56
Views
0
CrossRef citations to date
0
Altmetric
Articles

DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks

ORCID Icon &
Pages 508-525 | Received 21 Feb 2024, Accepted 13 Apr 2024, Published online: 09 May 2024

References

  • Chenthara S, Ahmed K, Wang H, et al. Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access. 2019;7:74361–74382. doi: 10.1109/Access.6287639
  • Abdul-Kareem AA, Al-Jawher WAM. An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain. Int J Comput Appl. 2024;46(5):1–14.
  • Al-Roithy BO, Gutub A. Remodeling randomness prioritization to boost-up security of RGB image encryption. Multimed Tools Appl. 2021;80:28521–28581. doi: 10.1007/s11042-021-11051-3
  • Al-Shaarani F, Gutub A. Securing matrix counting-based secret-sharing involving crypto steganography. J King Saud Univ Comput Inf Sci. 2022;34:6909–6924.
  • El-Khamy SE, Korany NO, Mohamed AG. A new fuzzy-DNA image encryption and steganography technique. IEEE Access. 2020;8:148935–148951. doi: 10.1109/Access.6287639
  • Gutub A. Enhancing cryptography of grayscale images via resilience randomization flexibility. Int J Inf Secur Privacy IJISP. 2022;16:1–28. doi: 10.4018/IJISP
  • Trivedi MC, Prasad R, Goyal V. DDNA: A modified concept to DNA cryptography. In: Advances in Data and Information Sciences: Proceedings of ICDIS 2021. Springer; 2022. p. 91–97.
  • Gutub A. Dynamic smart random preference for higher medical image confidentiality. J Eng Res. 2023;11:100–111.
  • Jnana Ramakrishna C, Bharath Kalyan Reddy D, Amritha P, et al. A secure authenticated image encryption scheme based on elliptic curve cryptography. Int J Comput Appl. 2024;46:184–193.
  • Ramesh RK, Dodmane R, Shetty S, et al. A novel and secure fake-modulus based rabin-3 cryptosystem. Cryptography. 2023;7:44. doi: 10.3390/cryptography7030044
  • Rahman S, Uddin J, Khan HU, et al. A novel steganography technique for digital images using the least significant bit substitution method. IEEE Access. 2022;10:124053–124075. doi: 10.1109/ACCESS.2022.3224745
  • Setiadi DRIM. PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl. 2021;80:8423–8444. doi: 10.1007/s11042-020-10035-z
  • Yi B, Wu H, Feng G, et al. ALiSA: Acrostic linguistic steganography based on BERT and Gibbs sampling. IEEE Signal Process Lett. 2022;29:687–691. doi: 10.1109/LSP.2022.3152126
  • Zhou Z, Su Y, Li J, et al. Secret-to-image reversible transformation for generative steganography. IEEE Trans Dependable Secure Comput. 2022;20:4118–4134.
  • Fares K, Khaldi A, Redouane K, et al. DCT & DWT based watermarking scheme for medical information security. Biomed Signal Process Control. 2021;66:102403. doi: 10.1016/j.bspc.2020.102403
  • Farri E, Ayubi P. A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection. J Ambient Intell Humaniz Comput. 2022;14:1–25.
  • Gorbal M, Shelke RD, Joshi M. An image watermarking scheme: combining the transform domain and deep learning modality with an improved scrambling process. Int J Comput Appl. 2024;46:1–14.
  • Gutub A. Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol. 2022;8:440–452.
  • Gutub A. Watermarking images via counting-based secret sharing for lightweight semi-complete authentication. Int J Inf Secur Privacy IJISP. 2022;16:1–18. doi: 10.4018/IJISP
  • Hassan FS, Gutub A. Improving data hiding within colour images using hue component of HSV colour space. CAAI Trans Intell Technol. 2022;7:56–68. doi: 10.1049/cit2.v7.1
  • Hassan FS, Gutub A. Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme. J King Saud Univ Comput Inf Sci. 2022;34:2017–2030.
  • Hureib ESB, Gutub AA. Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography. Int J Comput Sci Network Security IJCSNS. 2020;20:232–241.
  • Kaur S, Singh S, Kaur M, et al. A systematic review of computational image steganography approaches. Arch Comput Methods Eng. 2022;29:1–23.
  • Li S, Wang Z, Zhang X, et al. Robust image steganography against general downsampling operations with lossless secret recovery. IEEE Trans Dependable Secure Comput. 2023;21.
  • Kumar S, Soundrapandiyan R. Digital video steganography: an overview. Comput Methods Data Eng Proc ICCMDE 2021. 2022;139:561–574.
  • Li J, Zhang M, Niu K, et al. Investigation on principles for cost assignment in motion vector-based video steganography. J Inf Secur Appl. 2023;73:103439.
  • Gera A, Vyas V. Encrypted, compressed, and embedded text in audio WAV file using LSB audio stenography. In: Sustainable computing: transforming industry 4.0 to society 5.0. Springer. Cham: Springer International Publishing; 2023. p. 291–305.
  • Zhang R, Dong H, Yang Z, et al. A CNN based visual audio steganography model. In: Artificial Intelligence and Security: 8th International Conference, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I. Springer; 2022. p. 431–442.
  • Abdullah AA, Eesa AS, Abdo AM. New data hiding approach based on biological functionality of DNA sequence. Sci J Univ Zakho. 2019;7:184–189. doi: 10.25271/sjuoz.2019.7.4.647
  • Khalifa A. A blind DNA-steganography approach using ciphering and random sequence splicing. In: 2020 10th International Conference on Information Science and Technology (ICIST). IEEE; 2020. p. 86–90.
  • Wang Y, Han Q, Cui G, et al. Hiding messages based on DNA sequence and recombinant DNA technique. IEEE Trans Nanotechnol. 2019;18:299–307. doi: 10.1109/TNANO.7729
  • Adeeb OFA, Kabudian SJ. Arabic text steganography based on deep learning methods. IEEE Access. 2022;10:94403–94416. doi: 10.1109/ACCESS.2022.3201019
  • Cao Y, Zhou Z, Chakraborty C, et al. Generative steganography based on long readable text generation. IEEE Trans Comput Soc Syst. 2022:1–11.
  • Roslan NA, Udzir NI, Mahmod R, et al. Systematic literature review and analysis for arabic text steganography method practically. Egypt Inform J. 2022;23:177–191.
  • Banerjee S, Singh GK. Quality aware compression of multilead electrocardiogram signal using 2-mode tucker decomposition and steganography. Biomed Signal Process Control. 2021;64:102230. doi: 10.1016/j.bspc.2020.102230
  • Rahman MS, Khalil I, Yi X. Reversible biosignal steganography approach for authenticating biosignals using extended binary Golay code. IEEE J Biomed Health Inform. 2020;25:35–46. doi: 10.1109/JBHI.6221020
  • Yang CY, Wang WF. An efficient data hiding for ecg signals based on the integer wavelet transform and block standard deviation. J King Saud Univ Comput Inf Sci. 2022;34:5868–5882.
  • Cho GS. A method of data hiding in a file system by modifying directory information. J Korea Soc Comput Inf. 2018;23:85–93.
  • Abdulhammed OY. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach. J Supercomput. 2023;80:1–23.
  • BC MK, RJ AK, Shashidhara D, et al. Data encryption and decryption using DNA and embedded technology. In: 2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT). IEEE; 2022. p. 1–5.
  • Lee SH. Reversible data hiding for DNA sequence using multilevel histogram shifting. Secur Commun Netw. 2018;2018:1–13.
  • Rahman MS, Khalil I, Yi X. A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems. Int J Inf Manag. 2019;45:276–288. doi: 10.1016/j.ijinfomgt.2018.08.011
  • Atito A, Khalifa A, Rida S. DNA-based data encryption and hiding using playfair and insertion techniques. J Commun Comput Eng. 2012;2:44. doi: 10.20454/jcce.2012.242
  • Na D. Dna steganography: hiding undetectable secret messages within the single nucleotide polymorphisms of a genome and detecting mutation-induced errors. Microb Cell Fact. 2020;19:1–9. doi: 10.1186/s12934-020-01387-0.
  • Sabry M, Nazmy T, Khalifa ME. Steganography in DNA sequence on the level of amino acids. In: 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE; 2019. p. 317–324.
  • Nahar M, Kamal A. An efficient use of toffoli quantum gate for boosting the embedding capacity in DNA sequence. In: 2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE). IEEE; 2022. p. 1–6.
  • Nahar M, Kamal A, Hossain G. Protecting health data in the cloud through steganography: a table-driven, blind method using neural networks and bit-shuffling algorithm. J Netw Comput Appl. 2023;217:103689. doi: 10.1016/j.jnca.2023.103689
  • Imdad M, Ramli SN, Mahdin H. Increasing randomization of ciphertext in DNA cryptography. Int J Adv Comput Sci Appl. 2021;12:423–429.
  • Joshi R, Trivedi MC, Goyal V, et al. Dna sequence in cryptography: a study. In: Advances in Data and Information Sciences: Proceedings of ICDIS 2022. Springer; 2022. p. 557–563.
  • Rama Devi K, Bhuvaneswari E. An enhancement in data security using trellis algorithm with DNA sequences in symmetric DNA cryptography. Wirel Pers Commun. 2022;129:387–398.
  • Şatir E, Kendirli O. A symmetric DNA encryption process with a biotechnical hardware. J King Saud Univ Sci. 2022;34:101838. doi: 10.1016/j.jksus.2022.101838
  • Sohal M, Sharma S. BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. J King Saud Univ Comput Inf Sci. 2022;34:1417–1425.
  • Pavithran P, Mathew S, Namasudra S, et al. Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine. Cluster Comput. 2023;26:1035–1051. doi: 10.1007/s10586-022-03653-9
  • Jasra B, Moon AH. Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system. Expert Syst Appl. 2022;206:117861. doi: 10.1016/j.eswa.2022.117861
  • Elsaid SA, Alotaibi ER, Alsaleh S. A robust hybrid cryptosystem based on DNA and hyperchaotic for images encryption. Multimed Tools Appl. 2023;82:1995–2019. doi: 10.1007/s11042-022-12641-5
  • Pavithran P, Mathew S, Namasudra S, et al. A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated moore machine for cyber physical systems. Comput Commun. 2022;188:1–12. doi: 10.1016/j.comcom.2022.02.008
  • Majumdar A, Biswas A, Majumder A, et al. A novel DNA-inspired encryption strategy for concealing cloud storage. Front Comput Sci. 2021;15:1–18. doi: 10.1007/s11704-019-9015-2
  • Mukherjee S, Sarkar S, Mukhopadhyay S. An image steganography technique based on fake DNA sequence construction. In: Proceedings of International Joint Conference on Advances in Computational Intelligence: IJCACI 2021. Springer; 2022. p. 613–621.
  • Durafe A, Patidar V. Image steganography using fractal cover and combined chaos-DNA based encryption. Ann Data Sci. 2022:1–31.
  • Huang C, Yang Z, Hu Z, et al. DNA synthetic steganography based on conditional probability adaptive coding. IEEE Trans Inf Forens Secur. 2023;18:4747–4759.
  • Vinodhini R, Malathi P. Hiding information in the DNA sequence using DNA steganographic algorithms with double-layered security. Int J Inf Secur Privacy IJISP. 2022;16:1–20.
  • Hassan S, Muztaba MA, Hossain MS, et al. A hybrid encryption technique based on DNA cryptography and steganography. In: 2022 IEEE 13th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE; 2022. p. 0501–0508.
  • Namasudra S. A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure. Comput Electr Eng. 2022;104:108426. doi: 10.1016/j.compeleceng.2022.108426
  • Abd El-Latif EI, Moussa MI. Information hiding using artificial DNA sequences based on Gaussian kernel function. J Inf Optim Sci. 2019;40:1181–1194.
  • Moussa M, Badr E, Almotairi S. A data hiding algorithm based on DNA and elliptic curve cryptosystems. J Inf Hiding Multim Signal Process. 2019;10:458–469.
  • Saeidi Z, Yazdi A, Mashhadi S, et al. High performance image steganography integrating IWT and hamming code within secret sharing. IET Image Process. 2024;18:129–139. doi: 10.1049/ipr2.v18.1
  • Sahu AK, Gutub A. Improving grayscale steganography to protect personal information disclosure within hotel services. Multimed Tools Appl. 2022;81:30663–30683. doi: 10.1007/s11042-022-13015-7
  • Sahu M, Padhy N, Gantayat SS, et al. Local binary pattern-based reversible data hiding. CAAI Trans Intell Technol. 2022;7:695–709. doi: 10.1049/cit2.v7.4
  • Kamil Khudhair S, Sahu M, KR R, et al. Secure reversible data hiding using block-wise histogram shifting. Electronics. 2023;12:1222. doi: 10.3390/electronics12051222
  • Ltd, J., draw.io AG. A free online/offline diagram making software. available at https://www.drawio.com/.
  • GitHub. A free online ai image enhancer. available at https://replicate.com/tencentarc/gfpgan.
  • NCBI. National Center for Biotechnology Information database. [accessed 2023 Jan 25]. available at https://www.ncbi.nlm.nih.gov/nucleotide/.
  • GenBank:AC166252.18. Mus musculus 6 BAC RP23-100G10 (Roswell Park Cancer Institute (C57BL/6J Female) Mouse BAC Library) complete sequence, GenBank: AC166252.18, Total Gene 149884. [accessed 2023 Nov 5]. available at https://www.ncbi.nlm.nih.gov/nuccore/AC166252.
  • GenBank:NM_197993.4. Mus musculus terminal uridylyl transferase 1, U6 snRNA-specific (Tut1), mRNA, NCBI Reference Sequence: NM_197993.4, Total Gene 2757. [accessed 2023 Nov 5]. available at https://www.ncbi.nlm.nih.gov/nuccore/NM_197993.4.
  • GenBank:AH002844.2. Homo sapiens insulin (INS) gene, complete cds, GenBank: AH002844.2, Total Gene 4969. [accessed 2023 Nov 5]. available at https://www.ncbi.nlm.nih.gov/nuccore/AH002844.2.
  • GenBank:HQ287881.1. Homo sapiens isolate Ir8_13136_K1a mitochondrion, complete genome, GenBank: HQ287881.1, Total Gene 16572. [accessed 2023 Nov 5]. available at https://www.ncbi.nlm.nih.gov/nuccore/HQ287881.1.
  • GenBank:NM_145477.3. Mus musculus asparagine-linked glycosylation 12 (alpha-1,6-mannosyltransferase) (Alg12), transcript variant 2, mRNA, NCBI Reference Sequence: NM_145477.3, Total Gene 1803. [accessed 2023 Nov 5]. available at https://www.ncbi.nlm.nih.gov/nuccore/NM_145477.3.
  • Al-Harbi OA, Alahmadi WE, Aljahdali AO. Security analysis of DNA based steganography techniques. SN Appl Sci. 2020;2:172. doi: 10.1007/s42452-019-1930-1
  • Nahar M, Kamal A, Hassan MR, et al. Novel algorithm for multi-time data implantation in a special cyber-manufacturing architecture. Algorithms. 2022;15:335. doi: 10.3390/a15100335
  • Karthikeyan S, Rizwan P, Balamurugan B. Taxonomy of security attacks in DNA computing. In: Advances of DNA computing in cryptography. Chapman and Hall/CRC; 2018. p. 118–135.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.