Skip to main content

2021 | OriginalPaper | Buchkapitel

8. A LSB Substitution-Based Steganography Technique Using DNA Computing for Colour Images

verfasst von : Subhadip Mukherjee, Sunita Sarkar, Somnath Mukhopadhyay

Erschienen in: Proceedings of International Conference on Innovations in Software Architecture and Computational Systems

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Steganography is the process of using a cover or medium such as photograph, audio, text and video to shield information from the outer world. This paper suggested a new approach based on DNA computing for hiding information within an image using the least significant bit (LSB). To do this, the DNA is decomposed by four nucleotides, namely adenine, thymine, guanine and cytosine. Whereas a codon is a sequence of three nucleotides and to represent a codon, the two-pixel LSBs from the image are taken and then converted into protein. The confidential data bits are concealed into the codons, which transmutes the original cover image into a stego-image which is completely trustworthy to avoid human visual system, and the confidential data is impossible to detect. The empirical findings show the effectiveness of the suggested approach by producing 0.750 bpp of hiding power with average 56.48 dB of peak signal-to-noise ratio (PSNR) which makes it a strong image steganography technique.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Rani SS, Alzubi JA, Lakshmanaprabu S, Gupta D, Manikandan R (2019) Optimal users based secure data transmission on the internet of healthcare things (Ioht) with lightweight block ciphers. Multimedia Tools and Applications, pp 1–20 Rani SS, Alzubi JA, Lakshmanaprabu S, Gupta D, Manikandan R (2019) Optimal users based secure data transmission on the internet of healthcare things (Ioht) with lightweight block ciphers. Multimedia Tools and Applications, pp 1–20
2.
Zurück zum Zitat Gochhayat SP, Lal C, Sharma L, Sharma D, Gupta D, Saucedo JAM, Kose U (2019) Reliable and secure data transfer in Iot networks. Wireless Networks, pp 1–14 Gochhayat SP, Lal C, Sharma L, Sharma D, Gupta D, Saucedo JAM, Kose U (2019) Reliable and secure data transfer in Iot networks. Wireless Networks, pp 1–14
3.
Zurück zum Zitat Easttom W (2021) Quantum computing and cryptography. In: Modern cryptography. Springer, pp 385–390 Easttom W (2021) Quantum computing and cryptography. In: Modern cryptography. Springer, pp 385–390
4.
Zurück zum Zitat Sadhukhan D, Ray S, Biswas G, Khan M, Dasgupta M (2021) A lightweight remote user authentication scheme for iot communication using elliptic curve cryptography. J Supercomput 77(2):1114–1151CrossRef Sadhukhan D, Ray S, Biswas G, Khan M, Dasgupta M (2021) A lightweight remote user authentication scheme for iot communication using elliptic curve cryptography. J Supercomput 77(2):1114–1151CrossRef
5.
Zurück zum Zitat Kaur S, Bansal S, Bansal RK (2021) Image steganography for securing secret data using hybrid hiding model. Multimedia Tools Appl 80(5):7749–7769CrossRef Kaur S, Bansal S, Bansal RK (2021) Image steganography for securing secret data using hybrid hiding model. Multimedia Tools Appl 80(5):7749–7769CrossRef
6.
Zurück zum Zitat Mukherjee S, Jana B (2019) A novel method for high capacity reversible data hiding scheme using difference expansion. Int J Nat Comput Res (IJNCR) 8(4):13–27CrossRef Mukherjee S, Jana B (2019) A novel method for high capacity reversible data hiding scheme using difference expansion. Int J Nat Comput Res (IJNCR) 8(4):13–27CrossRef
7.
Zurück zum Zitat Abikoye OC, Ojo UA, Awotunde JB, Ogundokun RO (2020) A safe and secured iris template using steganography and cryptography. Multimedia Tools Appl 79(31):23483–23506CrossRef Abikoye OC, Ojo UA, Awotunde JB, Ogundokun RO (2020) A safe and secured iris template using steganography and cryptography. Multimedia Tools Appl 79(31):23483–23506CrossRef
8.
Zurück zum Zitat El-Khamy SE, Korany NO, Mohamed AG (2020) A new fuzzy-dna image encryption and steganography technique. IEEE Access 8:148935–148951CrossRef El-Khamy SE, Korany NO, Mohamed AG (2020) A new fuzzy-dna image encryption and steganography technique. IEEE Access 8:148935–148951CrossRef
9.
Zurück zum Zitat Al-Harbi OA, Alahmadi WE, Aljahdali AO (2020) Security analysis of dna based steganography techniques. SN Appl Sci 2(2):1–10CrossRef Al-Harbi OA, Alahmadi WE, Aljahdali AO (2020) Security analysis of dna based steganography techniques. SN Appl Sci 2(2):1–10CrossRef
10.
Zurück zum Zitat Gambhir G, Mandal JK (2021) Shared memory implementation and performance analysis of lsb steganography based on chaotic tent map. Innovations in systems and software engineering, pp 1–10 Gambhir G, Mandal JK (2021) Shared memory implementation and performance analysis of lsb steganography based on chaotic tent map. Innovations in systems and software engineering, pp 1–10
