Abstract
Biological systems have been a rich source of stimulation for computer security specialists. A wide number of approaches have been proposed over the last decade for encoding data using deoxyribo nucleic acid (DNA), giving rise to the developing area of DNA data hiding. In this work, a new data hiding technique based upon DNA characteristic have been developed. DNA matrix has been used to represent the secret message. After that DNA matrix converted to Quick Response (QR) representation that offers a broad scope of practical usage. In addition, the paper provides an idea of choosing the optimal locations of the QR in order to obtain rightmost position. A new system based on the genetic algorithm has been developed. Finally, we embed the QR codes into the most appropriate location by applying the Haar Wavelet technique on the resulting DNA signals and LSB with assist of the GA in order to reduce the error between the cover image and the stego image. Experimental results have presented a high PSNR which indicate a high level of quality in stego-image with high capacity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adleman, L.: Computing with DNA: the manipulation of DNA to solve mathematical problems is redefining what is meant by computation. Sci. Am. (1998)
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)
Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In: 3rd International Conference on Bio-Inspired Computing: Theories and Applications, September 2008. 37–42
Dan Boneh, J.S., Dunworth, C., Lipton, R.J.: On the computational power of DNA. Discret. Appl. Math. 71, 79–94 (1995)
Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in scale images. IEEE Multimed. 8, 22–28 (2001)
Guo, C., Chang, C.-C., Wang, Z.-H.: A new data hiding scheme based on DNA sequence. Int. J. Innov. Comput. Inf. Control 8(1), 139–149 (2012)
Holland, J.: Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence [Paperback]. MIT Press, Cambridge (1992)
Kari, L.: From Micro-soft to Bio-soft: computing with DNA. World Sci. 1642, 1–20 (1997)
Kumar D., Singh S.: Secret data writing using DNA sequences. In: 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), April 2011, pp. 402–405 (2011)
Leier, A., Richter, C., Banzhaf, W., Rauhe, H.: Cryptography with DNA binary strands. Biosystems 57(1), 13–22 (2000)
Magdy, A., Saeb, M., Mohamed, A.B., Khadragi, A.: Haar wavelet transform of the signal representation of DNA sequences. Haar Wavelet Transform of the Signal Representation of DNA Sequences, p. 1 (2011)
Mousa, H., Moustafa, K., Abdel-wahed, W., Hadhoud, M.: Data hiding based on contrast mapping using DNA medium, 8(2), (2011)
Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A digital watermark (1994)
Shiu, H., Ng, K., Fang, J., Lee, R., Huang, C.: Data hiding methods based upon DNA sequences. Inf. Sci. 180(11), 2196–2208 (2010)
Wang, X., Zhang, Q.: DNA computing-based cryptography. In: 2009 Fourth International on Conference on Bio-Inspired Computing, October 2009, pp. 1–3 (2009)
Wayner, P.: Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2002)
Wazirali, R.A., Chaczko, Z., Kale, A.: Digital Multimedia Archiving Based on Optimization Steganography System. IEEE (2014)
Wu, Y.-T., Shih, F.Y.: Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Trans. Syst., Man, Cybern. Part B, Cybern.: Publ. IEEE Syst., Man, Cybern. Soc., 36(1):24–31 Febuary 2006
Xiao, G., Lu, M., Qin, L., Lai, X.: New field of cryptography: DNA cryptography. Chin. Sci. Bull. 51(12), 1413–1420 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Wazirali, R., Chaczko, Z., Carrion, L. (2015). Bio-informatics with Genetic Steganography Technique. In: Borowik, G., Chaczko, Z., Jacak, W., Łuba, T. (eds) Computational Intelligence and Efficiency in Engineering Systems. Studies in Computational Intelligence, vol 595. Springer, Cham. https://doi.org/10.1007/978-3-319-15720-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-15720-7_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15719-1
Online ISBN: 978-3-319-15720-7
eBook Packages: EngineeringEngineering (R0)