New Data Hiding Approach Based on Biological Functionality of DNA Sequence

  • Abdullah A. Abdullah Department Computer Science, Faculty of Science, University of Zakho, Kurdistan Region, Iraq 
  • Adel S. Eesa Department of Computer Science, Faculty of Science, University of Zakho, Kurdistan Region, Iraq https://orcid.org/0000-0001-7106-7999
  • Ahmed M. Abdo Department of Computer Science, Faculty of Science, University of Zakho, Kurdistan Region, Iraq https://orcid.org/0000-0002-0871-8282
Keywords: Steganography, Information hiding, information Security, DNA sequence, Toffoli quantum gate

Abstract

Data hiding or steganography has been used ever since a secret message was needed to be transferred. Data hiding methods need a medium to be cover for secret message that is to be sent. Different mediums are used such as image, video, audio, and last decade the deoxyribose nucleic acid (DNA). In this paper, a new data hiding approach based on the DNA sequence is proposed. Unlike many existing methods, the proposed method does not change the biological functionality of the DNA reference sequence when the sequence is translated into amino acids. The proposed method is consisting of two steps: the first step is encrypting the message using the Toffoli quantum gate. The second step is embedding the encrypted message into DNA sequence by taking one codon at a time and considering amino acids' biological functionality during the embedding process. Experimental results show that the proposed method outperforms the existing schemes preserving biological functionality in terms of cracking probability, and hiding capacity for bit per nucleotide.

Author Biographies

Abdullah A. Abdullah, Department Computer Science, Faculty of Science, University of Zakho, Kurdistan Region, Iraq 

Dept. Computer Science, Faculty of Science, University of Zakho, Kurdistan Region, Iraq  (abdullah.abdullah@uoz.edu.krd)

Adel S. Eesa, Department of Computer Science, Faculty of Science, University of Zakho, Kurdistan Region, Iraq

Dept. Computer Science, Faculty of Science, University of Zakho, Kurdistan Region, Iraq (adel.eesa@uoz.edu.krd)

Ahmed M. Abdo, Department of Computer Science, Faculty of Science, University of Zakho, Kurdistan Region, Iraq

Dept. Computer Science, Faculty of Science, University of Zakho, Kurdistan Region, Iraq (ahmed.abdo@uoz.edu.krd)