11.
Zurück zum Zitat Chatterjee A, Ghosal SK, Sarkar R (2020) Lsb based steganography with ocr: an intelligent amalgamation. In: Multimedia tools and applications, pp 1–19 Chatterjee A, Ghosal SK, Sarkar R (2020) Lsb based steganography with ocr: an intelligent amalgamation. In: Multimedia tools and applications, pp 1–19
12.
Zurück zum Zitat Nisperos ZA, Gerardo B, Hernandez A (2020) Key generation for zero steganography using dna sequences. In: 2020 12th international conference on electronics, computers and artificial intelligence (ECAI). IEEE, pp 1–6 Nisperos ZA, Gerardo B, Hernandez A (2020) Key generation for zero steganography using dna sequences. In: 2020 12th international conference on electronics, computers and artificial intelligence (ECAI). IEEE, pp 1–6
13.
Zurück zum Zitat Jose A, Subramaniam K (2020) Dna based sha512-ecc cryptography and cm-csa based steganography for data security. In: Materials today: proceedings Jose A, Subramaniam K (2020) Dna based sha512-ecc cryptography and cm-csa based steganography for data security. In: Materials today: proceedings
14.
Zurück zum Zitat Marwan S, Shawish A, Nagaty K (2016) Dna-based cryptographic methods for data hiding in dna media. Biosystems 150:110–118CrossRef Marwan S, Shawish A, Nagaty K (2016) Dna-based cryptographic methods for data hiding in dna media. Biosystems 150:110–118CrossRef
15.
Zurück zum Zitat Leier A, Richter C, Banzhaf W, Rauhe H (2000) Cryptography with dna binary strands. Biosystems 57(1):13–22CrossRef Leier A, Richter C, Banzhaf W, Rauhe H (2000) Cryptography with dna binary strands. Biosystems 57(1):13–22CrossRef
16.
Zurück zum Zitat Chang C-C, Lu T-C, Chang Y-F, Lee R (2007) Reversible data hiding schemes for deoxyribonucleic acid (dna) medium. Int J Innov Comput Inf Control 3(5):1145–1160 Chang C-C, Lu T-C, Chang Y-F, Lee R (2007) Reversible data hiding schemes for deoxyribonucleic acid (dna) medium. Int J Innov Comput Inf Control 3(5):1145–1160
17.
Zurück zum Zitat Huang Y-H, Chang C-C, Wu C-Y (2014) A dna-based data hiding technique with low modification rates. Multimedia Tools Appl 70(3):1439–1451CrossRef Huang Y-H, Chang C-C, Wu C-Y (2014) A dna-based data hiding technique with low modification rates. Multimedia Tools Appl 70(3):1439–1451CrossRef
18.
Zurück zum Zitat Chen T (2007) A novel biology-based reversible data hiding fusion scheme. In: International workshop on frontiers in algorithmics. Springer, pp 84–95 Chen T (2007) A novel biology-based reversible data hiding fusion scheme. In: International workshop on frontiers in algorithmics. Springer, pp 84–95
19.
Zurück zum Zitat Liu G, Liu H, Kadir A (2014) Hiding message into dna sequence through dna coding and chaotic maps. Med Biol Eng Comput 52(9):741–747CrossRef Liu G, Liu H, Kadir A (2014) Hiding message into dna sequence through dna coding and chaotic maps. Med Biol Eng Comput 52(9):741–747CrossRef
20.
Zurück zum Zitat Fu J, Zhang W, Yu N, Ma G, Tang Q (2014) Fast tamper location of batch dna sequences based on reversible data hiding. In: 2014 7th international conference on biomedical engineering and informatics. IEEE, pp 868–872 Fu J, Zhang W, Yu N, Ma G, Tang Q (2014) Fast tamper location of batch dna sequences based on reversible data hiding. In: 2014 7th international conference on biomedical engineering and informatics. IEEE, pp 868–872
22.
Zurück zum Zitat Muhammad K, Ahmad J, Farman H, Jan Z (2016) A new image steganographic technique using pattern based bits shuffling and magic lsb for grayscale images. arXiv preprint arXiv:1601.01386 Muhammad K, Ahmad J, Farman H, Jan Z (2016) A new image steganographic technique using pattern based bits shuffling and magic lsb for grayscale images. arXiv preprint arXiv:​1601.​01386
23.
Zurück zum Zitat Nag A, Choudhary S, Basu S, Dawn S (2016) An image steganography scheme based on lsb++ and rhtf for resisting statistical steganalysis. IEIE Trans Smart Process Comput 5(4):250–255CrossRef Nag A, Choudhary S, Basu S, Dawn S (2016) An image steganography scheme based on lsb++ and rhtf for resisting statistical steganalysis. IEIE Trans Smart Process Comput 5(4):250–255CrossRef
24.
Zurück zum Zitat Zhang S, Gao T (2015) A novel data hiding scheme based on dna coding and module-n operation. Int J Multimedia Ubiquitous Eng 10(4):337–344CrossRef Zhang S, Gao T (2015) A novel data hiding scheme based on dna coding and module-n operation. Int J Multimedia Ubiquitous Eng 10(4):337–344CrossRef
Metadaten
Titel
A LSB Substitution-Based Steganography Technique Using DNA Computing for Colour Images
verfasst von
Subhadip Mukherjee
Sunita Sarkar
Somnath Mukhopadhyay
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-4301-9_9