Abstract
Nowadays, cryptography and steganography are considered the most famous and secured techniques used in the security field. This chapter introduces a survey on the recent DNA based steganography algorithms that use the DNA as a carrier to enable safe transfer of the critical data over the unsecure network. Some of the recent data hiding techniques based on DNA will be discussed with the main differences between them with respect to some important security parameters such as cracking probability, indicating the algorithm’s strength and weakness. However, some of these techniques do not include the computation of the cracking probability, so each of them will be reviewed and then further analyzed to compute its cracking probability. Then, the issues and the problems in these algorithms are presented and discussed with proposing some solutions and recommendations for achieving optimization in the DNA based steganography field.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Abbasy, M.R., Nikfard, P., Ordi, A., Torkaman, M.R.N.: DNA base data hiding algorithm. Int. J. New Comput. Architect. Appl. 2, 183–192 (2012)
Alberts, B., Bray, D., Lewis, J., Raff, M., Roberts, K., Watson, J.D.: Molecular Biology of the Cell. Garland, New York (1994)
Alia, M.A., Yahya, A.A.: Public key steganography based on matching method. Eur. J. Sci. Res. 40, 223–231 (2010)
Amin, M.M., Salleh, M., Ibrahim, S., Katmin, M.R., Shamsuddin, M.Z.I.: Information hiding using steganography. In: 4th National Conference on Telecommunication Technology Proceedings, IEEE, Malaysia (2003)
Amin, S.T., Saeb, M., El-Gindi, S.: A DNA-based implementation of YAEA encryption algorithm. In: Computational Intelligence, pp. 120–125 (2006)
Atito, A., Khalifa, A., Rida, S.Z.: DNA-based data encryption and hiding using playfair and insertion techniques. J. Commun. Comput. Eng. 2, 44–49 (2012)
Bashier, E., Ahmed, G., Othman, H.A., Shappo, R.: Hiding secret messages using artificial DNA sequences generated by integer chaotic Maps. Int. J. Comput. Appl. 70, 1–5 (2013)
Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177, 2768–2786 (2007)
Chang, C.C., Wu, W.C., Chen, Y.H.: Joint coding and embedding techniques for multimedia images. Inf. Sci. 178, 3543–3556 (2008)
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Proces. 90, 727–752 (2010)
Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399, 533–534 (1999)
Cui, G.Z., Liu, Y., Zhang, X.: New direction of data storage: DNA molecular storage technology. Comput. Eng. Appl. 42, 29–32 (2006)
Das, S., Das, S., Bandyopadhyay, B., Sanyal, S.: Steganography and Steganalysis: different approaches. arXiv preprint arXiv:1111.3758 (2011)
Gehani, A., LaBean, T., Reif, J.: DNA-based cryptography. In: Aspects of Molecular Computing, Springer, Berlin, Heidelberg, New York (2004)
Ghosh, A., Bansal, M.: A glossary of DNA structures from A to Z. Acta Crystallogr. Sect D: Biol. Crystallogr. 59, 620–626 (2003)
Guo, C., Chang, C.C., Wang, Z.H.: A new data hiding scheme based on DNA sequence. Int. J. Innov. Comput. Inf. Control 8, 1–11 (2012)
Huang, C.H., Wu, J.L.: Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes. Inf. Sci. 179, 791–808 (2009)
Jain, S., Bhatnagar, V.: Analogy of various DNA based security algorithms using cryptography and steganography. In: International Conference on Issues and Challenges in Intelligent Computing Techniques, IEEE (2014)
Khalifa, A.: LSBase: a key encapsulation scheme to improve hybrid crypto-systems using DNA steganography. In: 8th International Conference on Computer Engineering and Systems, IEEE (2013)
Khalifa, A., Atito, A.: High-capacity DNA-based steganography. In: 8th International Conference on Informatics and Systems, IEEE (2012)
Kaundal, A.K., Verma, A.K.: DNA based cryptography: a review. Int. J. Inf. Comput. Technol. 4, 693–698 (2014)
Kayarkar, H., Sanyal, S.: A survey on various data hiding techniques and their comparative analysis. arXiv preprint arXiv:1206.1957, vol. 5, pp. 35–40 (2012)
Kencl, L., Loebl, M.: DNA-inspired information concealing: a survey. Comput. Sci. Rev. 4, 251–262 (2010)
