Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Double layer steganography technique using DNA sequences and images

View through CrossRef
Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently, data security is an essential component of data communication. One of the most effective methods used to achieve secrecy is steganography. This method hides data within a cover object without raising suspicion. The level of security is improved when two steganography methods are combined. This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system. Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks. The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data. The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method. Eventually, the stego image is sent to the intended recipient. Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments. The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.078 and 72.2, respectively. Finally, the PNG and BMP images show excellent results. On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security.
Title: Double layer steganography technique using DNA sequences and images
Description:
Information security has become increasingly challenging as a result of massive advancements in information and communication technologies.
Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks.
Consequently, data security is an essential component of data communication.
One of the most effective methods used to achieve secrecy is steganography.
This method hides data within a cover object without raising suspicion.
The level of security is improved when two steganography methods are combined.
This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system.
Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks.
The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data.
The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method.
Eventually, the stego image is sent to the intended recipient.
Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments.
The results show that the proposed mechanism is resistant to histogram and chi-square attacks.
The maximum mean value observed was 0.
05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information.
In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.
078 and 72.
2, respectively.
Finally, the PNG and BMP images show excellent results.
On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security.

Related Results

Genome wide hypomethylation and youth-associated DNA gap reduction promoting DNA damage and senescence-associated pathogenesis
Genome wide hypomethylation and youth-associated DNA gap reduction promoting DNA damage and senescence-associated pathogenesis
Abstract Background: Age-associated epigenetic alteration is the underlying cause of DNA damage in aging cells. Two types of youth-associated DNA-protection epigenetic mark...
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Echinococcus granulosus in Environmental Samples: A Cross-Sectional Molecular Study
Echinococcus granulosus in Environmental Samples: A Cross-Sectional Molecular Study
Abstract Introduction Echinococcosis, caused by tapeworms of the Echinococcus genus, remains a significant zoonotic disease globally. The disease is particularly prevalent in areas...
Proposed Algorithm Using Image in Multi Level Text Steganography
Proposed Algorithm Using Image in Multi Level Text Steganography
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data....
Reversible Image Steganography: A Review of Existing GAN-based Models
Reversible Image Steganography: A Review of Existing GAN-based Models
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capaci...
Analysis review on feature-based and word-rule based techniques in text steganography
Analysis review on feature-based and word-rule based techniques in text steganography
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation ...
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The...
Preparation and performance of double-layer metal mesh transparent conductive films based on crack template method
Preparation and performance of double-layer metal mesh transparent conductive films based on crack template method
In order to improve the electromagnetic shielding performance of the single-layer metal mesh transparent conductive films (SMMTCFs) based on the crack template method, the preparat...

Back to Top