Image steganography based on DNA sequence translation properties

Authors

  • Abdullah Ahmed Abdullah Department of Computer Science, Faculty of Science, University of Zakho, Duhok, Kurdistan Region, Iraq http://orcid.org/0000-0002-7963-0843
  • Sardar Hasen Ali Department of Computer Science, Faculty of Science, University of Zakho, Duhok, Kurdistan Region, Iraq
  • Ramadhan J. Mstafa Department of Computer Science, Faculty of Science, University of Zakho, Duhok, Kurdistan Region, Iraq http://orcid.org/0000-0002-6122-234X
  • Vaman Mohammed Haji Department of Computer Science, Faculty of Science, University of Zakho, Duhok, Kurdistan Region, Iraq

DOI:

https://doi.org/10.25079/ukhjse.v4n1y2020.pp15-26

Keywords:

Image steganography, DNA sequence, Data hiding, Security, LSB

Abstract

Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sensitive data. These requirements led to a number of research in information security that has been done in the past two decades. Cryptography and steganography are the two main methods that are being used for information security. Cryptography refers to techniques that encrypt a message to be sent to a destination using different methods to be done. On the other hand, steganography is the science of hiding information from others using another cover message or media such as image, audio, video, and DNA sequence. This paper proposed a new method to hide information in an image using the least significant bit (LSB) based on Deoxyribonucleic Acid (DNA) sequence. To accomplish this, the proposed scheme used properties of DNA sequence when codons that consist of three nucleotides are translated to proteins. The LSB of two pixels from the image are taken to represent a codon and then translate them to protein. The secret message bits are injected into codons before the translation process which slightly distorts the image and makes the image less suspicious and hard to detect the hidden message. The experimental results indicate the effeteness of the proposed method.

Downloads

Download data is not yet available.

References

Abdo, A. M., Sabry, A., & A., A. (2018). A New Message Encryption Method based on Amino Acid Sequences and Genetic Codes. International Journal of Advanced Computer Science and Applications, 9(8). https://doi.org/10.14569/IJACSA.2018.090872

Amoroso, E. G. (1999). Intrusion detection: An introduction to Internet surveillance, correlation, traps, trace back, and response (1st ed). Sparta, N.J: Intrusion.Net Books.

Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752. https://doi.org/10.1016/j.sigpro.2009.08.010

Comer, D. (2019). The Internet book: Everything you need to know about computer networking and how the Internet works (Fifth edition). Boca Raton: CRC Press, Taylor & Francis Group.

De Silva, P. Y., & Ganegoda, G. U. (2016). New Trends of Digital Data Storage in DNA. BioMed Research International, 2016, 1–14. https://doi.org/10.1155/2016/8072463

Denemark, T., Boroumand, M., & Fridrich, J. (2016). Steganalysis Features for Content-Adaptive JPEG Steganography. IEEE Transactions on Information Forensics and Security, 11(8), 1736–1746. https://doi.org/10.1109/TIFS.2016.2555281

Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2012). Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing, 2012(1), 25. https://doi.org/10.1186/1687-4722-2012-25

Ghazanfari, K., Ghaemmaghami, S., & Khosravi, S. R. (2011). LSB++: An improvement to LSB+ steganography. TENCON 2011 - 2011 IEEE Region 10 Conference, 364–368. https://doi.org/10.1109/TENCON.2011.6129126

Gupta, Ankur Goyal, S., & Bhushan, B. (2012). Information Hiding Using Least Significant Bit Steganography and Cryptography. International Journal of Modern Education and Computer Science, 4(6), 27–34. https://doi.org/10.5815/ijmecs.2012.06.04

Hafeez, I., Khan, A., & Qadir, A. (2014). DNA-LCEB: A high-capacity and mutation-resistant DNA data-hiding approach by employing encryption, error correcting codes, and hybrid twofold and fourfold codon-based strategy for synonymous substitution in amino acids. Medical & Biological Engineering & Computing, 52(11), 945–961. https://doi.org/10.1007/s11517-014-1194-2

Huang, Y.-H., Chang, C.-C., & Wu, C.-Y. (2014). A DNA-based data hiding technique with low modification rates. Multimedia Tools and Applications, 70(3), 1439–1451. https://doi.org/10.1007/s11042-012-1176-z

Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T. S., & Jung, K.-H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66. https://doi.org/10.1016/j.image.2018.03.012

Jorde, L. B., Carey, J. C., & Bamshad, M. J. (2016). Medical genetics (Fifth edition). Philadelphia, PA: Elsevier.

Leier, A., Richter, C., Banzhaf, W., & Rauhe, H. (2000). Cryptography with DNA binary strands. Biosystems, 57(1), 13–22. https://doi.org/10.1016/S0303-2647(00)00083-6

Lou, D.-C., & Hu, C.-H. (2012). LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Information Sciences, 188, 346–358. https://doi.org/10.1016/j.ins.2011.06.003

Mstafa, R. J., & Elleithy, K. M. (2017). Compressed and raw video steganography techniques: A comprehensive survey and analysis. Multimedia Tools and Applications, 76(20), 21749–21786. https://doi.org/10.1007/s11042-016-4055-1

Mstafa, R. J., Elleithy, K. M., & Abdelfattah, E. (2017). Video steganography techniques: Taxonomy, challenges, and future directions. 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 1–6. https://doi.org/10.1109/LISAT.2017.8001965

Muhammad, K., Ahmad, J., Farman, H., & Jan, Z. (2016). A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images. ArXiv:1601.01386 [Cs]. Retrieved from http://arxiv.org/abs/1601.01386

Nag, A., Choudhary, S., Basu, S., & Dawn, S. (2016). An Image Steganography Scheme based on LSB++ and RHTF for Resisting Statistical Steganalysis. IEIE Transactions on Smart Processing and Computing, 5(4), 250–255. https://doi.org/10.5573/IEIESPC.2016.5.4.250

Nussbaum, R. L., McInnes, R. R., & Willard, H. F. (2016). Thompson & Thompson genetics in medicine (Eighth edition). Philadelphia: Elsevier.

Shiu, H. J., Ng, K. L., Fang, J. F., Lee, R. C. T., & Huang, C. H. (2010). Data hiding methods based upon DNA sequences. Information Sciences, 180(11), 2196–2208. https://doi.org/10.1016/j.ins.2010.01.030
Ur Rehman, A., Liao, X., Kulsoom, A., & Abbas, S. A. (2015). Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools and Applications, 74(13), 4655–4677. https://doi.org/10.1007/s11042-013-1828-7

Wayner, P. (2009). Disappearing cryptography: Information hiding: steganography & watermarking (3rd ed). Amsterdam ; Boston: Morgan Kaufmann Publishers.

Wu, H., Dugelay, J.-L., & Cheung, Y. (2008). A Data Mapping Method for Steganography and Its Application to Images. In K. Solanki, K. Sullivan, & U. Madhow (Eds.), Information Hiding (Vol. 5284, pp. 236–250). https://doi.org/10.1007/978-3-540-88961-8_17

Yurke, B., Turberfield, A. J., Mills, A. P., Simmel, F. C., & Neumann, J. L. (2000). A DNA-fuelled molecular machine made of DNA. Nature, 406(6796), 605–608. https://doi.org/10.1038/35020524

Published

2020-06-30

Issue

Section

Research Articles

How to Cite

Image steganography based on DNA sequence translation properties. (2020). UKH Journal of Science and Engineering, 4(1), 15-26. https://doi.org/10.25079/ukhjse.v4n1y2020.pp15-26

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>