Significant Features for Steganography Techniques Using Deoxyribonucleic Acid: A review

Diyar Qader Sallem, Nichirvan Asaad Zebari, Dilovan Asaad Zebari, Jwan Najeeb Saeed

Abstract


Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new aspect to achieve better security. In this paper, a survey of more recent DNA based on data hiding algorithms are covered. With particular emphasis of different parameters several data hiding algorithms based on DNA has been reviewed. To present a more secure an efficient data hiding algorithms based on DNA for future works, this will be helpful.


Keywords


Data security Cryptography Data hiding DNA

References


J.-S. Taur, H.-Y. Lin, H.-L. Lee, and C.-W. Tao, "Data hiding in DNA sequences based on table lookup substitution," International Journal of Innovative Computing, Information and Control, vol. 8, no. 10, pp. 6585-6598, 2012.

D. A. Zebari, H. Haron, D. Q. Zeebaree, and A. M. Zain, "A Simultaneous Approach for Compression and Encryption Techniques Using Deoxyribonucleic Acid," in 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), 2019, pp. 1-6: IEEE.

D. A. Zebari, H. Haron, S. R. Zeebaree, and D. Q. Zeebaree, "Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations," in 2018 International Conference on Advanced Science and Engineering (ICOASE), 2018, pp. 312-317: IEEE.

A. Cheddad, "Steganoflage: a new image steganography algorithm," University of Ulster, 2009.

A. Aieh, A. Sen, S. R. Dash, and S. Dehuri, "Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie hellman key sharing technique," in Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), 2015, pp. 1-6: IEEE.

V. K. Yadav and S. Batham, "A novel approach of bulk data hiding using text steganography," Procedia Computer Science, vol. 57, pp. 1401-1410, 2015.

A. M. A. Brifcani and W. M. A. Brifcani, "Stego-based-crypto technique for high security applications," International Journal of Computer Theory and Engineering, vol. 2, no. 6, p. 835, 2010.

A. M. Abdulazeez and A. S. Tahir, "Design and Implementation of Advanced Encryption Standard Security Algorithm using FPGA," Int. J. of Computers & Technology, vol. 4, no. 9, pp. 1988-1993, 2013.

G. Hamed, M. Marey, S. A. El-Sayed, and M. F. Tolba, "Comparative study for various DNA based steganography techniques with the essential conclusions about the future research," in 2016 11th International Conference on Computer Engineering & Systems (ICCES), 2016, pp. 220-225: IEEE.

A. Nickfarjam, H. Ebrahimpour-Komleh, and A. P. Najafabadi, "Image hiding using neighborhood similarity," in 2014 6th Conference on Information and Knowledge Technology (IKT), 2014, pp. 79-82: IEEE.

M. S. Subhedar and V. H. Mankar, "Current status and key issues in image steganography: A survey," Computer science review, vol. 13, pp. 95-113, 2014.

M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin, and M. Shamsuddin, "Information hiding using steganography," in 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings., 2003, pp. 21-25: IEEE.

Q. M. Hussein, "New Metrics for Steganography Algorithm Quality."

P. Kumari and R. Kapoor, "Image Steganography for data embedding & extraction using LSB technique," International Journal of Computer Applications & Information Technology, vol. 9, no. 2, p. 192, 2016.

R. G. Goswami and S. Tamrakar, "Evolution of Data Hiding By Neural Network and Retrieval or Encrypted Image, Text, Audio and Video Files," International Journal of Emerging Technology and Advanced Engineering, vol. 3, no. 5, pp. 153-158, 2013.

A. M. Nickfarjam and Z. Azimifar, "Image steganography based on pixel ranking and particle swarm optimization," in The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012), 2012, pp. 360-363: IEEE.

R. Kaur and M. Mahajan, "Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding," International Journal of Modern Education and Computer Science, vol. 8, no. 9, p. 51, 2016.

A. Khalifa, "LSBase: A key encapsulation scheme to improve hybrid crypto-systems using DNA steganography," in 2013 8th International Conference on Computer Engineering & Systems (ICCES), 2013, pp. 105-110: IEEE.

S. Jain and V. Bhatnagar, "Analogy of various DNA based security algorithms using cryptography and steganography," in 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014, pp. 285-291: IEEE.

P. A. Manisha, "A Survey on DNA Based Cryptography," International Journal of Scientific Engineering and Research (IJSER), vol. 3, no. 4, pp. 132-134, 2015.

J.-S. Pan, T.-G. Ngo, and T.-K. Dao, "A Data Hiding Approach Based on Reference-Affected Matrix," in Advances in Intelligent Information Hiding and Multimedia Signal Processing: Springer, 2020, pp. 53-64.

