Information Hiding Based on DNA Steganography

被引:0
|
作者
Wang, Zicheng [1 ]
Zhao, Xiaohang [1 ]
Wang, Hong [1 ]
Cui, Guangzhao [1 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Elect Informat Engn, Zhengzhou 450002, Peoples R China
关键词
Message security; DNA steganography; Message decomposing; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As a special cryptography, DNA steganography is safer than ordinal cryptography, only if the primer sequences are concealed from an adversary. However, concealing the primer sequences from an adversary is not easy. Further more, it is possible for an adversary to decipher this special cryptography without the primer sequences. We have researched on how to overcome the security deficiency of DNA steganography and developed a message hiding method based on DNA steganography. We designed some procedures to encrypt a message and then decompose the cipher text into two parts. The sender uses DNA steganography to send one part. If the microdot is assumed or contaminated, the message will be encrypted and decomposed again and again until the microdot is not assumed or contaminated. If the microdot is not assumed or contaminated, the corresponding part will be publicly sent. The novelty of the proposed method is that introduced message decomposing to solve the security problem of DNA steganography. Security analysis shows that on the basis of the proposed method, the security problem of DNA steganography can be surmounted and then a message can be sent and concealed from an adversary.
引用
收藏
页码:946 / 949
页数:4
相关论文
共 50 条
  • [1] Information Hiding in Noncoding DNA for DNA Steganography
    Santoso, Kevin Nathanael
    Lee, Suk-Hwan
    Hwang, Won-Joo
    Kwon, Ki-Ryong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (07) : 1529 - 1536
  • [2] Information hiding using steganography
    Amin, MM
    Salleh, M
    Ibrahim, S
    Katmin, MR
    Shamsuddin, MZI
    4TH NATIONAL CONFERENCE ON TELECOMMUNICATION TECHNOLOGY, PROCEEDINGS, 2003, : 21 - 25
  • [3] Information Hiding using Bucket Steganography
    Koptyra, Katarzyna
    Ogiela, Marek R.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 292 - 293
  • [4] Blind consistency based steganography for information hiding in digital media
    Qi, HR
    Snyder, WE
    Sander, WA
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I AND II, PROCEEDINGS, 2002, : 585 - 588
  • [5] Hiding Secret Information Using LSB Based Audio Steganography
    Binny, Anu
    Koilakuntla, Maddulety
    2014 INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE ISCMI 2014, 2014, : 56 - 59
  • [6] A New Information Hiding Method Based on Improved BPCS Steganography
    Sun, Shuliang
    ADVANCES IN MULTIMEDIA, 2015, 2015
  • [7] Coverless Data Hiding in VoIP based on DNA Steganography with Authentication
    Soundararajan, Deepikaa
    Ramakrishnan, Saravanan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (02) : 190 - 198
  • [8] Information hiding with adaptive steganography based on novel fuzzy edge identification
    Sanjeev Kumar
    Amarpal Singh
    Manoj Kumar
    Defence Technology, 2019, 15 (02) : 162 - 169
  • [9] Information hiding with adaptive steganography based on novel fuzzy edge identification
    Kumar, Sanjeev
    Singh, Amarpal
    Kumar, Manoj
    DEFENCE TECHNOLOGY, 2019, 15 (02) : 162 - 169
  • [10] Chaos and Fractal-Based Information Hiding Techniques as Applied to Steganography
    Ntaoulas, Nikolaos
    Drakopoulos, Vasileios
    PERSPECTIVES IN DYNAMICAL SYSTEMS II-NUMERICAL AND ANALYTICAL APPROACHES, DSTA 2021, 2024, 454 : 387 - 401