Analysis and Implementation of Steganography Using Playfair Techniques and DNA Substitution To Improve Message Security

Bambang Harjito(1*), Dwiko Satriyo.U.Y.S(2), Faisal Rahutomo(3),

(1) Departement informatika Mathematics and Natural Science Faculty Sebelas Maret Surakarta
(2) Departement informatika Mathematics and Natural Science Faculty Sebelas Maret Surakarta
(3) Electrical Engineering Department Engineering Faculty Sebelas Maret Surakarta
(*) Corresponding Author
DOI: https://doi.org/10.23917/khif.v9i1.18259

Abstract

Along with the development of the internet, the need for data security is increasing. Ensuring the security of data requires special ways. Among these are cryptography and steganography. Because of the need for this method, many new data security methods have emerged. One of them is using DNA media. DNA cryptography and steganography utilize the properties of DNA to secure and hide secret messages. This paper proposes a combined method between the Playfair cipher cryptographic technique and the DNA substitution steganography algorithm for data security. Comparative analysis was conducted on techniques that are being tested by using similar methods. Four tests are conducted to measure the performance of the proposed method and another method was tested for comparative purposes. Four tests that were conducted are hiding capacity and key length test, speed test, endurance test, and steganalysis test. The result shows that the hiding capacity and key length test is better than other techniques. Steganalysis test result is also better than other tested techniques. Furthermore, in the speed test and endurance test, the results are quite satisfactory, not far from the others technique that is tested. The proposed method had a better performance than any other method that get tested, especially in speed performance and endurance performance.

Keywords

Cryptography DNA, Steganography DNA, Data Hiding, Playfair and substitution DNA

Full Text:

Accepted PDF

References

B. Sayantani, K. Marimuthu, N. Mita, H. Anup Kumar, and R. Niranchana, "Bio-inspired cryptosystem with DNA cryptography and neural networks," Journal of Systems Architecture, vol. 94, pp. 24-31, 2019.

S. Namasudra, "Fast and Secure Data Accessing by using DNA Computing for the Cloud Environment," IEEE Transactions on Services Computing, pp. 1-1, 2020.

S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini, "Towards DNA based data security in the cloud computing environment," Computer Communications, vol. 151, pp. 539-547, 2020/02/01/ 2020.

A. Majumdar, A. Biswas, A. Majumder, S. K. Sood, and K. L. Baishnab, "A novel DNA-inspired encryption strategy for concealing cloud storage," Frontiers of Computer Science, vol. 15, p. 153807, 2020/12/31 2020.

A. Khalifa, "LSBase: A key encapsulation scheme to improve hybrid crypto-systems using DNA steganography," in 2013 8th International Conference on Computer Engineering & Systems (ICCES), 2013, pp. 105-110.

K. Ning, "A Pseudo DNA Cryptography Method," Computing Research Repository - CORR, 2009.

B. Shimanovsky, J. Feng, and M. Potkonjak, "Hiding Data in DNA," in Information Hiding, Berlin, Heidelberg, 2003, pp. 373-386.

O. A. Al-Harbi, W. E. Alahmadi, and A. O. Aljahdali, "Security analysis of DNA based steganography techniques," SN Applied Sciences, vol. 2, p. 172, 2020/01/09 2020.

S. Singh and Y. Sharma, "A Review on DNA based Cryptography for Data hiding," in 2019 International Conference on Intelligent Sustainable Systems (ICISS), 2019, pp. 282-285.

P. Pavithran, S. Mathew, S. Namasudra, and P. Lorenz, "A novel cryptosystem based on DNA cryptography and randomly generated mealy machine," Computers & Security, vol. 104, p. 102160, 2021/05/01/ 2021.

M. S. Rahman, I. Khalil, and X. Yi, "A lossless DNA data hiding approach for data authenticity in mobile cloud-based healthcare systems," International Journal of Information Management, vol. 45, pp. 276-288, 2019/04/01/ 2019.

Richard M. Marzan and Ariel M. Sison, " An Enhanced Key Security of Playfair Cipher Algorithm," ICSCA '19: Proceedings of the 2019 8th International Conference on Software and Computer Applications.

X. Wang and Q. Zhang, "DNA computing-based cryptography," in 2009 Fourth International on Conference on Bio-Inspired Computing, 2009, pp. 1-3.

A. Elhadad, A. Khalifa, and S. Rida, "DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques," Journal of Communications and Computer Engineering, vol. 2, p. 44: 49, 12/17 2011. DOI:10.20454/JCCE.2012.242

UbaidurRahman, Noorul Hussain et al. “A Novel String Matrix Data Structure for DNA Encoding Algorithm.” Procedia Computer Science 46 (2015): 820-832.

