DNA-Based LSB Steganography

DNA-Based LSB Steganography

Abdelkader Khobzaoui, Boualem Mansouri, Kadda Benyahia
DOI: 10.4018/IJSPPC.302010
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The integrity and confidentiality of transmitted data are the main requirements of any data security system. To achieve these goals, many techniques have been developed, including cryptography and steganography. Recently, DNA-based steganography has emerged as a very powerful and promising approach to ensure the safety of sensitive information transmitted over an untrusted channel. In this paper, a two-level encryption/decryption scheme combining cryptography and steganography is proposed. First, the plain-text is concealed in a cover image by scattering its letters over randomly selected pixels. Then, the modified image is encrypted by encoding its pixels in a DNA sequence using a symmetric key. Simulations have shown that the proposed scheme is more robust than any other system based on standalone techniques and requires less computing resources.
Article Preview
Top

1. Introduction

Various approaches and techniques have been proposed to preserve the confidentiality, integrity and availability of sensitive data. Techniques based on cryptography and steganography are the most extensively investigated and developed.in cryptography, information is converted into some scrambled messages, using mathematical and logic concepts, and then transmitted over an untrustworthy media. The encryption process takes plaintext (message to send) as input and generates ciphertext(encrypted message) as output by using a secret key and encryption algorithm. In order to recovering an encrypted message back to its original format, the receiver apply a decryption algorithm on the ciphertext using decryption key as shown in figure 1.

Figure 1.

Encryption/decryption model

IJSPPC.302010.f01

Encryption and decryption are carried out according two mechanisms. The first one called symmetric cryptography uses a common key for both encryption and decryption. This key could be privately shared by the sender and the receiver. However, the second mechanism, asymmetric cryptography, requires each user to have two keys: a public key and a private or secret key. The plain text is encrypted using the receiver’s public key and the cipher text is deciphered using a private key. Cryptography has been evolved through the use of new concepts and techniques such as deep learning, quantum and biometrics. More recently, dna-based cryptography has emerged as a promising new scientific field in information security. Actually, it is derived from the dna computing characterized by low energy efficiency, huge parallelism, and extraordinarily large information storage capacity (khobzaoui & al. 2022). It combines the classical solutions in cryptography with the chemical characteristics of biological dna sequences. The message is firstconverted to its binary format using conventional ascii table and then encoded as a dna sequence, which is the combination of the four nucleotide bases namely a (adenine), c(cytosine), g(guanine), t(thymine) according to table1. After that, a set of dna computing operations are applied to manipulate and exploit the obtained dna sequence.

Table 1.2
-bits encoding of nucleotides
BinarycodeAND base
00A
01C
10G
11T

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
View Complete Journal Contents Listing