References

Abdo, A. M., Sabry, A., & A., A. (2018). A New Message Encryption Method based on Amino Acid Sequences and Genetic Codes. International Journal of Advanced Computer Science and Applications, 9(8). https://doi.org/10.14569/IJACSA.2018.090872
Adams, M., Kelley, J., Gocayne, J., Dubnick, M., Polymeropoulos, M., Xiao, H., … et, a. (1991). Complementary DNA sequencing: Expressed sequence tags and human genome project. Science, 252(5013), 1651–1656. https://doi.org/10.1126/science.2047873
Adleman, L. M. A. (1994). Molecular Computation of Solutions to Combinatorial Problems. Science, 266, 1021–2024.
Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 5(3), 75–80. https://doi.org/10.1109/4236.935180
Bancroft, C. (2001). Long-Term Storage of Information in DNA. Science, 293(5536), 1763c–11765. https://doi.org/10.1126/science.293.5536.1763c
Dagher, G. G., Machado, A. P., Davis, E. C., Green, T., Martin, J., & Ferguson, M. (2019). Data storage in cellular DNA: Contextualizing diverse encoding schemes. Evolutionary Intelligence. https://doi.org/10.1007/s12065-019-00202-z
Dodis, Y., Mironov, I., & Stephens-Davidowitz, N. (2016). Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines. In M. Robshaw & J. Katz (Eds.), Advances in Cryptology – CRYPTO 2016 (Vol. 9814, pp. 341–372). https://doi.org/10.1007/978-3-662-53018-4_13
Eesa, A. S., Orman, Z., & Brifcani, A. M. A. (2015). A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Systems with Applications, 42(5), 2670–2679. https://doi.org/10.1016/j.eswa.2014.11.009
European Nucleotide Archive. (n.d.). Retrieved 6 1, 2019, from The European Bioinformatics Institute: https://www.ebi.ac.uk/ena
Gyongyosi, L., & Imre, S. (2019). A Survey on quantum computing technology. Computer Science Review, 31, 51–71. https://doi.org/10.1016/j.cosrev.2018.11.002
Hafeez, I., Khan, A., & Qadir, A. (2014). DNA-LCEB: A high-capacity and mutation-resistant DNA data-hiding approach by employing encryption, error correcting codes, and hybrid twofold and fourfold codon-based strategy for synonymous substitution in amino acids. Medical & Biological Engineering & Computing, 52(11), 945–961. https://doi.org/10.1007/s11517-014-1194-2
Hartwell, L. H., Hopfield, J. J., Leibler, S., & Murray, A. W. (1999). From molecular to modular cell biology. Nature, 402(S6761), C47–C52. https://doi.org/10.1038/35011540
Huang, Y.-H., Chang, C.-C., & Wu, C.-Y. (2014). A DNA-based data hiding technique with low modification rates. Multimedia Tools and Applications, 70(3), 1439–1451. https://doi.org/10.1007/s11042-012-1176-z
Jiang, N., Zhao, N., & Wang, L. (2016). LSB Based Quantum Image Steganography Algorithm. International Journal of Theoretical Physics, 55(1), 107–123. https://doi.org/10.1007/s10773-015-2640-0
Kakde, Y., Gonnade, P., & Dahiwale, P. (2015). Audio-video steganography. 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 1–6. https://doi.org/10.1109/ICIIECS.2015.7192885
Kalsi, S., Kaur, H., & Chang, V. (2018). DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. Journal of Medical Systems, 42(1), 17. https://doi.org/10.1007/s10916-017-0851-z
Leier, A., Richter, C., Banzhaf, W., & Rauhe, H. (2000). Cryptography with DNA binary strands. Biosystems, 57(1), 13–22. https://doi.org/10.1016/S0303-2647(00)00083-6
Mstafa, R. J., & Elleithy, K. M. (2017). Compressed and raw video steganography techniques: A comprehensive survey and analysis. Multimedia Tools and Applications, 76(20), 21749–21786. https://doi.org/10.1007/s11042-016-4055-1
P, M., M, M., R, M., Raghavan, V., & R.E., V. (2017). Highly Improved DNA Based Steganography. Procedia Computer Science, 115, 651–659. https://doi.org/10.1016/j.procs.2017.09.151
Patnala, B. D., & Kiran Kumar, R. (2019). A Novel Level-Based DNA Security Algorithm Using DNA Codons. In Ch. Satyanarayana, K. N. Rao, & R. G. Bush, Computational Intelligence and Big Data Analytics (pp. 1–13). https://doi.org/10.1007/978-981-13-0544-3_1
Peterson, I. (2001). Hiding in DNA. Proceedings of Muse, 22.
Ramadhan J Mstafa, & Elleithy, K. M. (2017). Efficient and Robust Video Steganography Algorithms for Secure Data Communication. https://doi.org/10.13140/rg.2.2.33095.50083
R.B., S., M.V., N., G.R., M., Johar, S., & G.S., H. (2019). DNA based Steganography Using 2-3-3 Technique. 2019 International Conference on Data Science and Communication (IconDSC), 1–6. https://doi.org/10.1109/IconDSC.2019.8816945
Shimanovsky, B., Feng, J., & Potkonjak, M. (2003). Hiding Data in DNA. In F. A. P. Petitcolas (Ed.), Information Hiding (Vol. 2578, pp. 373–386). https://doi.org/10.1007/3-540-36415-3_24
Shiu, H. J., Ng, K. L., Fang, J. F., Lee, R. C. T., & Huang, C. H. (2010). Data hiding methods based upon DNA sequences. Information Sciences, 180(11), 2196–2208. https://doi.org/10.1016/j.ins.2010.01.030
Toffoli, T. (1980). Reversible computing. In J. Bakker & J. Leeuwen (Eds.), Automata, Languages and Programming (Vol. 85, pp. 632–644). https://doi.org/10.1007/3-540-10003-2_104
Published
2019-12-30
How to Cite
Abdullah, A., Eesa, A., & Abdo, A. (2019). New Data Hiding Approach Based on Biological Functionality of DNA Sequence. Science Journal of University of Zakho, 7(4), 184-189. https://doi.org/10.25271/sjuoz.2019.7.4.647
Section
Science Journal of University of Zakho