ABSTRACT
Security of information while transmitting between parties is an essential factor. The openness of the network increases the possibility of attacking information. Cryptography and steganography are the most significant methods that achieve secrecy. These mechanisms are different from each other, but both maintain data security, confidentiality, and integrity. A combination of cryptography and steganography or a combination of the same method leads to a secure data transmission by providing a multilevel of security. This paper aims to provide a new technique that focuses on achieving secrecy for data and robustness against attacks. The technique relies on the multilevel steganography approach by encrypting the data and then hiding it using an image-based and DNA-based steganography techniques.
- Abdullah Al-Mamun, Shawon Rahman, Tanvir Ahmed Shaon, and Md Alam Hossain. 2017. Security analysis of AES and enhancing its security by modifying S-box with an additional byte. International Journal of Computer Networks & Communications (IJCNC) 9, 2(2017).Google Scholar
- Alaa A Jabbar Altaay, Shahrin Bin Sahib, and Mazdak Zamani. 2012. An introduction to image steganography techniques. In 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 122–126.Google Scholar
- Prasenjit Das, Subhrajyoti Deb, Nirmalya Kar, and Baby Bhattacharya. 2015. An improved DNA based dual cover steganography. Procedia Computer Science 46 (2015), 604–611.Google ScholarDigital Library
- Mansoor Ebrahim, Shujaat Khan, and Umer Bin Khalid. 2014. Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398(2014).Google Scholar
- Oleg O Evsutin, Anna S Melman, and Roman V Meshcheryakov. 2020. Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access (2020).Google Scholar
- Cheng Guo, Chin-Chen Chang, and Zhi-Hui Wang. 2012. A new data hiding scheme based on DNA sequence. Int. J. Innov. Comput. Inf. Control 8, 1 (2012), 139–149.Google Scholar
- Ghada Hamed, Mohammed Marey, Safaa Amin El-Sayed, and Mohamed Fahmy Tolba. 2016. Comparative study for various DNA based steganography techniques with the essential conclusions about the future research. In 2016 11th International Conference on Computer Engineering & Systems (ICCES). IEEE, 220–225.Google ScholarCross Ref
- Ali K Hmood, BB Zaidan, AA Zaidan, and Hamid A Jalab. 2010. An overview on hiding information technique in images. JApSc 10, 18 (2010), 2094–2100.Google Scholar
- Mehdi Hussain and Mureed Hussain. 2013. A survey of image steganography techniques. (2013).Google Scholar
- Sumeet Kaur, Savina Bansal, and Rakesh K Bansal. 2014. Steganography and classification of image steganography techniques. In 2014 International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 870–875.Google ScholarCross Ref
- KB Logunleko, OD Adeniji, and AM Logunleko. 2020. A comparative study of symmetric cryptography mechanism on DES, AES and EB64 for information security. Int. J. Sci. Res. in Computer Science and Engineering Vol 8, 1(2020).Google Scholar
- Pa Malathi, Ma Manoaj, Ra Manoj, Vaikunth Raghavan, and RE Vinodhini. 2017. Highly improved DNA based steganography. Procedia Computer Science 115 (2017), 651–659.Google ScholarDigital Library
- Jiafa Mao, Yanhong Huang, Xinxin Niu, Gang Xiao, Linan Zhu, and Weiguo Sheng. 2016. A method to estimate the steganographic capacity in dct domain based on mcuu model. Wuhan University Journal of Natural Sciences 21, 4 (2016), 283–290.Google ScholarCross Ref
- Samiha Abdelrahman Mohammed Marwan, Ahmed Shawish, and Khaled Nagaty. 2017. Utilizing DNA Strands for Secured Data-Hiding with High Capacity. International Journal of Interactive Mobile Technologies (iJIM) 11, 2(2017), 88–98.Google Scholar
- Tayana Morkel 2013. Image steganography applications for secure communication. Ph.D. Dissertation. University of Pretoria.Google Scholar
- Sudipta Roy, Siddharth Sadhukhan, Shayak Sadhu, and SK Bandyopadhyay. 2015. A novel approach towards development of hybrid image steganography using DNA sequences. Indian Journal of Science and Technology 8, 22 (2015), 1.Google ScholarCross Ref
- HJ Shiu, Ka-Lok Ng, Jywe-Fei Fang, Richard CT Lee, and Chien-Hung Huang. 2010. Data hiding methods based upon DNA sequences. Information Sciences 180, 11 (2010), 2196–2208.Google ScholarDigital Library
- Mustafa Sabah Taha, Mohd Shafry Mohd Rahim, Sameer Abdulsattar Lafta, Mohammed Mahdi Hashim, and Hassanain Mahdi Alzuabidi. 2019. Combination of steganography and cryptography: A short survey. In IOP conference series: materials science and engineering, Vol. 518. IOP Publishing, 052003.Google ScholarCross Ref
- Türker Tuncer and Engin Avci. 2016. A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images. Displays 41(2016), 1–8.Google ScholarCross Ref
- RE Vinodhini and P Malathi. 2018. DNA based image steganography. In Computational Vision and Bio Inspired Computing. Springer, 819–829.Google Scholar
- RE Vinodhini, P Malathi, and T Gireesh Kumar. 2017. A survey on DNA and image steganography. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 1–7.Google ScholarCross Ref
- Zhijun Wu. 2014. Information Hiding in Speech Signals for Secure Communication. Syngress.Google Scholar
Index Terms
- A Robust Double Layer Steganography Technique Based on DNA Sequences
Recommendations
Multi-bit robust image steganography based on modular arithmetic
The main objective is to design a robust algorithm which can hide multiple target bits without direct replacement of the bits of cover image and at the same time maintain perceptibility of carrier medium by reducing the distortion rate by intensity ...
An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method
We improve the quality and provide an acceptable payload using NVF.NVF estimates each area's complexity to embed more data in complex areas.The secret image security is ensured by an optimal chaotic based encryption scheme.An optimal secret key is found ...
Cover Image Selection Technique for Secured LSB-based Image Steganography
ACAI '18: Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial IntelligenceVarious researches in image steganography focusing on spatial domain specifically in the least Significant Bit (LSB) embedding method had been conducted to improve the embedding capacity while maintaining high imperceptibility. However, these ...
Comments