Significant features for steganography techniques using deoxyribonucleic acid: a review

Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new aspect to achieve better security. In this paper, a survey of more recent DNA based on data hiding algorithms are covered. With particular emphasis of different parameters several data hiding algorithms based on DNA has been reviewed. To present a more secure an efficient data hiding algorithms based on DNA for future works, this will be helpful.

[1]  A. M. Nickfarjam,et al.  Image hiding using neighborhood similarity , 2014, 2014 6th Conference on Information and Knowledge Technology (IKT).

[2]  A. Khalifa,et al.  Secure Blind Data Hiding into Pseudo DNA Sequences Using Playfair Ciphering and Generic Complementary Substitution , 2016 .

[3]  Subhi R. M. Zeebaree,et al.  Security Issues in DNA Based on Data Hiding : A Review , 2018 .

[4]  Zenon Chaczko,et al.  Bio-informatics with Genetic Steganography Technique , 2015, Computational Intelligence and Efficiency in Engineering Systems.

[5]  Habibollah Haron,et al.  A Simultaneous Approach for Compression and Encryption Techniques Using Deoxyribonucleic Acid , 2019, 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA).

[6]  RASHMI M. TANk,et al.  DNA-based Audio Steganography , 2015 .

[7]  C. M. Shyamasree,et al.  Highly secure DNA-based audio steganography , 2013, 2013 International Conference on Recent Trends in Information Technology (ICRTIT).

[8]  Nazanin Sadat Kazazi,et al.  A Method to Encrypt Information with DNA-Based Cryptography , 2015 .

[9]  Sanjeev Indora,et al.  Cascaded DNA cryptography and steganography , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[10]  Ramlan Mahmod,et al.  Review of Dna and Pseudo Dna Cryptography , 2015 .

[11]  Meettu Skariya,et al.  Enhanced Double Layer Security using RSA over DNA based Data Encryption System , 2013 .

[12]  Chin-Chen Chang,et al.  A DNA-based data hiding technique with low modification rates , 2012, Multimedia Tools and Applications.

[13]  P. Malathi,et al.  Highly Improved DNA Based Steganography , 2017 .

[14]  Adnan Mohsin Abdulazeez Brifcani,et al.  Stego-Based-Crypto Technique for High Security Applications , 2010 .

[15]  A. Khalifa,et al.  High-capacity DNA-based steganography , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[16]  Mohammad Reza Najaf Torkaman,et al.  INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USINGDNA STEGANOGRAPHY , 2012 .

[17]  Vishal Bhatnagar,et al.  Analogy of various DNA based security algorithms using cryptography and steganography , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[18]  Mohammed Marey,et al.  Comparative study for various DNA based steganography techniques with the essential conclusions about the future research , 2016, 2016 11th International Conference on Computer Engineering & Systems (ICCES).

[19]  Samiha Marwan,et al.  DNA-based cryptographic methods for data hiding in DNA media , 2016, Biosyst..

[20]  Wisnu Ananta Kusuma,et al.  Accelerating Computation of DNA Multiple Sequence Alignment in Distributed Environment , 2014 .

[21]  A. Elakkiya,et al.  Amino Acids in Data Encryption , 2016 .

[22]  S. Pratap Singh,et al.  DNA QR coding for data security using DNA sequence , 2020 .

[23]  Mohammad Reza Abbasy,et al.  DNA BASE DATA HIDING ALGORITHM , 2012 .

[24]  Richard C. T. Lee,et al.  Data hiding methods based upon DNA sequences , 2010, Inf. Sci..

[25]  Jia-Shiang Chen,et al.  Cryptographic scheme using genetic algorithm and optical responses of periodic structures. , 2011, Optics express.

[26]  K. Menaka,et al.  Message Encryption Using DNA Sequences , 2014, 2014 World Congress on Computing and Communication Technologies.

[27]  Manish Mahajan,et al.  Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding , 2016 .

[29]  Baby Bhattacharya,et al.  An Improved DNA Based Dual Cover Steganography , 2015 .

[30]  Trong-The Nguyen,et al.  A Data Hiding Approach Based on Reference-Affected Matrix , 2020 .

[31]  Engin Avci,et al.  A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images , 2016, Displays.

[32]  Mohammad Reza Abbasy,et al.  Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences , 2011, 2011 IEEE World Congress on Services.

[33]  Manisha,et al.  A Survey on DNA Based Cryptography , 2015 .

[34]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[35]  Mohammed Misbahuddin,et al.  DNA for information security: A Survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology , 2014, International Conference on Computing and Communication Technologies.

[36]  Prasenjit Das,et al.  A DNA based image steganography using 2D chaotic map , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[37]  Roman V. Yampolskiy,et al.  Hiding Color Images in DNA Sequences , 2015, MAICS.

[38]  Ashish Sharma,et al.  Data hiding using dictionary based substitution method in DNA sequences , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).

[39]  Eman I. Abd El Latif,et al.  Chaotic Information-hiding Algorithm based on DNA , 2015 .

[40]  Samiha Marwan,et al.  Utilizing DNA Strands for Secured Data-Hiding with High Capacity , 2017, Int. J. Interact. Mob. Technol..

[41]  Z. Azimifar,et al.  Image steganography based on pixel ranking and Particle Swarm Optimization , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).

[42]  Habibollah Haron,et al.  Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations , 2018, 2018 International Conference on Advanced Science and Engineering (ICOASE).

[43]  Mohamed F. Tolba,et al.  Hybrid technique for steganography-based on DNA with n-bits binary coding rule , 2015, 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR).

[44]  Amal Khalifa,et al.  DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques , 2011 .

[45]  Virendra Kumar Yadav,et al.  A Novel Approach of Bulk Data Hiding using Text Steganography , 2015 .

[46]  Monica Borda,et al.  DNA secret writing techniques , 2010, 2010 8th International Conference on Communications.

[47]  Samir Kumar Bandyopadhyay,et al.  Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion , 2016 .

[48]  Chin-Wang Tao,et al.  HIDING IN DNA SEQUENCES BASED ON TABLE LOOKUP SUBSTITUTION , 2012 .

[49]  Ban Ahmed Mitras,et al.  PROPOSED STEGANOGRAPHY APPROACH USING DNA PROPERTIES , 2013 .

[51]  A. Shanthini,et al.  Towards DNA based data security in the cloud computing environment , 2020, Comput. Commun..

[52]  Nirmalya Kar,et al.  A highly secure DNA based image steganography , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).

[53]  T. Mandge,et al.  A DNA encryption technique based on matrix manipulation and secure key generation scheme , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[54]  Samiha Marwan,et al.  An Enhanced DNA-based Steganography Technique with a Higher Hiding Capacity , 2015, BIOINFORMATICS.

[55]  Ajit Singh,et al.  Information hiding techniques based on DNA inconsistency: An overview , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

[56]  Amal Khalifa LSBase: A key encapsulation scheme to improve hybrid crypto-systems using DNA steganography , 2013, 2013 8th International Conference on Computer Engineering & Systems (ICCES).

[57]  Alo Sen,et al.  Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie hellman key sharing technique , 2015, Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT).

[58]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[60]  Da Lin,et al.  A novel data hiding method based on deoxyribonucleic acid coding , 2013, Comput. Electr. Eng..

[61]  Chin-Chen Chang,et al.  A NEW DATA HIDING SCHEME BASED ON DNA SEQUENCE , 2011 .