Skip to main content

DNA Based Steganography: Survey and Analysis for Parameters Optimization

  • Chapter
  • First Online:

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 96))

Abstract

Nowadays, cryptography and steganography are considered the most famous and secured techniques used in the security field. This chapter introduces a survey on the recent DNA based steganography algorithms that use the DNA as a carrier to enable safe transfer of the critical data over the unsecure network. Some of the recent data hiding techniques based on DNA will be discussed with the main differences between them with respect to some important security parameters such as cracking probability, indicating the algorithm’s strength and weakness. However, some of these techniques do not include the computation of the cracking probability, so each of them will be reviewed and then further analyzed to compute its cracking probability. Then, the issues and the problems in these algorithms are presented and discussed with proposing some solutions and recommendations for achieving optimization in the DNA based steganography field.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Abbasy, M.R., Nikfard, P., Ordi, A., Torkaman, M.R.N.: DNA base data hiding algorithm. Int. J. New Comput. Architect. Appl. 2, 183–192 (2012)

    Google Scholar 

  2. Alberts, B., Bray, D., Lewis, J., Raff, M., Roberts, K., Watson, J.D.: Molecular Biology of the Cell. Garland, New York (1994)

    Google Scholar 

  3. Alia, M.A., Yahya, A.A.: Public key steganography based on matching method. Eur. J. Sci. Res. 40, 223–231 (2010)

    Google Scholar 

  4. Amin, M.M., Salleh, M., Ibrahim, S., Katmin, M.R., Shamsuddin, M.Z.I.: Information hiding using steganography. In: 4th National Conference on Telecommunication Technology Proceedings, IEEE, Malaysia (2003)

    Google Scholar 

  5. Amin, S.T., Saeb, M., El-Gindi, S.: A DNA-based implementation of YAEA encryption algorithm. In: Computational Intelligence, pp. 120–125 (2006)

    Google Scholar 

  6. Atito, A., Khalifa, A., Rida, S.Z.: DNA-based data encryption and hiding using playfair and insertion techniques. J. Commun. Comput. Eng. 2, 44–49 (2012)

    Google Scholar 

  7. Bashier, E., Ahmed, G., Othman, H.A., Shappo, R.: Hiding secret messages using artificial DNA sequences generated by integer chaotic Maps. Int. J. Comput. Appl. 70, 1–5 (2013)

    Google Scholar 

  8. Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177, 2768–2786 (2007)

    Article  Google Scholar 

  9. Chang, C.C., Wu, W.C., Chen, Y.H.: Joint coding and embedding techniques for multimedia images. Inf. Sci. 178, 3543–3556 (2008)

    Article  Google Scholar 

  10. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Proces. 90, 727–752 (2010)

    Google Scholar 

  11. Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399, 533–534 (1999)

    Article  Google Scholar 

  12. Cui, G.Z., Liu, Y., Zhang, X.: New direction of data storage: DNA molecular storage technology. Comput. Eng. Appl. 42, 29–32 (2006)

    Google Scholar 

  13. Das, S., Das, S., Bandyopadhyay, B., Sanyal, S.: Steganography and Steganalysis: different approaches. arXiv preprint arXiv:1111.3758 (2011)

  14. Gehani, A., LaBean, T., Reif, J.: DNA-based cryptography. In: Aspects of Molecular Computing, Springer, Berlin, Heidelberg, New York (2004)

    Google Scholar 

  15. Ghosh, A., Bansal, M.: A glossary of DNA structures from A to Z. Acta Crystallogr. Sect D: Biol. Crystallogr. 59, 620–626 (2003)

    Article  Google Scholar 

  16. Guo, C., Chang, C.C., Wang, Z.H.: A new data hiding scheme based on DNA sequence. Int. J. Innov. Comput. Inf. Control 8, 1–11 (2012)

    Google Scholar 

  17. Huang, C.H., Wu, J.L.: Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes. Inf. Sci. 179, 791–808 (2009)

    Article  Google Scholar 

  18. Jain, S., Bhatnagar, V.: Analogy of various DNA based security algorithms using cryptography and steganography. In: International Conference on Issues and Challenges in Intelligent Computing Techniques, IEEE (2014)

    Google Scholar 

  19. Khalifa, A.: LSBase: a key encapsulation scheme to improve hybrid crypto-systems using DNA steganography. In: 8th International Conference on Computer Engineering and Systems, IEEE (2013)

    Google Scholar 

  20. Khalifa, A., Atito, A.: High-capacity DNA-based steganography. In: 8th International Conference on Informatics and Systems, IEEE (2012)

    Google Scholar 

  21. Kaundal, A.K., Verma, A.K.: DNA based cryptography: a review. Int. J. Inf. Comput. Technol. 4, 693–698 (2014)

    Google Scholar 

  22. Kayarkar, H., Sanyal, S.: A survey on various data hiding techniques and their comparative analysis. arXiv preprint arXiv:1206.1957, vol. 5, pp. 35–40 (2012)

  23. Kencl, L., Loebl, M.: DNA-inspired information concealing: a survey. Comput. Sci. Rev. 4, 251–262 (2010)

    Article  MATH  Google Scholar 

  24. Leier, A., Richter, C., Banzhaf, W., Rauhe, H.: Cryptography with DNA binary strands: a survey. BioSystems 57, 13–22 (2000)

