Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography

被引:2
|
作者
Mawla, Noura A. [1 ]
Khafaji, Hussein K. [1 ]
机构
[1] AL Rafidain Univ Coll, Dept Comp Sci, Baghdad 46036, Iraq
关键词
cyber-attacks; hacking; security; cryptography; steganography; hexadecimal system; protein motifs;
D O I
10.3390/computers12080166
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of information between the two parties without interference from an unauthorized third party. This paper proposes a modern approach to cryptography and steganography based on exploiting a new environment: bases and protein chains used to encrypt and hide sensitive data. The protein bases are used to form a cipher key whose length is twice the length of the data to be encrypted. During the encryption process, the plain data and the cipher key are represented in several forms, including hexadecimal and binary representation, and several arithmetic operations are performed on them, in addition to the use of logic gates in the encryption process to increase encrypted data randomness. As for the protein chains, they are used as a cover to hide the encrypted data. The process of hiding inside the protein bases will be performed in a sophisticated manner that is undetectable by statistical analysis methods, where each byte will be fragmented into three groups of bits in a special order, and each group will be included in one specific protein base that will be allocated to this group only, depending on the classifications of bits that have been previously stored in special databases. Each byte of the encrypted data will be hidden in three protein bases, and these protein bases will be distributed randomly over the protein chain, depending on an equation designed for this purpose. The advantages of these proposed algorithms are that they are fast in encrypting and hiding data, scalable, i.e., insensitive to the size of plain data, and lossless algorithms. The experiments showed that the proposed cryptography algorithm outperforms the most recent algorithms in terms of entropy and correlation values that reach -0.6778 and 7.99941, and the proposed steganography algorithm has the highest payload of 2.666 among five well-known hiding algorithms that used DNA sequences as the cover of the data.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] A New Approach for Data Security in Cryptography and Steganography
    Guttikonda, Prashanti
    Kaviti, Sandhya Rani
    Popuri, Ashok Kumar
    [J]. COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 35 - 44
  • [2] Enhancing security of images by Steganography and Cryptography techniques
    Bukhari, Sadaf
    Arif, Muhammad Shoaib
    Anjum, M. R.
    Dilbar, Samia
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 531 - 534
  • [3] An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Technique
    Rahman, Mohammad Obaidur
    Hossen, Muhammad Kamal
    Morsad, Md. Golam
    Roy, Animesh Chandra
    Chowdhury, Md. Shahnur Azad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (09): : 85 - 93
  • [4] Cutting-Edge Cryptography Through the Lens of Secret Sharing
    Komargodski, Ilan
    Zhandry, Mark
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 : 449 - 479
  • [5] Cutting-edge cryptography through the lens of secret sharing
    Komargodski, Ilan
    Zhandry, Mark
    [J]. INFORMATION AND COMPUTATION, 2018, 263 : 75 - 96
  • [6] Nanodiamonds: A Cutting-edge Approach to Enhancing Biomedical Therapies and Diagnostics in Biosensing
    Hyder, Ali
    Ali, Akbar
    Buledi, Jamil A.
    Memon, Ayaz Ali
    Iqbal, Muzaffar
    Bangalni, Talib Hussain
    Solangi, Amber R.
    Thebo, Khalid Hussain
    Akhtar, Javeed
    [J]. CHEMICAL RECORD, 2024, 24 (04):
  • [7] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [8] Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography
    Bin Hureib, Eshraq S.
    Gutub, Adnan A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 1 - 8
  • [9] Forecast uncertainty modeling and Data Management for a cutting-edge Security Assessment platform
    Ciapessoni, E.
    Cirio, D.
    Pitto, A.
    Omont, N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON PROBABILISTIC METHODS APPLIED TO POWER SYSTEMS (PMAPS), 2016,
  • [10] Enhancing Data Security Using DES-based Cryptography and DCT-based Steganography
    Solichin, Achmad
    Ramadhan, Erwin Wahyu
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH), 2017, : 618 - 621