skip to main content
10.1145/3440749.3442644acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

A Robust Double Layer Steganography Technique Based on DNA Sequences

Published:13 May 2021Publication History

ABSTRACT

Security of information while transmitting between parties is an essential factor. The openness of the network increases the possibility of attacking information. Cryptography and steganography are the most significant methods that achieve secrecy. These mechanisms are different from each other, but both maintain data security, confidentiality, and integrity. A combination of cryptography and steganography or a combination of the same method leads to a secure data transmission by providing a multilevel of security. This paper aims to provide a new technique that focuses on achieving secrecy for data and robustness against attacks. The technique relies on the multilevel steganography approach by encrypting the data and then hiding it using an image-based and DNA-based steganography techniques.

References

  1. Abdullah Al-Mamun, Shawon Rahman, Tanvir Ahmed Shaon, and Md Alam Hossain. 2017. Security analysis of AES and enhancing its security by modifying S-box with an additional byte. International Journal of Computer Networks & Communications (IJCNC) 9, 2(2017).Google ScholarGoogle Scholar
  2. Alaa A Jabbar Altaay, Shahrin Bin Sahib, and Mazdak Zamani. 2012. An introduction to image steganography techniques. In 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 122–126.Google ScholarGoogle Scholar
  3. Prasenjit Das, Subhrajyoti Deb, Nirmalya Kar, and Baby Bhattacharya. 2015. An improved DNA based dual cover steganography. Procedia Computer Science 46 (2015), 604–611.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Mansoor Ebrahim, Shujaat Khan, and Umer Bin Khalid. 2014. Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398(2014).Google ScholarGoogle Scholar
  5. Oleg O Evsutin, Anna S Melman, and Roman V Meshcheryakov. 2020. Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access (2020).Google ScholarGoogle Scholar
  6. Cheng Guo, Chin-Chen Chang, and Zhi-Hui Wang. 2012. A new data hiding scheme based on DNA sequence. Int. J. Innov. Comput. Inf. Control 8, 1 (2012), 139–149.Google ScholarGoogle Scholar
  7. Ghada Hamed, Mohammed Marey, Safaa Amin El-Sayed, and Mohamed Fahmy Tolba. 2016. Comparative study for various DNA based steganography techniques with the essential conclusions about the future research. In 2016 11th International Conference on Computer Engineering & Systems (ICCES). IEEE, 220–225.Google ScholarGoogle ScholarCross RefCross Ref
  8. Ali K Hmood, BB Zaidan, AA Zaidan, and Hamid A Jalab. 2010. An overview on hiding information technique in images. JApSc 10, 18 (2010), 2094–2100.Google ScholarGoogle Scholar
  9. Mehdi Hussain and Mureed Hussain. 2013. A survey of image steganography techniques. (2013).Google ScholarGoogle Scholar
  10. Sumeet Kaur, Savina Bansal, and Rakesh K Bansal. 2014. Steganography and classification of image steganography techniques. In 2014 International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 870–875.Google ScholarGoogle ScholarCross RefCross Ref
  11. KB Logunleko, OD Adeniji, and AM Logunleko. 2020. A comparative study of symmetric cryptography mechanism on DES, AES and EB64 for information security. Int. J. Sci. Res. in Computer Science and Engineering Vol 8, 1(2020).Google ScholarGoogle Scholar
  12. Pa Malathi, Ma Manoaj, Ra Manoj, Vaikunth Raghavan, and RE Vinodhini. 2017. Highly improved DNA based steganography. Procedia Computer Science 115 (2017), 651–659.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jiafa Mao, Yanhong Huang, Xinxin Niu, Gang Xiao, Linan Zhu, and Weiguo Sheng. 2016. A method to estimate the steganographic capacity in dct domain based on mcuu model. Wuhan University Journal of Natural Sciences 21, 4 (2016), 283–290.Google ScholarGoogle ScholarCross RefCross Ref
  14. Samiha Abdelrahman Mohammed Marwan, Ahmed Shawish, and Khaled Nagaty. 2017. Utilizing DNA Strands for Secured Data-Hiding with High Capacity. International Journal of Interactive Mobile Technologies (iJIM) 11, 2(2017), 88–98.Google ScholarGoogle Scholar
  15. Tayana Morkel 2013. Image steganography applications for secure communication. Ph.D. Dissertation. University of Pretoria.Google ScholarGoogle Scholar
  16. Sudipta Roy, Siddharth Sadhukhan, Shayak Sadhu, and SK Bandyopadhyay. 2015. A novel approach towards development of hybrid image steganography using DNA sequences. Indian Journal of Science and Technology 8, 22 (2015), 1.Google ScholarGoogle ScholarCross RefCross Ref
  17. HJ Shiu, Ka-Lok Ng, Jywe-Fei Fang, Richard CT Lee, and Chien-Hung Huang. 2010. Data hiding methods based upon DNA sequences. Information Sciences 180, 11 (2010), 2196–2208.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mustafa Sabah Taha, Mohd Shafry Mohd Rahim, Sameer Abdulsattar Lafta, Mohammed Mahdi Hashim, and Hassanain Mahdi Alzuabidi. 2019. Combination of steganography and cryptography: A short survey. In IOP conference series: materials science and engineering, Vol. 518. IOP Publishing, 052003.Google ScholarGoogle ScholarCross RefCross Ref
  19. Türker Tuncer and Engin Avci. 2016. A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images. Displays 41(2016), 1–8.Google ScholarGoogle ScholarCross RefCross Ref
  20. RE Vinodhini and P Malathi. 2018. DNA based image steganography. In Computational Vision and Bio Inspired Computing. Springer, 819–829.Google ScholarGoogle Scholar
  21. RE Vinodhini, P Malathi, and T Gireesh Kumar. 2017. A survey on DNA and image steganography. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 1–7.Google ScholarGoogle ScholarCross RefCross Ref
  22. Zhijun Wu. 2014. Information Hiding in Speech Signals for Secure Communication. Syngress.Google ScholarGoogle Scholar

Index Terms

  1. A Robust Double Layer Steganography Technique Based on DNA Sequences
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICFNDS '20: Proceedings of the 4th International Conference on Future Networks and Distributed Systems
            November 2020
            313 pages
            ISBN:9781450388863
            DOI:10.1145/3440749

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 13 May 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)12
            • Downloads (Last 6 weeks)1

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format