A Blind DNA-Steganography Approach using Ciphering and Random Sequence Splicing

The great advances in computers and computations has turned the ancient Greek art of Steganography into a hot research topic. The goal is to hide data into digital media and be imperceptible to a human observer, yet easily detectable by a computer. This paper, proposes a Steganographic method that uses DNA as a carrier of secret information which can be utilized for either authentication, or secret communication purposes. The hiding process of the proposed method consists of two main stages. The first stage uses an 8x8 play-fair ciphering algorithm to encode the secret message into a DNA sequence. The next stage blends the secret sequence into the cover sequence through a random splicing process that depends on the value of a secret key. On the other side of communication, the extraction process starts by: splitting the stego-sequence into chunks to separate both the message and the cover sequences. Then, a deciphering step is carried out to reveal the original message. This process can be done blindly without the need to the original cover sequence. When compared with other methods, the proposed method showed an outstanding performance in terms of both blindness and embedding capacity.

[1]  A. Khalifa,et al.  Secure Blind Data Hiding into Pseudo DNA Sequences Using Playfair Ciphering and Generic Complementary Substitution , 2016 .

[2]  Dominik Heider,et al.  DNA-based watermarks using the DNA-Crypt algorithm , 2007, BMC Bioinformatics.

[3]  Dominik Heider,et al.  DNA watermarks in non-coding regulatory sequences , 2009, BMC Research Notes.

[4]  Safwat Hamad A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data , 2014 .

[5]  Manju Bansal,et al.  A glossary of DNA structures from A to Z. , 2003, Acta crystallographica. Section D, Biological crystallography.

[6]  Amal Said Khalifa,et al.  Robust video steganography algorithm using adaptive skin-tone detection , 2015, Multimedia Tools and Applications.

[7]  David A. Dampier,et al.  Methods of Information Hiding and Detection in File Systems , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[8]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[9]  Amal Khalifa,et al.  DNA Watermarking Using Codon Postfix Technique , 2018, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[10]  Richard C. T. Lee,et al.  Data hiding methods based upon DNA sequences , 2010, Inf. Sci..

[11]  Chinchen Chang,et al.  REVERSIBLE DATA HIDING SCHEMES FOR DEOXYRIBONUCLEIC ACID (DNA) MEDIUM , 2007 .

[12]  Subhi R. M. Zeebaree,et al.  Security Issues in DNA Based on Data Hiding : A Review , 2018 .

[13]  Suk Hwan Lee Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting , 2018, Secur. Commun. Networks.

[14]  Viviana I. Risca DNA-BASED STEGANOGRAPHY , 2001, Cryptologia.

[15]  Masanori Arita,et al.  Secret Signatures Inside Genomic DNA , 2004, Biotechnology progress.

[16]  S. Jiao,et al.  Hiding data in DNA of living organisms , 2009 .

[17]  Amal Khalifa,et al.  DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques , 2011 .

[18]  Sonal K. Jagtap,et al.  Audio Steganography Used for Secure Data Transmission , 2013 .

[19]  Amal Khalifa LSBase: A key encapsulation scheme to improve hybrid crypto-systems using DNA steganography , 2013, 2013 8th International Conference on Computer Engineering & Systems (ICCES).

[20]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[21]  I-Ting Chi,et al.  A Vertex-Based 3D Authentication Algorithm Based on Spatial Subdivision , 2018, Symmetry.