Author : Ms. Madhura W. Mangle 1
Date of Publication :7th August 2016
Abstract: Data hiding is the skill of hiding messages such that only the sender and the receiver of the message knows the message is hidden. In the world of security efficient techniques for data encryption and decryption are developing eventually. Though many algorithms have been developed for hiding the data, DNA sequences that are based on data encryption seems to be a promising approach for fulfilling the current information security needs. Similarly, the DNA sequences are we have used are with double encryption. This is achieved using cryptography and steganography. In this paper, an algorithm is used DNA sequences for data hiding is proposed and discussed for secure data transmission and reception. In this project, we are trying to create a cipher text using the DNA sequences consisting of nucleotides A (Adenine), G (Guanine), C (Cytosine), an
Reference :
-
- L. M. Ad leman, "Molecular computation of solution to combinatorial problems Science, (1994) 11, (266): 1021- 1024.
- Chen Jie, ―A DNA-based bio molecular cryptography design,‖ Proceedings of IEEE International Symposium, Vol. 3, pp. III-822, (2003).
- Pramanik Sabari, and Sanjit Kumar Setua, "DNA cryptography," In Electrical & Computer Engineering (ICECE), 7th IEEE International Conference on, pp. 551- 554, (2012).
- Tushar Mandge, Vijay Choudhary. ―A DNA encryption technique based on matrix manipulation and secure key generation scheme‖. Information Communication and Embedded Systems (ICICES), International Conference on 21-22 Feb. (2013).
- Kazuo Tanaka, Akimitsu Okamoto, and Isao Saito, ―Public-key system using DNA as a one-way function for distribution‖. Bios stems 81, 1, pp. 25-29, (2005).
- Sherif T. Amin, Magdy Saeb and El-Gindi Salah, ―A DNA-based implementation of YAEA encryption Sherif T. Amin, Magdy Saeb and El-Gindi Salah, ―A DNA-based implementation of YAEA encryption
- Cui, Guangzhao, Liming Qin, Yanfeng Wang, and Xuncai Zhang, "An encryption scheme using DNA technology," In Bio-Inspired Computing: Theories and Applications, IEEE International Conference on, pp. 37-42, (2008).
- Lai Xin-she, Zhang Lei, ―A novel generation key scheme based on DNA‖. Computational Intelligence and security, IEEE, International conference on 13-17 Dec. (2008).
- Lai, XueJia, "Asymmetric encryption and signature method with DNA technology," Science China Information Sciences 53.3, page 506-514, (2010).
- Deepak Kumar, and Shailendra Singh, "Secret data writing using DNA sequences," In Emerging Trends in Networks and Computer Communications (ETNCC), IEEE International Conference on, pp. 402-40, (2011).
- Bibhash Roy, Pratim singha, ―An improved symmetric key cryptography with DNA based strong cipher‖. Devices and Communications (ICDeCom), IEEE, 2011 International Conference on 24-25 Feb. (2011).
- A. K. Verma, Mayank Dave, R.C. Joshi, ―Securing Ad hoc Networks Using DNA Cryptography‖, IEEE International Conference on Computers and Devices for Communication (CODEC06), pp. 781-786, Dec. 18-20, (2006).
- Yunpeng Zhang, Bochen Fu, and Xianwei Zhang, "DNA cryptography based on DNA Fragment assembly," In Information Science and Digital Content Technology (ICIDT), IEEE International Conference on, vol. 1, pp. 179- 182, (2012)
- Wang Zhong, Zhy Yu, ―Index-based symmetric DNA encryption algorithm‖. Image and Signal Processing (CISP), 2011 4th International congress on image and signal processing, 15-17 oct. (2011).
- Olga Tornea, and Monica E. Borda, "Security and complexity of a DNA-based cipher," IEEE Roedunet International Conference (RoEduNet), 11th, pp. 1-5, (2013).
- Borda, Monica, and Olga Tornea, "DNA secret writing Techniques," In Communications (COMM), 8th IEEE International Conference on, pp. 451-456, (2010).
- Ashish kumar kaundal, ―Feistel Inspired structure for DNA cryptography‖ in June (2014).
- T. Korkel, J.H.P. Eloff, M.S. Olivier. ―An Overview of Image Steganography‖. (2005).
- "BMP (Windows) Header Format." Fastgraph Home Page. (2001).
- Brundick, Frederick S., and Lisa M. Marvel. "Implementation of Spread Spectrum Image Steganography." Army Research Laboratory, Mar.( 2001).
- Cummins, Johnathan, Patrick Diskin, Samuel Lau, and Robert Parlett. "Steganography and Digital Watermarking." (2004).
- Johnson, Neil F., and Sushil Jajodia. "Exploring Steganography: Seeing the Unseen." (1998)
- Lenti, Jozsef. "Steganographic Methods." 05 June (2000).