Utilizing DNA Strands for Secured Data-Hiding with High Capacity

There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing quantities of information is crucial. From nature to scien...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of interactive mobile technologies 2017-04, Vol.11 (2), p.88
Hauptverfasser: Marwan, Samiha Abdelrahman Mohammed, Shawish, Ahmed, Nagaty, Khaled
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 2
container_start_page 88
container_title International journal of interactive mobile technologies
container_volume 11
creator Marwan, Samiha Abdelrahman Mohammed
Shawish, Ahmed
Nagaty, Khaled
description There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing quantities of information is crucial. From nature to science, the idea that genes themselves are made of information stimulated the research in molecular deoxyribonucleic acid (DNA). DNA is capable of storing huge amounts of data, which leads to its promising effect in steganography. DNA steganography is the art of using DNA as an information carrier which achieves high data storage capacity as well as high security level. Currently, DNA steganography techniques utilize the properties of only one DNA strand, since the other strand is completely dependent on the first one. This paper presents a DNA-based steganography technique that hides data into both DNA strands with respect to the dependency between the two strands. In the proposed technique, a key of the same length of the reference DNA sequence is generated after using the second DNA strand. The sender sends both the encrypted DNA message and its reference DNA sequence together into a microdot. If the recipient receives this microdot uncontaminated, the sender can safely send the generated key afterwards. The proposed technique doubles the amount of data stored and guarantees a secure transmission process as well, for even if the attacker suspects the first-sent DNA sequence, they will never receive the key, and hence full data extraction is nearly impossible. The conducted experimental study confirms the effectiveness of the proposed.
doi_str_mv 10.3991/ijim.v11i2.6565
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_3991_ijim_v11i2_6565</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_3991_ijim_v11i2_6565</sourcerecordid><originalsourceid>FETCH-LOGICAL-c156t-ab93008adaa5dca878cdf54d58716698ca63f63e173a9c13363785ebb6fbf7d13</originalsourceid><addsrcrecordid>eNpN0EtPAjEUBeDGaCJB1m77B2Zop_S1k4A6JkQXyLq50weU8EpbNfjrddSFd3Pu4uQsPoRuKamZ1nQct3Ffv1Mam1pwwS_QgCrBK6kbdvnvv0ajnLfk-xid8IYM0N2qxF38jIc1nj9P8bIkOLiMwzHhpbdvyTs8hwJVG13f-Yhlg9u43uAZnMDGcr5BVwF22Y_-cohWD_evs7ZavDw-zaaLylIuSgWdZoQocADcWVBSWRf4xHElqRBaWRAsCOapZKAtZUwwqbjvOhG6IB1lQzT-3bXpmHPywZxS3EM6G0pMb2B6A_NjYHoD9gWqmFAz</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Utilizing DNA Strands for Secured Data-Hiding with High Capacity</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Marwan, Samiha Abdelrahman Mohammed ; Shawish, Ahmed ; Nagaty, Khaled</creator><creatorcontrib>Marwan, Samiha Abdelrahman Mohammed ; Shawish, Ahmed ; Nagaty, Khaled</creatorcontrib><description>There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing quantities of information is crucial. From nature to science, the idea that genes themselves are made of information stimulated the research in molecular deoxyribonucleic acid (DNA). DNA is capable of storing huge amounts of data, which leads to its promising effect in steganography. DNA steganography is the art of using DNA as an information carrier which achieves high data storage capacity as well as high security level. Currently, DNA steganography techniques utilize the properties of only one DNA strand, since the other strand is completely dependent on the first one. This paper presents a DNA-based steganography technique that hides data into both DNA strands with respect to the dependency between the two strands. In the proposed technique, a key of the same length of the reference DNA sequence is generated after using the second DNA strand. The sender sends both the encrypted DNA message and its reference DNA sequence together into a microdot. If the recipient receives this microdot uncontaminated, the sender can safely send the generated key afterwards. The proposed technique doubles the amount of data stored and guarantees a secure transmission process as well, for even if the attacker suspects the first-sent DNA sequence, they will never receive the key, and hence full data extraction is nearly impossible. The conducted experimental study confirms the effectiveness of the proposed.</description><identifier>ISSN: 1865-7923</identifier><identifier>EISSN: 1865-7923</identifier><identifier>DOI: 10.3991/ijim.v11i2.6565</identifier><language>eng</language><ispartof>International journal of interactive mobile technologies, 2017-04, Vol.11 (2), p.88</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c156t-ab93008adaa5dca878cdf54d58716698ca63f63e173a9c13363785ebb6fbf7d13</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Marwan, Samiha Abdelrahman Mohammed</creatorcontrib><creatorcontrib>Shawish, Ahmed</creatorcontrib><creatorcontrib>Nagaty, Khaled</creatorcontrib><title>Utilizing DNA Strands for Secured Data-Hiding with High Capacity</title><title>International journal of interactive mobile technologies</title><description>There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing quantities of information is crucial. From nature to science, the idea that genes themselves