DNA Based Cryptography and Stegnography

Jeenu Clara Joseph, Saintgits College of Engineering; Ginu Alexander ,Saintgits College of Engineering; Jerin George David ,Saintgits College of Engineering; Vishnu Prasad ,Saintgits College of Engineering

Cryptography, DNA, Nucleotides, Amino Acid, Reference DNA Sequence

The most common and widely used technique in the communication security and computer security fields is cryptography. Cryptography includes converting some data to incomprehensible format so that a non-intended recipient cannot determine its intended meaning. In this project, a binary form of data, such as plaintext message transformed into sequences of DNA nucleotides. The proposed method is a two-step procedure. First it converts the text messages to a DNA format, subsequently the nucleotides are passing through a Playfair Encryption process based on amino acids structure and in the second phase hide these message in a reference DNA sequence using 3:1 hiding rule.
    [1] G. Hamed et al., “DNA Based Steganography: Survey and Analysis for Parameters Optimization,”in Applications of Intelligent Optimization in Biology and Medicine, Springer, 2015, ISSN: 1868–4394, pp. 47–89. [2] Ghada Hamed, Mohammed Marey, Safaa Amin El-Sayed Mohamed Fahmy Tolba, “Hybrid Technique for Steganography-based on DNA with N-Bits Binary Coding Rule” 2015 Seventh International Conference of Soft Computing and Pattern Recognition (SoCPaR 2015) [3] M. Skariya and M. Varghese, “Enhanced Double Layer Security usingRSA over DNA based Data Encryption System,” International Journal of Computer Science & Engineering Technology (IJCSET), ISSN: 2229–3345, vol. 4, Issue No. 06, pp. 746–750, Jun 2013. [4] Y. A. Yunus, S. Ab Rahman and J. Ibrahim,“Steganography: A Reviewof Information Security Research and Development in Muslim World,” American Journal of Engineering Research (AJER), ISSN: 2320–0936,vol. 02, Issue No. 11, pp. 122–128, 2013. [5] C. Guo, C. Change and Z. Wang, “A New Data Hiding Scheme based on DNA Sequence,” International Journal of Innovative Computing, Information and Control, ISSN: 1349–4198, vol. 8, Issue No. 1, pp. 139–149, Jan 2014. [6] I. K. Maitra, “Digital Steganalysis: Review on Recent Approaches,” Journal of Global Research in Computer Science, ISSN: 2229–371X,vol. 2, Issue No. 1, pp. 1–5, Jan 2011. [7] J. Taur, H. Lin, H. Lee and C. Tao, “Data Hiding in DNA Sequences based on Table Lookup Substitution,” International Journal of Innovative Computing, Information and Control, ISSN: 1349–4198, vol. 8, IssueNo. 10, pp. 6585–6598, Oct. 2012. [8] A. Atito, A. Khalifa and S. Z. Rida, “DNA-based Data Encryption and Hiding using Playfair and Insertion Techniques,” Journal of Communications and Computer Engineering, ISSN: 2090–6234, vol. 2, Issue No. 3, pp. 44–49, 2012. [9] A. K. Kaundal and A. K. Verma, “DNA based Cryptography: A Review,”International Journal of Information and Computation Technology, ISSN: 0974–2239, vol. 04, Issue No. 7, pp. 693–698, 2014. [10] H.J. Shiu, K.L. Ng, J.F. Fang, R.C.T. lee and C.H. Huang, “Data Hiding Methods based upon DNA Sequences,” Journal of Information Sciences: an International Journal, vol. 180, Issue No. 11, pp. 2196–208, June 2010. [11] A. Khalifa and A. Atito, “High-Capacity DNA-based Steganography,” in Informatics and Systems (INFOS), 8th International Conference on 2012, May 2012, pp. BIO–76. [12] M. Sabry, M. Hashem, T.Nazmy and M. E. Khalifa, “A DNA and Amino Acids-based Implementation of Playfair Cipher,” International Journal of Computer Science and Information Security, ISSN: 1947–5500, vol. 8, Issue No. 3, pp. 129–136, 2010. [13] A. Khalifa, “LSBase: A key Encapsulation Scheme to Improve Hybrid Crypto-systems using DNA Steganography,” in 8th International Conference on Computer Engineering & Systems (ICCES), Cairo, Egypt,Nov. 2013, pp. 105–110. [14] NCBI Database, Bank for real DNA reference sequences, http://www.ncbi.nlm.nih.gov/
Paper ID: GRDJEV02I060157
Published in: Volume : 2, Issue : 6
Publication Date: 2017-06-01
Page(s): 249 - 253