Analysis and Implementation of Steganography Using Playfair Techniques and DNA Substitution To Improve Message Security
(1) Departement informatika Mathematics and Natural Science Faculty Sebelas Maret Surakarta
(2) Departement informatika Mathematics and Natural Science Faculty Sebelas Maret Surakarta
(3) Electrical Engineering Department Engineering Faculty Sebelas Maret Surakarta
(*) Corresponding Author
DOI: https://doi.org/10.23917/khif.v9i1.18259
Abstract
Keywords
Full Text:
Accepted PDFReferences
B. Sayantani, K. Marimuthu, N. Mita, H. Anup Kumar, and R. Niranchana, "Bio-inspired cryptosystem with DNA cryptography and neural networks," Journal of Systems Architecture, vol. 94, pp. 24-31, 2019.
S. Namasudra, "Fast and Secure Data Accessing by using DNA Computing for the Cloud Environment," IEEE Transactions on Services Computing, pp. 1-1, 2020.
S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini, "Towards DNA based data security in the cloud computing environment," Computer Communications, vol. 151, pp. 539-547, 2020/02/01/ 2020.
A. Majumdar, A. Biswas, A. Majumder, S. K. Sood, and K. L. Baishnab, "A novel DNA-inspired encryption strategy for concealing cloud storage," Frontiers of Computer Science, vol. 15, p. 153807, 2020/12/31 2020.
A. Khalifa, "LSBase: A key encapsulation scheme to improve hybrid crypto-systems using DNA steganography," in 2013 8th International Conference on Computer Engineering & Systems (ICCES), 2013, pp. 105-110.
K. Ning, "A Pseudo DNA Cryptography Method," Computing Research Repository - CORR, 2009.
B. Shimanovsky, J. Feng, and M. Potkonjak, "Hiding Data in DNA," in Information Hiding, Berlin, Heidelberg, 2003, pp. 373-386.
O. A. Al-Harbi, W. E. Alahmadi, and A. O. Aljahdali, "Security analysis of DNA based steganography techniques," SN Applied Sciences, vol. 2, p. 172, 2020/01/09 2020.
S. Singh and Y. Sharma, "A Review on DNA based Cryptography for Data hiding," in 2019 International Conference on Intelligent Sustainable Systems (ICISS), 2019, pp. 282-285.
P. Pavithran, S. Mathew, S. Namasudra, and P. Lorenz, "A novel cryptosystem based on DNA cryptography and randomly generated mealy machine," Computers & Security, vol. 104, p. 102160, 2021/05/01/ 2021.
M. S. Rahman, I. Khalil, and X. Yi, "A lossless DNA data hiding approach for data authenticity in mobile cloud-based healthcare systems," International Journal of Information Management, vol. 45, pp. 276-288, 2019/04/01/ 2019.
Richard M. Marzan and Ariel M. Sison, " An Enhanced Key Security of Playfair Cipher Algorithm," ICSCA '19: Proceedings of the 2019 8th International Conference on Software and Computer Applications.
X. Wang and Q. Zhang, "DNA computing-based cryptography," in 2009 Fourth International on Conference on Bio-Inspired Computing, 2009, pp. 1-3.
A. Elhadad, A. Khalifa, and S. Rida, "DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques," Journal of Communications and Computer Engineering, vol. 2, p. 44: 49, 12/17 2011. DOI:10.20454/JCCE.2012.242
UbaidurRahman, Noorul Hussain et al. “A Novel String Matrix Data Structure for DNA Encoding Algorithm.” Procedia Computer Science 46 (2015): 820-832.
A. Jose and K. Subramaniam, "DNA based SHA512-ECC cryptography and CM-CSA based steganography for data security," Materials Today: Proceedings, 2020/11/02/ 2020.
M. Thangavel and P. Varalakshmi, "Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud," Cluster Computing, vol. 21, pp. 1411-1437, 2018/06/01 2018.
E. Şatir and O. Kendirli, "A symmetric DNA encryption process with a biotechnical hardware," Journal of King Saud University - Science, vol. 34, p. 101838, 2022/04/01/ 2022.
A. Elhadad, "Data sharing using proxy re-encryption based on DNA computing," Soft Computing, vol. 24, pp. 2101-2108, 2020/02/01 2020.
F. Thabit, S. Alhomdy, and S. Jagtap, "A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions," International Journal of Intelligent Networks, vol. 2, pp. 18-33, 2021/01/01/ 2021.
M. Tahir, M. Sardaraz, Z. Mehmood, and S. Muhammad, "CryptoGA: a cryptosystem based on genetic algorithm for cloud data security," Cluster Computing, vol. 24, pp. 739-752, 2021/06/01 2021.
D. Prabhu and M. Adimoolam, "Bi-serial DNA Encryption Algorithm(BDEA)," Computing Research Repository - CORR, 01/13 2011.
H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee, and C. H. Huang, "Data hiding methods based upon DNA sequences," Information Sciences, vol. 180, pp. 2196-2208, 2010/06/01/ 2010.
J. S. Taur, H.-Y. Lin, H.-L. Lee, and C. W. Tao, "Hiding In Dna Sequences Based On Table Lookup Substitution," 2012.
B. Mondal, "A Secure Steganographic Scheme Based on Chaotic Map and DNA Computing," in Micro-Electronics and Telecommunication Engineering, Singapore, 2020, pp. 545-554.
S. Marwan, A. Shawish, and K. Nagaty, "DNA-based cryptographic methods for data hiding in DNA media," Biosystems, vol. 150, pp. 110-118, 2016/12/01/ 2016.
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography: CRC Press, Inc., 1996.
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography: Morgan Kaufmann Publishers Inc., 2007.
S. Katzenbeisser and F. A. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking: Artech House, Inc., 2000.
S. K. Ghosal and J. K. Mandal, "On the use of the Stirling Transform in image steganography," Journal of Information Security and Applications, vol. 46, pp. 320-330, 2019/06/01/ 2019.
J. Boyle, "Molecular biology of the cell, 5th edition by B. Alberts, A. Johnson, J. Lewis, M. Raff, K. Roberts, and P. Walter," Biochemistry and Molecular Biology Education, vol. 36, pp. 317-318, 2008/07/01 2008.
N. Kar, K. Mandal, and B. Bhattacharya, "Improved chaos-based video steganography using DNA alphabets," ICT Express, vol. 4, pp. 6-13, 2018/03/01/ 2018.
Y. Wang, Q. Han, G. Cui, and J. Sun, "Hiding Messages Based on DNA Sequence and Recombinant DNA Technique," IEEE Transactions on Nanotechnology, vol. 18, pp. 299-307, 2019.
J. Madison, I. Techreport, and S. Dickman, "An Overview of Steganography," 08/01 2007.
J. Chen, L. Chen, and Y. Zhou, "Cryptanalysis of a DNA-based image encryption scheme," Information Sciences, vol. 520, pp. 130-141, 2020/05/01/ 2020.
M. Indrasena Reddy, A. P. Siva Kumar, and K. Subba Reddy, "A secured cryptographic system based on DNA and a hybrid key generation approach," Biosystems, vol. 197, p. 104207, 2020/11/01/ 2020.
M. Sohal and S. Sharma, "BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing," Journal of King Saud University - Computer and Information Sciences, vol. 34, pp. 1417-1425, 2022/01/01/ 2022.
C. T. Clelland, V. Risca, and C. Bancroft, "Hiding messages in DNA microdots," Nature, vol. 399, pp. 533-534, 1999/06/01 1999.
R. Bumgarner, "Overview of DNA microarrays: types, applications, and their future," Curr Protoc Mol Biol, vol. Chapter 22, p. Unit 22.1., Jan 2013.
D. Na, "DNA steganography: hiding undetectable secret messages within the single nucleotide polymorphisms of a genome and detecting mutation-induced errors," Microbial Cell Factories, vol. 19, p. 128, 2020/06/11 2020
Article Metrics
Abstract view(s): 413 time(s)Accepted PDF: 332 time(s)
Refbacks
- There are currently no refbacks.