Data Hiding Using DNA Segments

Abstract

Information security has now emerged as an essential foundation that the modern world cannot afford to abandon or disrespect in any way. Data confidentiality is still a preoccupation and a constant concern in the world of the electronic industry. Encryption has always been and continues to be the go-to solution for achieving data security. Despite its effectiveness in maintaining security, encryption in its visible version remains an appealing option for potential attackers. As a result, multiple studies and substantial research have focused on steganography, which has an advantage over encryption in that it may conceal information without leaving an identifiable format. This trait reduces the zeal and difficulties that potential attackers confront when attempting to penetrate security mechanisms.

Life is made up of genetic material called DNA, which is present in humans and the majority of other species. The DNA code is made up of the amino acids adenine (A), guanine (G), cytosine (C), and thymine (T). Humans share around 98% of these DNA bases, highlighting the commonalities across people. The order of these bases determines the information that is available for an organism's growth and preservation, much like the letters in words and sentences. This paper introduces a unique masking method that takes advantage of the intrinsic characteristics of DNA structure.. It includes converting data into a DNA format and then using precise computations to integrate it into pre-existing DNA blocks. It has been established via careful investigation and analysis that this approach is appropriate for obtaining information security using unconventional formulae.

Country : Iraq

1 Auday H. AL-Wattar

  1. Lecturer, Computer Science and Mathematics, University of Mosul, Mosul, Iraq

IRJIET, Volume 7, Issue 8, August 2023 pp. 48-57

doi.org/10.47001/IRJIET/2023.708007

References

  1. A.T. Erman, A. Dilo, and P. Havinga, "A virtual infrastructure based on honeycomb tessellation for data dissemination in multi-sink mobile wireless sensor networks," EURASIP Journal on Wireless Communications and Networking, vol. 2012, pp. 1-27, 2012.
  2. A.Kinalis, S. Nikoletseas, D. Patroumpa, and J. Rolim, "Biased sink mobility with adaptive stop times for low latency data collection in sensor networks," Information fusion, vol. 15, pp. 56-63, 2014.
  3. A.W. Khan, A. H. Abdullah, M. H. Anisi, and J. I. Bangash, "A comprehensive study of data collection schemes using mobile sinks in wireless sensor networks," Sensors, vol. 14, pp. 2510-2548, 2014.
  4. M. Bishop, "Introduction to computer security," 2005.
  5. B. Nazir and H. Hasbullah, "Mobile sink based routing protocol (MSRP) for prolonging network lifetime in clustered wireless sensor network," in 2010 international conference on computer applications and industrial electronics, 2010, pp. 624-629.
  6. E. B. Hamida and G. Chelius, "Strategies for data dissemination to mobile sinks in wireless sensor networks," IEEE Wireless Communications, vol. 15, pp. 31-37, 2008.
  7. G. C. Kessler, "An overview of cryptography," 2003.
  8. C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks," in Proceedings of the 6th annual international conference on Mobile computing and networking, 2000, pp. 56-67.
  9. I.V.S. Manoj, "Cryptography and steganography," International Journal of Computer Applications, vol. 1, pp. 63-68, 2010.
  10. A.Doricchi, C. M. Platnich, A. Gimpel, F. Horn, M. Earle, G. Lanzavecchia, et al., "Emerging Approaches to DNA Data Storage: Challenges and Prospects," ACS nano, vol. 16, pp. 17552-17571, 2022.
  11. L. Ceze, J. Nivala, and K. Strauss, "Molecular digital data storage using DNA," Nature Reviews Genetics, vol. 20, pp. 456-466, 2019.
  12. R. R. Sinden, DNA structure and function: Gulf Professional Publishing, 1994.
  13. S. Marwan, A. Shawish, and K. Nagaty, "DNA-based cryptographic methods for data hiding in DNA media," Biosystems, vol. 150, pp. 110-118, 2016.
  14. J.-S. Taur, H.-Y. Lin, H.-L. Lee, and C.-W. Tao, "Data hiding in DNA sequences based on table lookup substitution," International Journal of Innovative Computing, Information and Control, vol. 8, pp. 6585-6598, 2012.
  15. A.J. Pinho and D. Pratas, "MFCompress: a compression tool for FASTA and multi-FASTA data," Bioinformatics, vol. 30, pp. 117-118, 2013.
  16. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM systems journal, vol. 35, pp. 313-336, 1996.
  17. K. Sharma, A. Aggarwal, T. Singhania, D. Gupta, and A. Khanna, "Hiding data in images using cryptography and deep neural network," arXiv preprint arXiv:1912.10413, 2019.
  18. A.A. Abd EL-Latif, B. Abd-El-Atty, and S. E. Venegas-Andraca, "A novel image steganography technique based on quantum substitution boxes," Optics & Laser Technology, vol. 116, pp. 92-102, 2019.
  19. S. Arora, P. Gupta, V. Goar, M. Kuri, H. K. Channi, and C. L. Chowdhary, "Key Based Steganography Using Convolutions," in Advances in Information Communication Technology and Computing: Proceedings of AICTC 2022, ed: Springer, 2023, pp. 617-625.
  20. Y. S. Al-Halabi, "A symmetric key based steganography calculation for anchored information," J Theor Appl Inf Technol, vol. 98, pp. 103-123, 2020.
  21. O.Evsutin, A. Melman, and R. Meshcheryakov, "Digital steganography and watermarking for digital images: A review of current research directions," IEEE Access, vol. 8, pp. 166589-166611, 2020.
  22. A.Jeltsch, "Beyond Watson and Crick: DNA methylation and molecular enzymology of DNA methyltransferases," Chembiochem, vol. 3, pp. 274-293, 2002.
  23. J. D. Watson and F. H. Crick, "The structure of DNA," in Cold Spring Harbor symposia on quantitative biology, 1953, pp. 123-131.
  24. S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini, "Towards DNA based data security in the cloud computing environment," Computer Communications, vol. 151, pp. 539-547, 2020.
  25. L. Hood and D. Galas, "The digital code of DNA," Nature, vol. 421, pp. 444-448, 2003.
  26. A.D. Johnson, "An extended IUPAC nomenclature code for polymorphic nucleic acids," Bioinformatics, vol. 26, pp. 1386-1389, 2010.
  27. S. Deorowicz and S. Grabowski, "Compression of DNA sequence reads in FASTQ format," Bioinformatics, vol. 27, pp. 860-862, 2011.
  28. W. R. Pearson, "Using the FASTA program to search protein and DNA sequence databases," Computer Analysis of Sequence Data: Part I, pp. 307-331, 1994.
  29. F. Madeira, N. Madhusoodanan, J. Lee, A. R. Tivey, and R. Lopez, "Using EMBLEBI Services via Web Interface and Programmatically via Web Services," Current protocols in bioinformatics, vol. 66, p. e74, 2019.
  30. W. L. P. III, "JavaScript DNA translator: DNA-aligned protein translations," Biotechniques, vol. 33, pp. 1318-1320, 2002.
  31. Y. Nakamura, T. Gojobori, and T. Ikemura, "Codon usage tabulated from international DNA sequence databases: status for the year 2000," Nucleic acids research, vol. 28, pp. 292-292, 2000.
  32. R. Dölz, "GCG: translation of DNA sequence," Computer Analysis of Sequence Data: Part I, pp. 129-142, 1994.
  33. H. G. Griffin and A. M. Griffin, "Software update," ed: Springer, 1998.
  34. M. S. Rahman, I. Khalil, and X. Yi, "A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems," International Journal of Information Management, vol. 45, pp. 276-288, 2019.
  35. D. A. Benson, M. S. Boguski, D. J. Lipman, J. Ostell, and B. Ouellette, "GenBank," Nucleic acids research, vol. 26, p. 1, 1998.
  36. E. W. Sayers, M. Cavanaugh, K. Clark, J. Ostell, K. D. Pruitt, and I. Karsch-Mizrachi, "GenBank," Nucleic acids research, vol. 47, pp. D94-D99, 2019.
  37. J. Jurka, P. Klonowski, V. Dagman, and P. Pelton, "CENSOR—a program for identification and elimination of repetitive elements from DNA sequences," Computers & chemistry, vol. 20, pp. 119-121, 1996.
  38. G. Peterson, "Arnold’s cat map," Math Linear Algebra, vol. 45, pp. 1-7, 1997.
  39. E. Hariyanto and R. Rahim, "Arnold’s cat map algorithm in digital image encryption," International Journal of Science and Research (IJSR), vol. 5, pp. 1363-1365, 2016.
  40. C. E. Souza, D. P. Chaves, and C. Pimentel, "One-Dimensional Pseudo-Chaotic Sequences Based on the Discrete Arnold’s Cat Map Over ℤ₃ᵐ," IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 68, pp. 491-495, 2020.