Information Hiding Based on DNA Steganography

被引:0
|
作者
Wang, Zicheng [1 ]
Zhao, Xiaohang [1 ]
Wang, Hong [1 ]
Cui, Guangzhao [1 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Elect Informat Engn, Zhengzhou 450002, Peoples R China
关键词
Message security; DNA steganography; Message decomposing; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As a special cryptography, DNA steganography is safer than ordinal cryptography, only if the primer sequences are concealed from an adversary. However, concealing the primer sequences from an adversary is not easy. Further more, it is possible for an adversary to decipher this special cryptography without the primer sequences. We have researched on how to overcome the security deficiency of DNA steganography and developed a message hiding method based on DNA steganography. We designed some procedures to encrypt a message and then decompose the cipher text into two parts. The sender uses DNA steganography to send one part. If the microdot is assumed or contaminated, the message will be encrypted and decomposed again and again until the microdot is not assumed or contaminated. If the microdot is not assumed or contaminated, the corresponding part will be publicly sent. The novelty of the proposed method is that introduced message decomposing to solve the security problem of DNA steganography. Security analysis shows that on the basis of the proposed method, the security problem of DNA steganography can be surmounted and then a message can be sent and concealed from an adversary.
引用
收藏
页码:946 / 949
页数:4
相关论文
共 50 条
  • [41] Secret information hiding in image randomly method using steganography and cryptography
    Hammoud, Awad Kadhim
    Mohaisen, Hatem Nahi
    Mohammed, Mohammed Q.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1283 - 1291
  • [42] Steganography based information security
    Ratan, R
    Madhavan, CEV
    IETE TECHNICAL REVIEW, 2002, 19 (04): : 213 - 219
  • [43] Steganography in IoT: Information Hiding with APDS-9960 Proximity and Gestures Sensor
    Koptyra, Katarzyna
    Ogiela, Marek R.
    SENSORS, 2022, 22 (07)
  • [44] Developing an Efficient Solution to Information Hiding through Text Steganography along with Cryptography
    Uddin, Palash
    Saha, Mousumi
    Ferdousi, Syeda Jannatul
    Ibn Afjal, Masud
    Abu Marjan, Md.
    2014 9TH INTERNATIONAL FORUM ON STRATEGIC TECHNOLOGY (IFOST), 2014, : 14 - 17
  • [45] Data Hiding in Still Images Based on Blind Algorithm of Steganography
    Bugar, Gabriel
    Banoci, Vladimir
    Broda, Martin
    Levicky, Dusan
    Dupak, Denis
    2014 24TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2014), 2014,
  • [46] DNA-Chip-Based Information Hiding Scheme Achieving Information-Theoretic Security
    Fang, Xiwen
    Lai, Xuejia
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2015, 12 (07) : 1402 - 1407
  • [47] Location Based Information Hiding
    Singh, Hartej
    Singh, Daljit
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), 2016, : 233 - 236
  • [48] Information hiding: Arabic text steganography by using Unicode characters to hide secret data
    Ditta, Allah
    Cai Yongquan
    Azeem, Muhammad
    Rana, Khurram Gulzar
    Yu, Haiyang
    Memon, Muhammad Qasim
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 61 - 78
  • [49] Hiding encrypted speech using steganography
    Al-Najjar, Atef J.
    Alvi, Aleem K.
    Idrees, Syed U.
    Al-Manea, Abdul-Rahman M.
    LECTURE NOTES IN SIGNAL SCIENCE, INTERNET AND EDUCATION (SSIP'07/MIV'07/DIWEB'07), 2007, : 275 - +
  • [50] Information hiding using artificial DNA sequences based on Gaussian kernel function
    Abd El-Latif, Eman, I
    Moussa, M., I
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2019, 40 (06): : 1181 - 1194