A. Jose and K. Subramaniam, "DNA based SHA512-ECC cryptography and CM-CSA based steganography for data security," Materials Today: Proceedings, 2020/11/02/ 2020.

M. Thangavel and P. Varalakshmi, "Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud," Cluster Computing, vol. 21, pp. 1411-1437, 2018/06/01 2018.

E. Şatir and O. Kendirli, "A symmetric DNA encryption process with a biotechnical hardware," Journal of King Saud University - Science, vol. 34, p. 101838, 2022/04/01/ 2022.

A. Elhadad, "Data sharing using proxy re-encryption based on DNA computing," Soft Computing, vol. 24, pp. 2101-2108, 2020/02/01 2020.

F. Thabit, S. Alhomdy, and S. Jagtap, "A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions," International Journal of Intelligent Networks, vol. 2, pp. 18-33, 2021/01/01/ 2021.

M. Tahir, M. Sardaraz, Z. Mehmood, and S. Muhammad, "CryptoGA: a cryptosystem based on genetic algorithm for cloud data security," Cluster Computing, vol. 24, pp. 739-752, 2021/06/01 2021.

D. Prabhu and M. Adimoolam, "Bi-serial DNA Encryption Algorithm(BDEA)," Computing Research Repository - CORR, 01/13 2011.

H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee, and C. H. Huang, "Data hiding methods based upon DNA sequences," Information Sciences, vol. 180, pp. 2196-2208, 2010/06/01/ 2010.

J. S. Taur, H.-Y. Lin, H.-L. Lee, and C. W. Tao, "Hiding In Dna Sequences Based On Table Lookup Substitution," 2012.

B. Mondal, "A Secure Steganographic Scheme Based on Chaotic Map and DNA Computing," in Micro-Electronics and Telecommunication Engineering, Singapore, 2020, pp. 545-554.

S. Marwan, A. Shawish, and K. Nagaty, "DNA-based cryptographic methods for data hiding in DNA media," Biosystems, vol. 150, pp. 110-118, 2016/12/01/ 2016.

A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography: CRC Press, Inc., 1996.

I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography: Morgan Kaufmann Publishers Inc., 2007.

S. Katzenbeisser and F. A. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking: Artech House, Inc., 2000.

S. K. Ghosal and J. K. Mandal, "On the use of the Stirling Transform in image steganography," Journal of Information Security and Applications, vol. 46, pp. 320-330, 2019/06/01/ 2019.

J. Boyle, "Molecular biology of the cell, 5th edition by B. Alberts, A. Johnson, J. Lewis, M. Raff, K. Roberts, and P. Walter," Biochemistry and Molecular Biology Education, vol. 36, pp. 317-318, 2008/07/01 2008.

N. Kar, K. Mandal, and B. Bhattacharya, "Improved chaos-based video steganography using DNA alphabets," ICT Express, vol. 4, pp. 6-13, 2018/03/01/ 2018.

Y. Wang, Q. Han, G. Cui, and J. Sun, "Hiding Messages Based on DNA Sequence and Recombinant DNA Technique," IEEE Transactions on Nanotechnology, vol. 18, pp. 299-307, 2019.

J. Madison, I. Techreport, and S. Dickman, "An Overview of Steganography," 08/01 2007.

J. Chen, L. Chen, and Y. Zhou, "Cryptanalysis of a DNA-based image encryption scheme," Information Sciences, vol. 520, pp. 130-141, 2020/05/01/ 2020.

M. Indrasena Reddy, A. P. Siva Kumar, and K. Subba Reddy, "A secured cryptographic system based on DNA and a hybrid key generation approach," Biosystems, vol. 197, p. 104207, 2020/11/01/ 2020.

M. Sohal and S. Sharma, "BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing," Journal of King Saud University - Computer and Information Sciences, vol. 34, pp. 1417-1425, 2022/01/01/ 2022.

C. T. Clelland, V. Risca, and C. Bancroft, "Hiding messages in DNA microdots," Nature, vol. 399, pp. 533-534, 1999/06/01 1999.

R. Bumgarner, "Overview of DNA microarrays: types, applications, and their future," Curr Protoc Mol Biol, vol. Chapter 22, p. Unit 22.1., Jan 2013.

D. Na, "DNA steganography: hiding undetectable secret messages within the single nucleotide polymorphisms of a genome and detecting mutation-induced errors," Microbial Cell Factories, vol. 19, p. 128, 2020/06/11 2020

Article Metrics

Abstract view(s): 318 time(s)
Accepted PDF: 252 time(s)

Refbacks

  • There are currently no refbacks.