Leier, A., Richter, C., Banzhaf, W., Rauhe, H.: Cryptography with DNA binary strands: a survey. BioSystems 57, 13–22 (2000)
Liu, H., Lin, D., Kadir, A.: A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39, 1164–1173 (2013)
Maitra, I.K., Nag, S., Datta, B., Bandyopadhyay, S.K.: Digital steganalysis: review on recent approaches. J. Global Res. Comput. Sci. 2, 1–5 (2011)
Mandge, T., Choudhary, V.: A DNA encryption technique based on matrix manipulation and secure key generation scheme. In: International Conference on Information Communication and Embedded Systems, IEEE, pp. 47–52 (2013)
Mitras, B.A., Aboo, A.K.: Proposed steganography approach using DNA properties. Int. J. Inf. Technol. Bus. Manag. 14, 96–102 (2012)
Mohapatra, P.K.: Public key cryptography. Crossroads 7, 14–22 (2000)
Nelson, D.L., Lehninger, A.L., Cox, M.M.: Lehninger Principles of Biochemistry. Macmillan (2008)
Peterson, I.: Hiding in DNA. In: Proceedings of Muse (2001)
Petitcolas, F.A., Anderson, R.J., Kuhn, M.G.: Information hiding—a survey. Proc. IEEE 87, 1062–1078 (1999)
Sabry, M., Hashem, M., Nazmy, T.: Khalifa: a DNA and amino acids-based implementation of playfair cipher. Int. J. Comput. Sci. Inf. Secur. 8, 129–136 (2010)
Schena, M.: Microarray analysis. Wiley-Liss, New York (2003)
Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C. ISBN (hardcover) 0-471-12845-7, ISBN (paperback) 0-471-59756-2 (1996)
Sharma, M.K., Upadhyaya, A., Agarwal, S.: Adaptive steganographic algorithm using cryptographic encryption RSA algorithms. J. Eng. Comput. Appl. Sci. 2, 1–3 (2013)
Shimanovsky, B., Feng, J., Potkonjak, M.: Hiding data in DNA. In: Information Hiding, Springer, Berlin, Heidelberg, New York (2003)
Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C., Huang, C.H.: Data hiding methods based upon DNA sequences. Inf. Sci. 180, 2196–2208 (2010)
Siper, A., Farley, R., Lombardo, C.: The rise of steganography. In: Proceedings of Student/Faculty Research Day, CSIS, Pace University (2010)
Skariya, M., Varghese, M.: Enhanced double layer security using RSA over DNA based data encryption system. Int. J. Comput. Sci. Eng. Technol. 4, 746–750 (2013)
Taur, J.S., Lin, H.Y., Lee, H.L., Tao, C.W.: Data hiding in DNA sequences based on table lookup substitution. Int. J. Innov. Comput. Inf. Control 8, 6585–6598 (2012)
Torkaman, M.R.N., Kazazi, N.S., Rouddini, A.: Innovative approach to improve hybrid cryptography by using DNA steganography. Int. J. New Comput. Archit. Appl. 2, 224–235 (2012)
Tsai, H.H., Sun, D.W.: Color image watermark extraction based on support vector machines. Inf. Sci. 177, 550–569 (2007)
Tseng, H.W., Hsieh, C.P.: Prediction-based reversible data hiding. Inf. Sci. 179, 2460–2469 (2009)
Vanstone, S.A., Menezes, A.J., Oorschot, P.C.: Handbook of applied cryptography. XP-002250459, vol. 553 (1996)
Wang, Z., Zhao, X., Wang, H., Cui, G.: Information hiding based on DNA steganography. In: 4th International Conference on Software Engineering and Service Science, IEEE (2013)
Watson, J.D.: Molecular biology of the gene, 2/E. Molecular biology of the gene (1970)
White, A., Handler, P., Smith, E., Stetten Jr, D.: Principles of biochemistry, 2/E. Principles of Biochemistry (1959)
William, S., Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)
Yang, J., Lin, W., Lu, T.: An approach to prove confidentiality of cryptographic protocols with non-atomic keys. In: World Automation Congress (2012)
Yunus, Y.A., Ab Rahman, S., Ibrahim, J.: Steganography: a review of information security research and development in muslim world. Am. J. Eng. Res. 179, 122–128 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Hamed, G., Marey, M., El-Sayed, S., Tolba, F. (2016). DNA Based Steganography: Survey and Analysis for Parameters Optimization. In: Hassanien, AE., Grosan, C., Fahmy Tolba, M. (eds) Applications of Intelligent Optimization in Biology and Medicine. Intelligent Systems Reference Library, vol 96. Springer, Cham. https://doi.org/10.1007/978-3-319-21212-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-21212-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21211-1
Online ISBN: 978-3-319-21212-8
eBook Packages: EngineeringEngineering (R0)