are made of information stimulated the research in molecular deoxyribonucleic acid (DNA). DNA is capable of storing huge amounts of data, which leads to its promising effect in steganography. DNA steganography is the art of using DNA as an information carrier which achieves high data storage capacity as well as high security level. Currently, DNA steganography techniques utilize the properties of only one DNA strand, since the other strand is completely dependent on the first one. This paper presents a DNA-based steganography technique that hides data into both DNA strands with respect to the dependency between the two strands. In the proposed technique, a key of the same length of the reference DNA sequence is generated after using the second DNA strand. The sender sends both the encrypted DNA message and its reference DNA sequence together into a microdot. If the recipient receives this microdot uncontaminated, the sender can safely send the generated key afterwards. The proposed technique doubles the amount of data stored and guarantees a secure transmission process as well, for even if the attacker suspects the first-sent DNA sequence, they will never receive the key, and hence full data extraction is nearly impossible. The conducted experimental study confirms the effectiveness of the proposed.</description><issn>1865-7923</issn><issn>1865-7923</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNpN0EtPAjEUBeDGaCJB1m77B2Zop_S1k4A6JkQXyLq50weU8EpbNfjrddSFd3Pu4uQsPoRuKamZ1nQct3Ffv1Mam1pwwS_QgCrBK6kbdvnvv0ajnLfk-xid8IYM0N2qxF38jIc1nj9P8bIkOLiMwzHhpbdvyTs8hwJVG13f-Yhlg9u43uAZnMDGcr5BVwF22Y_-cohWD_evs7ZavDw-zaaLylIuSgWdZoQocADcWVBSWRf4xHElqRBaWRAsCOapZKAtZUwwqbjvOhG6IB1lQzT-3bXpmHPywZxS3EM6G0pMb2B6A_NjYHoD9gWqmFAz</recordid><startdate>20170411</startdate><enddate>20170411</enddate><creator>Marwan, Samiha Abdelrahman Mohammed</creator><creator>Shawish, Ahmed</creator><creator>Nagaty, Khaled</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20170411</creationdate><title>Utilizing DNA Strands for Secured Data-Hiding with High Capacity</title><author>Marwan, Samiha Abdelrahman Mohammed ; Shawish, Ahmed ; Nagaty, Khaled</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c156t-ab93008adaa5dca878cdf54d58716698ca63f63e173a9c13363785ebb6fbf7d13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Marwan, Samiha Abdelrahman Mohammed</creatorcontrib><creatorcontrib>Shawish, Ahmed</creatorcontrib><creatorcontrib>Nagaty, Khaled</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of interactive mobile technologies</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Marwan, Samiha Abdelrahman Mohammed</au><au>Shawish, Ahmed</au><au>Nagaty, Khaled</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Utilizing DNA Strands for Secured Data-Hiding with High Capacity</atitle><jtitle>International journal of interactive mobile technologies</jtitle><date>2017-04-11</date><risdate>2017</risdate><volume>11</volume><issue>2</issue><spage>88</spage><pages>88-</pages><issn>1865-7923</issn><eissn>1865-7923</eissn><abstract>There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing quantities of information is crucial. From nature to science, the idea that genes themselves are made of information stimulated the research in molecular deoxyribonucleic acid (DNA). DNA is capable of storing huge amounts of data, which leads to its promising effect in steganography. DNA steganography is the art of using DNA as an information carrier which achieves high data storage capacity as well as high security level. Currently, DNA steganography techniques utilize the properties of only one DNA strand, since the other strand is completely dependent on the first one. This paper presents a DNA-based steganography technique that hides data into both DNA strands with respect to the dependency between the two strands. In the proposed technique, a key of the same length of the reference DNA sequence is generated after using the second DNA strand. The sender sends both the encrypted DNA message and its reference DNA sequence together into a microdot. If the recipient receives this microdot uncontaminated, the sender can safely send the generated key afterwards. The proposed technique doubles the amount of data stored and guarantees a secure transmission process as well, for even if the attacker suspects the first-sent DNA sequence, they will never receive the key, and hence full data extraction is nearly impossible. The conducted experimental study confirms the effectiveness of the proposed.</abstract><doi>10.3991/ijim.v11i2.6565</doi></addata></record>
fulltext fulltext
identifier ISSN: 1865-7923
ispartof International journal of interactive mobile technologies, 2017-04, Vol.11 (2), p.88
issn 1865-7923
1865-7923
language eng
recordid cdi_crossref_primary_10_3991_ijim_v11i2_6565
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
title Utilizing DNA Strands for Secured Data-Hiding with High Capacity
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T19%3A04%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Utilizing%20DNA%20Strands%20for%20Secured%20Data-Hiding%20with%20High%20Capacity&rft.jtitle=International%20journal%20of%20interactive%20mobile%20technologies&rft.au=Marwan,%20Samiha%20Abdelrahman%20Mohammed&rft.date=2017-04-11&rft.volume=11&rft.issue=2&rft.spage=88&rft.pages=88-&rft.issn=1865-7923&rft.eissn=1865-7923&rft_id=info:doi/10.3991/ijim.v11i2.6565&rft_dat=%3Ccrossref%3E10_3991_ijim_v11i2_6565%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true