Skip to main content
Erschienen in: Wireless Personal Communications 4/2016

01.08.2016

An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography

verfasst von: P. Vijayakumar, V. Vijayalakshmi, G. Zayaraz

Erschienen in: Wireless Personal Communications | Ausgabe 4/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Steganography is the art of science of hiding information which is more useful in many social networks, digital media, and printing material. Many hiding algorithms are used to flourish the security level of the recent wireless multimedia system to protect the data from an attacker. This paper describes about existing steganographic based hiding methods using LSB techniques, RSA algorithm, DNA cryptography and DNA steganography, which is used to prevent copying, forgery and unauthorized access of videos, audios and images. Existing hiding methods had demerit of increased key size, computational cost, speed and size of the input. Thus the DNA steganography based Hyperelliptic Curve Cryptography (HECC) is proposed which provides a higher level of security to image file and also assure the digital media security. The proposed HECC based DNA steganography is compared with traditional cryptographic techniques results in 30 and 42 % increased processing time for encryption process and decryption process respectively. Finally, the proposed scheme is compared with other traditional steganographic technique in terms of Mean Square Error, Peak Signal to Noise Ratio (PSNR), embedding capacity. From the simulation results, it is inferred that, the proposed steganographic method has, the less embedding capacity, high MSR and PSNR value compared with other steganographic methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Johnson, N.F., Duric, Z., Jajodia, S., & Memon, N. (2001). Information hiding: Steganography and watermarking—Attacks and countermeasures. Journal of Electronic Imaging 10: 825. SPIE-Intl Soc Optical Eng. doi:10.1117/1.1388610. Johnson, N.F., Duric, Z., Jajodia, S., & Memon, N. (2001). Information hiding: Steganography and watermarking—Attacks and countermeasures. Journal of Electronic Imaging 10: 825. SPIE-Intl Soc Optical Eng. doi:10.​1117/​1.​1388610.
2.
Zurück zum Zitat Nagaraj, V., Vijayalakshmi, V., & Zayaraz, G. (2013). Overview of digital steganography methods and its applications. IJAST, 60, 45–58.CrossRef Nagaraj, V., Vijayalakshmi, V., & Zayaraz, G. (2013). Overview of digital steganography methods and its applications. IJAST, 60, 45–58.CrossRef
3.
Zurück zum Zitat Manoj, I. (2010). Cryptography and steganography. International Journal of Computer Applications, 1(12), 63–68.CrossRef Manoj, I. (2010). Cryptography and steganography. International Journal of Computer Applications, 1(12), 63–68.CrossRef
4.
Zurück zum Zitat Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 5(3), 75–80.CrossRef Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 5(3), 75–80.CrossRef
5.
Zurück zum Zitat Swanson, M., Kobayashi, M., & Tewfik, A. (1998). Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE, 86(6), 1064–1087.CrossRef Swanson, M., Kobayashi, M., & Tewfik, A. (1998). Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE, 86(6), 1064–1087.CrossRef
6.
Zurück zum Zitat Torkaman, M.R.N., Nikfard, P., Kazazi, N.S., Abbasy, M.R., & Tabatabaiee, S.F. (2011) Improving hybrid cryptosystems with DNA steganography. In Proceedings of the international conference on digital enterprise and information systems, pp. 42–52, Springer Book Pubisher, July 20–22, 2011. Torkaman, M.R.N., Nikfard, P., Kazazi, N.S., Abbasy, M.R., & Tabatabaiee, S.F. (2011) Improving hybrid cryptosystems with DNA steganography. In Proceedings of the international conference on digital enterprise and information systems, pp. 42–52, Springer Book Pubisher, July 20–22, 2011.
7.
Zurück zum Zitat Hamed, G., Marey, M., El-Sayed, S., & Tolba, F. (2015) DNA based steganography: Survey and analysis for parameters optimization. In Applications of intelligent optimization in biology and medicine, vol. 96 of the series Intelligent Systems Reference Library, pp. 47–89, Springer Publisher. Hamed, G., Marey, M., El-Sayed, S., & Tolba, F. (2015) DNA based steganography: Survey and analysis for parameters optimization. In Applications of intelligent optimization in biology and medicine, vol. 96 of the series Intelligent Systems Reference Library, pp. 47–89, Springer Publisher.
