AKADEMIJE ZNANOSTI I UMJETNOSTI-MATEMATICKE ZNANOSTI, 2021, 25 (546): : 161 - 179
  • [48] Hiding and Securing Message on Edge Areas of Image using LSB Steganography and OTP Encryption
    Irawan, Candra
    Setiadi, De Rosal Ignatius Moses
    Sari, Christy Atika
    Rachmawanto, Eko Hari
    2017 1ST INTERNATIONAL CONFERENCE ON INFORMATICS AND COMPUTATIONAL SCIENCES (ICICOS), 2017, : 1 - 6
  • [49] Information Hiding Within Still Images Based on the DCT Coefficients Flipping and Encryption
    Ridzon, Radovan
    Levicky, Dusan
    Kanocz, Tomas
    PROCEEDINGS ELMAR-2010, 2010, : 147 - 150
  • [50] Information Warfare in Greece and Rome: Cryptography and Steganography
    Dembskey, Evan
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 56 - 62