S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini, "Towards DNA based data security in the cloud computing environment," Computer Communications, 2020.

S. P. Singh and M. E. Naidu, "DNA QR coding for data security using DNA sequence," International Journal of Information Technology, pp. 1-6, 2020.

M. Borda and O. Tornea, "DNA secret writing techniques," in 2010 8th International Conference on Communications, 2010, pp. 451-456: IEEE.

R. Satra12, W. A. Kusuma, and H. Sukoco, "Accelerating Computation of DNA Multiple Sequence Alignment in Distributed Environment," 2014.

M. R. Abbasy, P. Nikfard, A. Ordi, and M. R. N. Torkaman, "DNA base data hiding algorithm," International Journal of New Computer Architectures and their Applications (IJNCAA), vol. 2, no. 1, pp. 183-192, 2012.

N. I. UDZIR, "REVIEW OF DNA AND PSEUDO DNA CRYPTOGRAPHY."

A. Singh and R. Singh, "Information hiding techniques based on DNA inconsistency: An overview," in 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 2015, pp. 2068-2072: IEEE.

J.-S. Chen, Y.-B. Chen, P.-f. Hsu, N. Nguyen-Huu, and Y.-L. Lo, "Cryptographic scheme using genetic algorithm and optical responses of periodic structures," Optics express, vol. 19, no. 9, pp. 8187-8199, 2011.

D. Zebari, H. Haron, and S. Zeebaree, "Security Issues in DNA Based on Data Hiding: A Review," International Journal of Applied Engineering Research, ISSN, pp. 0973-4562, 2017.

M. B. Beck and R. V. Yampolskiy, "Hiding Color Images in DNA Sequences," in MAICS, 2015, pp. 25-29.

C. Sreeja, M. Misbahuddin, and M. H. NP, "DNA for information security: A Survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology," in International Conference on Computing and Communication Technologies, 2014, pp. 1-6: IEEE.

T. Mandge and V. Choudhary, "A DNA encryption technique based on matrix manipulation and secure key generation scheme," in 2013 International Conference on Information Communication and Embedded Systems (ICICES), 2013, pp. 47-52: IEEE.

M. Najaftorkaman and N. S. Kazazi, "A method to encrypt information with DNA-based cryptography," International Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 4, no. 3, pp. 417-426, 2015.

R. Agrawal, M. Srivastava, and A. Sharma, "Data hiding using dictionary based substitution method in DNA sequences," in 2014 9th International Conference on Industrial and Information Systems (ICIIS), 2014, pp. 1-6: IEEE.

S. Marwan, A. Shawish, and K. Nagaty, "DNA-based cryptographic methods for data hiding in DNA media," Biosystems, vol. 150, pp. 110-118, 2016.

M. R. Abbasy and B. Shanmugam, "Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences," in 2011 IEEE World Congress on Services, 2011, pp. 385-390: IEEE.

H. Shiu, K.-L. Ng, J.-F. Fang, R. C. Lee, and C.-H. Huang, "Data hiding methods based upon DNA sequences," Information Sciences, vol. 180, no. 11, pp. 2196-2208, 2010.

A. Atito, A. Khalifa, and S. Rida, "DNA-based data encryption and hiding using playfair and insertion techniques," Journal of Communications and Computer Engineering, vol. 2, no. 3, p. 44, 2012.

R. Wazirali, Z. Chaczko, and L. Carrion, "Bio-informatics with genetic steganography technique," in Computational Intelligence and Efficiency in Engineering Systems: Springer, 2015, pp. 333-345.

Y.-H. Huang, C.-C. Chang, and C.-Y. Wu, "A DNA-based data hiding technique with low modification rates," Multimedia Tools and applications, vol. 70, no. 3, pp. 1439-1451, 2014.

M. Skariya and M. Varghese, "Enhanced double layer security using RSA over DNA based data encryption system," International Journal of Computer Science& Engineering Technology (IJCSET), vol. 4, no. 06, pp. 746-750, 2013.

C. Shyamasree and S. Anees, "Highly secure DNA-based audio steganography," in 2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013, pp. 519-524: IEEE.

E. I. A. El-Latif and M. I. Moussa, "Chaotic Information-hiding Algorithm based on DNA," International Journal of Computer Applications, vol. 122, no. 10, pp. 41-45, 2015.

A. Khalifa, A. Elhadad, and S. Hamad, "Secure blind data hiding into pseudo DNA sequences using playfair ciphering and generic complementary substitution," Appl Math, vol. 10, no. 4, pp. 1483-1492, 2016.