    Article  Google Scholar 

  25. Liu, H., Lin, D., Kadir, A.: A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39, 1164–1173 (2013)

    Article  Google Scholar 

  26. Maitra, I.K., Nag, S., Datta, B., Bandyopadhyay, S.K.: Digital steganalysis: review on recent approaches. J. Global Res. Comput. Sci. 2, 1–5 (2011)

    Article  Google Scholar 

  27. Mandge, T., Choudhary, V.: A DNA encryption technique based on matrix manipulation and secure key generation scheme. In: International Conference on Information Communication and Embedded Systems, IEEE, pp. 47–52 (2013)

    Google Scholar 

  28. Mitras, B.A., Aboo, A.K.: Proposed steganography approach using DNA properties. Int. J. Inf. Technol. Bus. Manag. 14, 96–102 (2012)

    Google Scholar 

  29. Mohapatra, P.K.: Public key cryptography. Crossroads 7, 14–22 (2000)

    Article  Google Scholar 

  30. Nelson, D.L., Lehninger, A.L., Cox, M.M.: Lehninger Principles of Biochemistry. Macmillan (2008)

    Google Scholar 

  31. Peterson, I.: Hiding in DNA. In: Proceedings of Muse (2001)

    Google Scholar 

  32. Petitcolas, F.A., Anderson, R.J., Kuhn, M.G.: Information hiding—a survey. Proc. IEEE 87, 1062–1078 (1999)

    Article  Google Scholar 

  33. Sabry, M., Hashem, M., Nazmy, T.: Khalifa: a DNA and amino acids-based implementation of playfair cipher. Int. J. Comput. Sci. Inf. Secur. 8, 129–136 (2010)

    Google Scholar 

  34. Schena, M.: Microarray analysis. Wiley-Liss, New York (2003)

    Google Scholar 

  35. Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C. ISBN (hardcover) 0-471-12845-7, ISBN (paperback) 0-471-59756-2 (1996)

    Google Scholar 

  36. Sharma, M.K., Upadhyaya, A., Agarwal, S.: Adaptive steganographic algorithm using cryptographic encryption RSA algorithms. J. Eng. Comput. Appl. Sci. 2, 1–3 (2013)

    MATH  Google Scholar 

  37. Shimanovsky, B., Feng, J., Potkonjak, M.: Hiding data in DNA. In: Information Hiding, Springer, Berlin, Heidelberg, New York (2003)

    Google Scholar 

  38. Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C., Huang, C.H.: Data hiding methods based upon DNA sequences. Inf. Sci. 180, 2196–2208 (2010)

    Article  MathSciNet  Google Scholar 

  39. Siper, A., Farley, R., Lombardo, C.: The rise of steganography. In: Proceedings of Student/Faculty Research Day, CSIS, Pace University (2010)

    Google Scholar 

  40. Skariya, M., Varghese, M.: Enhanced double layer security using RSA over DNA based data encryption system. Int. J. Comput. Sci. Eng. Technol. 4, 746–750 (2013)

    Google Scholar 

  41. Taur, J.S., Lin, H.Y., Lee, H.L., Tao, C.W.: Data hiding in DNA sequences based on table lookup substitution. Int. J. Innov. Comput. Inf. Control 8, 6585–6598 (2012)

    Google Scholar 

  42. Torkaman, M.R.N., Kazazi, N.S., Rouddini, A.: Innovative approach to improve hybrid cryptography by using DNA steganography. Int. J. New Comput. Archit. Appl. 2, 224–235 (2012)

    Google Scholar 

  43. Tsai, H.H., Sun, D.W.: Color image watermark extraction based on support vector machines. Inf. Sci. 177, 550–569 (2007)

    Article  Google Scholar 

  44. Tseng, H.W., Hsieh, C.P.: Prediction-based reversible data hiding. Inf. Sci. 179, 2460–2469 (2009)

    Article  MATH  Google Scholar 

  45. Vanstone, S.A., Menezes, A.J., Oorschot, P.C.: Handbook of applied cryptography. XP-002250459, vol. 553 (1996)

    Google Scholar 

  46. Wang, Z., Zhao, X., Wang, H., Cui, G.: Information hiding based on DNA steganography. In: 4th International Conference on Software Engineering and Service Science, IEEE (2013)

    Google Scholar 

  47. Watson, J.D.: Molecular biology of the gene, 2/E. Molecular biology of the gene (1970)

    Google Scholar 

  48. White, A., Handler, P., Smith, E., Stetten Jr, D.: Principles of biochemistry, 2/E. Principles of Biochemistry (1959)

    Google Scholar 

  49. William, S., Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)

    Google Scholar 

  50. Yang, J., Lin, W., Lu, T.: An approach to prove confidentiality of cryptographic protocols with non-atomic keys. In: World Automation Congress (2012)

    Google Scholar 

  51. Yunus, Y.A., Ab Rahman, S., Ibrahim, J.: Steganography: a review of information security research and development in muslim world. Am. J. Eng. Res. 179, 122–128 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ghada Hamed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Hamed, G., Marey, M., El-Sayed, S., Tolba, F. (2016). DNA Based Steganography: Survey and Analysis for Parameters Optimization. In: Hassanien, AE., Grosan, C., Fahmy Tolba, M. (eds) Applications of Intelligent Optimization in Biology and Medicine. Intelligent Systems Reference Library, vol 96. Springer, Cham. https://doi.org/10.1007/978-3-319-21212-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21212-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21211-1

  • Online ISBN: 978-3-319-21212-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics