Image steganography based on DNA sequence translation properties
DOI:
https://doi.org/10.25079/ukhjse.v4n1y2020.pp15-26Keywords:
Image steganography, DNA sequence, Data hiding, Security, LSBAbstract
Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sensitive data. These requirements led to a number of research in information security that has been done in the past two decades. Cryptography and steganography are the two main methods that are being used for information security. Cryptography refers to techniques that encrypt a message to be sent to a destination using different methods to be done. On the other hand, steganography is the science of hiding information from others using another cover message or media such as image, audio, video, and DNA sequence. This paper proposed a new method to hide information in an image using the least significant bit (LSB) based on Deoxyribonucleic Acid (DNA) sequence. To accomplish this, the proposed scheme used properties of DNA sequence when codons that consist of three nucleotides are translated to proteins. The LSB of two pixels from the image are taken to represent a codon and then translate them to protein. The secret message bits are injected into codons before the translation process which slightly distorts the image and makes the image less suspicious and hard to detect the hidden message. The experimental results indicate the effeteness of the proposed method.
Downloads
References
Amoroso, E. G. (1999). Intrusion detection: An introduction to Internet surveillance, correlation, traps, trace back, and response (1st ed). Sparta, N.J: Intrusion.Net Books.
Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752. https://doi.org/10.1016/j.sigpro.2009.08.010
Comer, D. (2019). The Internet book: Everything you need to know about computer networking and how the Internet works (Fifth edition). Boca Raton: CRC Press, Taylor & Francis Group.
De Silva, P. Y., & Ganegoda, G. U. (2016). New Trends of Digital Data Storage in DNA. BioMed Research International, 2016, 1–14. https://doi.org/10.1155/2016/8072463
Denemark, T., Boroumand, M., & Fridrich, J. (2016). Steganalysis Features for Content-Adaptive JPEG Steganography. IEEE Transactions on Information Forensics and Security, 11(8), 1736–1746. https://doi.org/10.1109/TIFS.2016.2555281
Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2012). Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing, 2012(1), 25. https://doi.org/10.1186/1687-4722-2012-25
Ghazanfari, K., Ghaemmaghami, S., & Khosravi, S. R. (2011). LSB++: An improvement to LSB+ steganography. TENCON 2011 - 2011 IEEE Region 10 Conference, 364–368. https://doi.org/10.1109/TENCON.2011.6129126
Gupta, Ankur Goyal, S., & Bhushan, B. (2012). Information Hiding Using Least Significant Bit Steganography and Cryptography. International Journal of Modern Education and Computer Science, 4(6), 27–34. https://doi.org/10.5815/ijmecs.2012.06.04
Hafeez, I., Khan, A., & Qadir, A. (2014). DNA-LCEB: A high-capacity and mutation-resistant DNA data-hiding approach by employing encryption, error correcting codes, and hybrid twofold and fourfold codon-based strategy for synonymous substitution in amino acids. Medical & Biological Engineering & Computing, 52(11), 945–961. https://doi.org/10.1007/s11517-014-1194-2
Huang, Y.-H., Chang, C.-C., & Wu, C.-Y. (2014). A DNA-based data hiding technique with low modification rates. Multimedia Tools and Applications, 70(3), 1439–1451. https://doi.org/10.1007/s11042-012-1176-z
Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T. S., & Jung, K.-H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66. https://doi.org/10.1016/j.image.2018.03.012
Jorde, L. B., Carey, J. C., & Bamshad, M. J. (2016). Medical genetics (Fifth edition). Philadelphia, PA: Elsevier.
Leier, A., Richter, C., Banzhaf, W., & Rauhe, H. (2000). Cryptography with DNA binary strands. Biosystems, 57(1), 13–22. https://doi.org/10.1016/S0303-2647(00)00083-6
Lou, D.-C., & Hu, C.-H. (2012). LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Information Sciences, 188, 346–358. https://doi.org/10.1016/j.ins.2011.06.003
Mstafa, R. J., & Elleithy, K. M. (2017). Compressed and raw video steganography techniques: A comprehensive survey and analysis. Multimedia Tools and Applications, 76(20), 21749–21786. https://doi.org/10.1007/s11042-016-4055-1
Mstafa, R. J., Elleithy, K. M., & Abdelfattah, E. (2017). Video steganography techniques: Taxonomy, challenges, and future directions. 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 1–6. https://doi.org/10.1109/LISAT.2017.8001965
Muhammad, K., Ahmad, J., Farman, H., & Jan, Z. (2016). A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images. ArXiv:1601.01386 [Cs]. Retrieved from http://arxiv.org/abs/1601.01386
Nag, A., Choudhary, S., Basu, S., & Dawn, S. (2016). An Image Steganography Scheme based on LSB++ and RHTF for Resisting Statistical Steganalysis. IEIE Transactions on Smart Processing and Computing, 5(4), 250–255. https://doi.org/10.5573/IEIESPC.2016.5.4.250
Nussbaum, R. L., McInnes, R. R., & Willard, H. F. (2016). Thompson & Thompson genetics in medicine (Eighth edition). Philadelphia: Elsevier.
Shiu, H. J., Ng, K. L., Fang, J. F., Lee, R. C. T., & Huang, C. H. (2010). Data hiding methods based upon DNA sequences. Information Sciences, 180(11), 2196–2208. https://doi.org/10.1016/j.ins.2010.01.030
Ur Rehman, A., Liao, X., Kulsoom, A., & Abbas, S. A. (2015). Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools and Applications, 74(13), 4655–4677. https://doi.org/10.1007/s11042-013-1828-7
Wayner, P. (2009). Disappearing cryptography: Information hiding: steganography & watermarking (3rd ed). Amsterdam ; Boston: Morgan Kaufmann Publishers.
Wu, H., Dugelay, J.-L., & Cheung, Y. (2008). A Data Mapping Method for Steganography and Its Application to Images. In K. Solanki, K. Sullivan, & U. Madhow (Eds.), Information Hiding (Vol. 5284, pp. 236–250). https://doi.org/10.1007/978-3-540-88961-8_17
Yurke, B., Turberfield, A. J., Mills, A. P., Simmel, F. C., & Neumann, J. L. (2000). A DNA-fuelled molecular machine made of DNA. Nature, 406(6796), 605–608. https://doi.org/10.1038/35020524
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).