Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography

被引:2
|
作者
Mawla, Noura A. [1 ]
Khafaji, Hussein K. [1 ]
机构
[1] AL Rafidain Univ Coll, Dept Comp Sci, Baghdad 46036, Iraq
关键词
cyber-attacks; hacking; security; cryptography; steganography; hexadecimal system; protein motifs;
D O I
10.3390/computers12080166
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of information between the two parties without interference from an unauthorized third party. This paper proposes a modern approach to cryptography and steganography based on exploiting a new environment: bases and protein chains used to encrypt and hide sensitive data. The protein bases are used to form a cipher key whose length is twice the length of the data to be encrypted. During the encryption process, the plain data and the cipher key are represented in several forms, including hexadecimal and binary representation, and several arithmetic operations are performed on them, in addition to the use of logic gates in the encryption process to increase encrypted data randomness. As for the protein chains, they are used as a cover to hide the encrypted data. The process of hiding inside the protein bases will be performed in a sophisticated manner that is undetectable by statistical analysis methods, where each byte will be fragmented into three groups of bits in a special order, and each group will be included in one specific protein base that will be allocated to this group only, depending on the classifications of bits that have been previously stored in special databases. Each byte of the encrypted data will be hidden in three protein bases, and these protein bases will be distributed randomly over the protein chain, depending on an equation designed for this purpose. The advantages of these proposed algorithms are that they are fast in encrypting and hiding data, scalable, i.e., insensitive to the size of plain data, and lossless algorithms. The experiments showed that the proposed cryptography algorithm outperforms the most recent algorithms in terms of entropy and correlation values that reach -0.6778 and 7.99941, and the proposed steganography algorithm has the highest payload of 2.666 among five well-known hiding algorithms that used DNA sequences as the cover of the data.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Utilizing web-based case studies for cutting-edge information services issues - A pilot study
    Harrington, DL
    Li, XD
    [J]. REFERENCE & USER SERVICES QUARTERLY, 2002, 41 (04) : 364 - 379
  • [42] Integrating cutting-edge plasma technology for environmentally friendly smart horticulture: A proteomics approach
    Kaushik, Neha
    Gupta, Ravi
    Negi, Manorma
    Kaushik, Ajeet
    Kim, June Hyun
    Choi, Eun Ha
    Kaushik, Nagendra Kumar
    [J]. APPLIED MATERIALS TODAY, 2024, 37
  • [44] An Effective Analysis and Exploration of Cutting-Edge Machine Learning for Protein Structure and Sequence Prediction
    Afaque Alam
    Mukesh Kumar
    [J]. SN Computer Science, 5 (6)
  • [45] Twisted fiber microfluidics: a cutting-edge approach to 3D spiral devices
    Shunsuke Kato
    Daniel W. Carlson
    Amy Q. Shen
    Yuanyuan Guo
    [J]. Microsystems & Nanoengineering, 10
  • [46] Enhancing Healthcare Data Security Using Quantum Cryptography for Efficient and Robust Encryption
    Basha, C. Bagath
    Murugan, K.
    Suresh, T.
    SrirengaNachiyar, V.
    Athimoolam, S.
    Pappa, C. Kanmani
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (05) : 1993 - 2000
  • [47] Enhancing Data and Privacy Security in Mobile Cloud Computing through Quantum Cryptography
    Han, Jiawei
    Liu, Yanheng
    Sun, Xin
    Song, Lijun
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 398 - 401
  • [48] Twisted fiber microfluidics: a cutting-edge approach to 3D spiral devices
    Kato, Shunsuke
    Carlson, Daniel W.
    Shen, Amy Q.
    Guo, Yuanyuan
    [J]. MICROSYSTEMS & NANOENGINEERING, 2024, 10 (01)
  • [49] Innovative On-Demand Transit for First-Mile Trips: A Cutting-Edge Approach
    Meshkani, Seyed Mehdi
    Farazmand, Siavash
    Bouguila, Nizar
    Patterson, Zachary
    [J]. TRANSPORTATION RESEARCH RECORD, 2024,
  • [50] Real-Time Security Health and Privacy Monitoring for Saudi Highways Using Cutting-Edge Technologies
    Humayun, Mamoona
    Jhanjhi, Noor Zaman
    Almotilag, Abdullah
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (04):