T. Tuncer and E. Avci, "A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images," Displays, vol. 41, pp. 1-8, 2016.

A. Khalifa and A. Atito, "High-capacity DNA-based steganography," in 2012 8th International Conference on Informatics and Systems (INFOS), 2012, pp. BIO-76-BIO-80: IEEE.

A. Majumdar, M. Sharma, and N. Kar, "An Improved Approach to Steganography using DNA Characteristics," 2014.

S. Marwan, A. Shawish, and K. Nagaty, "An Enhanced DNA-based Steganography Technique with a Higher Hiding Capacity," in Bioinformatics, 2015, pp. 150-157.

H. Liu, D. Lin, and A. Kadir, "A novel data hiding method based on deoxyribonucleic acid coding," Computers & Electrical Engineering, vol. 39, no. 4, pp. 1164-1173, 2013.

P. Das and N. Kar, "A highly secure DNA based image steganography," in 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), 2014, pp. 1-5: IEEE.

P. Das and N. Kar, "A DNA based image steganography using 2D chaotic map," in 2014 International Conference on Electronics and Communication Systems (ICECS), 2014, pp. 1-5: IEEE.

P. Das, S. Deb, N. Kar, and B. Bhattacharya, "An improved DNA based dual cover steganography," Procedia Computer Science, vol. 46, pp. 604-611, 2015.

R. M. Tank, H. D. Vasava, and V. Agrawal, "DNA-based audio steganography," Oriental journal of Computer Science and Technology, vol. 8, pp. 43-48, 2015.

S. A. M. Marwan, A. Shawish, and K. Nagaty, "Utilizing DNA Strands for Secured Data-Hiding with High Capacity," International Journal of Interactive Mobile Technologies (iJIM), vol. 11, no. 2, pp. 88-98, 2017.

F. E. Ibrahim, M. Moussa, and H. Abdalkader, "Enhancing the security of data hiding using double DNA sequences," in Industry Academia Collaboration Conference (IAC), pp. 6-8.

G. Hamed, M. Marey, S. A. El-Sayed, and M. F. Tolba, "Hybrid technique for steganography-based on DNA with n-bits binary coding rule," in 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR), 2015, pp. 95-102: IEEE.

M. R. N. Torkaman, N. S. Kazazi, and A. Rouddini, "Innovative approach to improve hybrid cryptography by using DNA steganography," International Journal on New Computer Architectures and Their Applications, vol. 202, pp. 225-236, 2012.

C. Guo, C.-C. Chang, and Z.-H. Wang, "A new data hiding scheme based on DNA sequence," Int. J. Innov. Comput. Inf. Control, vol. 8, no. 1, pp. 139-149, 2012.

S. Chakraborty and S. K. Bandyopadhyay, "Two stages data-image steganography using dna sequence," International Journal of Engineering Research and Development, vol. 2, no. 7, pp. 69-72, 2012.

B. A. Mitras and A. Abo, "Proposed steganography approach using DNA properties," international journal of information technology and business management, vol. 14, no. 1, pp. 96-102, 2013.

K. Menaka, "Message encryption using DNA sequences," in 2014 World Congress on Computing and Communication Technologies, 2014, pp. 182-184: IEEE.

M. S. Chakraborty and K. Bandyopadhyay, "Data Hiding by Image Steganography Appling DNA Sequence Arithmetic," International Journal of Advanced Information Science and Technology (IJAIST), vol. 44, p. 44, 2015.

S. Indora, "Cascaded DNA cryptography and steganography," in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, pp. 104-107: IEEE.

K. Meena, K. Menaka, and R. Subramanian, "Secure Message Transfer Using DNA Sequences," Journal of Computational Intelligence in Bioinformatics, vol. 9, no. 1, pp. 1-6, 2016.

P. Malathi, M. Manoaj, R. Manoj, V. Raghavan, and R. Vinodhini, "Highly improved DNA based steganography," Procedia Computer Science, vol. 115, pp. 651-659, 2017.

M. Yamuna and A. Elakkiya, "Amino Acids in Data Encryption," J Anal Pharm Res, vol. 2, no. 5, p. 00030, 2016.

K. Kaur, "A Double Layer Encryption Algorithm based on DNA and RSA for Security on Cloud," International Research Journal of Engineering and Technology, vol. 3, no. 03, pp. 1742-1745, 2016.




DOI: http://doi.org/10.11591/ijeecs.v21.i1.pp%25p
Total views : 12 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics