New Data Hiding Approach Based on Biological Functionality of DNA Sequence
Data hiding or steganography has been used ever since a secret message was needed to be transferred. Data hiding methods need a medium to be cover for secret message that is to be sent. Different mediums are used such as image, video, audio, and last decade the deoxyribose nucleic acid (DNA). In this paper, a new data hiding approach based on the DNA sequence is proposed. Unlike many existing methods, the proposed method does not change the biological functionality of the DNA reference sequence when the sequence is translated into amino acids. The proposed method is consisting of two steps: the first step is encrypting the message using the Toffoli quantum gate. The second step is embedding the encrypted message into DNA sequence by taking one codon at a time and considering amino acids' biological functionality during the embedding process. Experimental results show that the proposed method outperforms the existing schemes preserving biological functionality in terms of cracking probability, and hiding capacity for bit per nucleotide.
Adams, M., Kelley, J., Gocayne, J., Dubnick, M., Polymeropoulos, M., Xiao, H., … et, a. (1991). Complementary DNA sequencing: Expressed sequence tags and human genome project. Science, 252(5013), 1651–1656. https://doi.org/10.1126/science.2047873
Adleman, L. M. A. (1994). Molecular Computation of Solutions to Combinatorial Problems. Science, 266, 1021–2024.
Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 5(3), 75–80. https://doi.org/10.1109/4236.935180
Bancroft, C. (2001). Long-Term Storage of Information in DNA. Science, 293(5536), 1763c–11765. https://doi.org/10.1126/science.293.5536.1763c
Dagher, G. G., Machado, A. P., Davis, E. C., Green, T., Martin, J., & Ferguson, M. (2019). Data storage in cellular DNA: Contextualizing diverse encoding schemes. Evolutionary Intelligence. https://doi.org/10.1007/s12065-019-00202-z
Dodis, Y., Mironov, I., & Stephens-Davidowitz, N. (2016). Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines. In M. Robshaw & J. Katz (Eds.), Advances in Cryptology – CRYPTO 2016 (Vol. 9814, pp. 341–372). https://doi.org/10.1007/978-3-662-53018-4_13
Eesa, A. S., Orman, Z., & Brifcani, A. M. A. (2015). A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Systems with Applications, 42(5), 2670–2679. https://doi.org/10.1016/j.eswa.2014.11.009
European Nucleotide Archive. (n.d.). Retrieved 6 1, 2019, from The European Bioinformatics Institute: https://www.ebi.ac.uk/ena
Gyongyosi, L., & Imre, S. (2019). A Survey on quantum computing technology. Computer Science Review, 31, 51–71. https://doi.org/10.1016/j.cosrev.2018.11.002
Hafeez, I., Khan, A., & Qadir, A. (2014). DNA-LCEB: A high-capacity and mutation-resistant DNA data-hiding approach by employing encryption, error correcting codes, and hybrid twofold and fourfold codon-based strategy for synonymous substitution in amino acids. Medical & Biological Engineering & Computing, 52(11), 945–961. https://doi.org/10.1007/s11517-014-1194-2
Hartwell, L. H., Hopfield, J. J., Leibler, S., & Murray, A. W. (1999). From molecular to modular cell biology. Nature, 402(S6761), C47–C52. https://doi.org/10.1038/35011540
Huang, Y.-H., Chang, C.-C., & Wu, C.-Y. (2014). A DNA-based data hiding technique with low modification rates. Multimedia Tools and Applications, 70(3), 1439–1451. https://doi.org/10.1007/s11042-012-1176-z
Jiang, N., Zhao, N., & Wang, L. (2016). LSB Based Quantum Image Steganography Algorithm. International Journal of Theoretical Physics, 55(1), 107–123. https://doi.org/10.1007/s10773-015-2640-0
Kakde, Y., Gonnade, P., & Dahiwale, P. (2015). Audio-video steganography. 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 1–6. https://doi.org/10.1109/ICIIECS.2015.7192885
Kalsi, S., Kaur, H., & Chang, V. (2018). DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. Journal of Medical Systems, 42(1), 17. https://doi.org/10.1007/s10916-017-0851-z
Leier, A., Richter, C., Banzhaf, W., & Rauhe, H. (2000). Cryptography with DNA binary strands. Biosystems, 57(1), 13–22. https://doi.org/10.1016/S0303-2647(00)00083-6
Mstafa, R. J., & Elleithy, K. M. (2017). Compressed and raw video steganography techniques: A comprehensive survey and analysis. Multimedia Tools and Applications, 76(20), 21749–21786. https://doi.org/10.1007/s11042-016-4055-1
P, M., M, M., R, M., Raghavan, V., & R.E., V. (2017). Highly Improved DNA Based Steganography. Procedia Computer Science, 115, 651–659. https://doi.org/10.1016/j.procs.2017.09.151
Patnala, B. D., & Kiran Kumar, R. (2019). A Novel Level-Based DNA Security Algorithm Using DNA Codons. In Ch. Satyanarayana, K. N. Rao, & R. G. Bush, Computational Intelligence and Big Data Analytics (pp. 1–13). https://doi.org/10.1007/978-981-13-0544-3_1
Peterson, I. (2001). Hiding in DNA. Proceedings of Muse, 22.
Ramadhan J Mstafa, & Elleithy, K. M. (2017). Efficient and Robust Video Steganography Algorithms for Secure Data Communication. https://doi.org/10.13140/rg.2.2.33095.50083
R.B., S., M.V., N., G.R., M., Johar, S., & G.S., H. (2019). DNA based Steganography Using 2-3-3 Technique. 2019 International Conference on Data Science and Communication (IconDSC), 1–6. https://doi.org/10.1109/IconDSC.2019.8816945
Shimanovsky, B., Feng, J., & Potkonjak, M. (2003). Hiding Data in DNA. In F. A. P. Petitcolas (Ed.), Information Hiding (Vol. 2578, pp. 373–386). https://doi.org/10.1007/3-540-36415-3_24
Shiu, H. J., Ng, K. L., Fang, J. F., Lee, R. C. T., & Huang, C. H. (2010). Data hiding methods based upon DNA sequences. Information Sciences, 180(11), 2196–2208. https://doi.org/10.1016/j.ins.2010.01.030
Toffoli, T. (1980). Reversible computing. In J. Bakker & J. Leeuwen (Eds.), Automata, Languages and Programming (Vol. 85, pp. 632–644). https://doi.org/10.1007/3-540-10003-2_104
Copyright (c) 2019 Abdullah A. Abdullah, Adel S. Eesa, Ahmed M. Abdo
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-SA 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work, with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online.