Information Hiding Based on DNA Steganography

被引:0
|
作者
Wang, Zicheng [1 ]
Zhao, Xiaohang [1 ]
Wang, Hong [1 ]
Cui, Guangzhao [1 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Elect Informat Engn, Zhengzhou 450002, Peoples R China
关键词
Message security; DNA steganography; Message decomposing; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As a special cryptography, DNA steganography is safer than ordinal cryptography, only if the primer sequences are concealed from an adversary. However, concealing the primer sequences from an adversary is not easy. Further more, it is possible for an adversary to decipher this special cryptography without the primer sequences. We have researched on how to overcome the security deficiency of DNA steganography and developed a message hiding method based on DNA steganography. We designed some procedures to encrypt a message and then decompose the cipher text into two parts. The sender uses DNA steganography to send one part. If the microdot is assumed or contaminated, the message will be encrypted and decomposed again and again until the microdot is not assumed or contaminated. If the microdot is not assumed or contaminated, the corresponding part will be publicly sent. The novelty of the proposed method is that introduced message decomposing to solve the security problem of DNA steganography. Security analysis shows that on the basis of the proposed method, the security problem of DNA steganography can be surmounted and then a message can be sent and concealed from an adversary.
引用
收藏
页码:946 / 949
页数:4
相关论文
共 50 条
  • [31] Information Hiding Into OBJ Format File Using Vector Steganography Techniques
    Mados, Branislav
    Balaz, Anton
    Adam, Norbert
    Hurtuk, Jan
    2018 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2018, : 91 - 95
  • [32] An improved hiding information by modifying selected DWT coefficients in video steganography
    Ferda Ernawan
    Multimedia Tools and Applications, 2024, 83 : 34629 - 34645
  • [33] Information Hiding through Dynamic Text Steganography and Cryptography Computing and Informatics
    Bhat, Deepali
    Krithi, V
    Manjunath, K. N.
    Prabhu, Srikanth
    Renuka, A.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1826 - 1831
  • [34] Optimal quantization-based steganography for adaptive hiding
    Liu, Guangjie
    Dai, Yuewei
    Wang, Zhiquan
    Yang, Jingyu
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1246 - +
  • [35] Data hiding technique in steganography for information security using number theory
    Rehman, Amjad
    Saba, Tanzila
    Mahmood, Toqeer
    Mehmood, Zahid
    Shah, Mohsin
    Anjum, Adeel
    JOURNAL OF INFORMATION SCIENCE, 2019, 45 (06) : 767 - 778
  • [36] An improved hiding information by modifying selected DWT coefficients in video steganography
    Ernawan, Ferda
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (12) : 34629 - 34645
  • [37] A Novel Image Hiding Technique Based on Stratified Steganography
    Mani, M. Radhika
    Eswari, G. Suryakala
    SMART COMPUTING AND INFORMATICS, 2018, 77 : 45 - 52
  • [38] Hiding Information through Reverse-Phase Audio Steganography Technique
    Sanchez Rinza, Barbara Emma
    Robledo Sanchez, Carlos, I
    Jaramillo Nunez, Alberto
    COMPUTACION Y SISTEMAS, 2022, 26 (01): : 33 - 38
  • [39] Image Hiding Algorithm Based on Secure Steganography Mechanism
    Zhao, Lian
    Zhang, Yingzhou
    Wang, Xing
    Chen, Xinghao
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 122 - 129
  • [40] A STEGANOGRAPHY STRATEGY BASED ON EQUIVALENCE PARTITIONS OF HIDING UNITS
    Liu, Shaohui
    Yao, Hongxun
    Zhang, Shengping
    Gao, Wen
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1299 - 1304