8.
Zurück zum Zitat Tawalbeh, L., Mowafi, M., & Aljoby, W. (2013). Use of elliptic curve cryptography for multimedia encryption. IET Information Security, 7(2), 67–74.CrossRef Tawalbeh, L., Mowafi, M., & Aljoby, W. (2013). Use of elliptic curve cryptography for multimedia encryption. IET Information Security, 7(2), 67–74.CrossRef
9.
Zurück zum Zitat Wollinger, T., Pelzl, J., & Paar, C. (2005). Cantor versus Harley: optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems. IEEE Transactions on Computers, 54(7), 861–872.CrossRef Wollinger, T., Pelzl, J., & Paar, C. (2005). Cantor versus Harley: optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems. IEEE Transactions on Computers, 54(7), 861–872.CrossRef
10.
Zurück zum Zitat Gehani, A., LaBean, T., & Reif, J. (2004) DNA based cryptography. In Aspects of Molecular Computing Volume 2950 of the series Lecture Notes in Computer Science, pp 167–188. Gehani, A., LaBean, T., & Reif, J. (2004) DNA based cryptography. In Aspects of Molecular Computing Volume 2950 of the series Lecture Notes in Computer Science, pp 167–188.
11.
Zurück zum Zitat Beck, M., & Yampolskiy, R. (2012). DNA as a medium for hiding data. BMC Bioinformatics, 13(12), A23.CrossRef Beck, M., & Yampolskiy, R. (2012). DNA as a medium for hiding data. BMC Bioinformatics, 13(12), A23.CrossRef
12.
Zurück zum Zitat Xiao, G., Lu, M., Qin, L., & Lai, X. (2006). New field of cryptography: DNA cryptography. Chinese Science Bulletin, 51(12), 1413–1420.MathSciNetMATH Xiao, G., Lu, M., Qin, L., & Lai, X. (2006). New field of cryptography: DNA cryptography. Chinese Science Bulletin, 51(12), 1413–1420.MathSciNetMATH
13.
Zurück zum Zitat Chakraborty, S., Roy S., & Bandyopadhyay, K. (2012) Image steganography using DNA sequence and sudoku solution matrix. International Journal of Advanced Research in Computer Science and Software Engineering 2(2), 117–122. Chakraborty, S., Roy S., & Bandyopadhyay, K. (2012) Image steganography using DNA sequence and sudoku solution matrix. International Journal of Advanced Research in Computer Science and Software Engineering 2(2), 117–122.
14.
Zurück zum Zitat Balado, F. (2013). Capacity of DNA data embedding under substitution mutations. IEEE Transaction on Information Theory, 59(2), 928–941.MathSciNetCrossRef Balado, F. (2013). Capacity of DNA data embedding under substitution mutations. IEEE Transaction on Information Theory, 59(2), 928–941.MathSciNetCrossRef
15.
Zurück zum Zitat Das, P., Deb, S., Kar, N., & Bhattacharya, B. (2015). An Improved DNA based dual cover steganography. Elsevier Procedia Computer Science, 46, 604–611.CrossRef Das, P., Deb, S., Kar, N., & Bhattacharya, B. (2015). An Improved DNA based dual cover steganography. Elsevier Procedia Computer Science, 46, 604–611.CrossRef
16.
Zurück zum Zitat Torkaman, M. R. N., Kazazi, N. S., & Rouddini, A. (2012). Innovative approach to improve hybrid cryptography by using DNA steganography. International Journal on New Computer Architectures and their Applications, 2(1), 224–235. Torkaman, M. R. N., Kazazi, N. S., & Rouddini, A. (2012). Innovative approach to improve hybrid cryptography by using DNA steganography. International Journal on New Computer Architectures and their Applications, 2(1), 224–235.
17.
Zurück zum Zitat Khalifa, A., & Atito, A. (2012) High-capacity DNA-based steganography. In Proceedings of international conference on informatics and systems, pp. 76–80. Khalifa, A., & Atito, A. (2012) High-capacity DNA-based steganography. In Proceedings of international conference on informatics and systems, pp. 76–80.
Metadaten
Titel
An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography
verfasst von
P. Vijayakumar
V. Vijayalakshmi
G. Zayaraz
Publikationsdatum
01.08.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3313-x

Weitere Artikel der Ausgabe 4/2016

Wireless Personal Communications 4/2016 Zur Ausgabe

Neuer Inhalt