Steganographic Model for encrypted messages based on DNA Encoding

https://doi.org/10.22146/ijccs.61767

Alfian Abdul Jalid(1*), Agus Harjoko(2), Anny Kartika Sari(3)

(1) Master Program in Computer Science, FMIPA UGM, Yogyakarta
(2) Department of Computer Science and Electronics, FMIPA UGM, Yogyakarta
(3) Department of Computer Science and Electronics, FMIPA UGM, Yogyakarta
(*) Corresponding Author

Abstract


Information has become an inseparable part of human life. Some information that is considered important, such as state or company documents, require more security to ensure its confidentiality. One way of securing information is by hiding the information in certain media using steganography techniques. Steganography is a method of hiding information into other files to make it invisible. One of the most frequently used steganographic methods is Least Significant Bit (LSB).

In this study, the LSB method will be modified using DNA Encoding and Chargaff's Rule. Chargaff's Rule or complementary base pairing rule is used to construct a complementary strand. The modification of the LSB method using DNA encoding and Chargaff's Rule is expected to increase the security of the information.

The MSE test results show the average value of the LSB method is 0.000236368, while the average value for the DNA Encoding-based Steganography method is 0.000770917. The average PSNR value for the LSB method was 76.82 dB while the DNA Encoding-based Steganography method had an average value of 70.88 dB. The time of inserting and extracting messages using the Steganography method based on DNA Encoding is relatively longer than the LSB method because of its higher algorithmic complexity. The message security of the DNA Encoding-based Steganography method is better because there is encryption in the algorithm compared to the LSB method which does not have encryption.


Keywords


Steganography; LSB; DNA Encoding; Chargaff’s Rule

Full Text:

PDF


References

[1] L. M. Adleman, “Molecular Computation of Solutions to Combinatorial Problems,” Am. Assoc. fir Adv. Sci., vol. 266, no. 5187, pp. 1021–1024, 1994 [Online]. Available: http://www.jstor.org/stable/2885489

[2] B. Anam, K. Sakib, M. A. Hossain, and K. Dahal, “Review on the Advancements of DNA Cryptography,” 2010 [Online]. Available: http://arxiv.org/abs/1010.0186

[3] R. K. Arya and R. Saharan, “Algorithm to Enhance the Robustness and Imperceptibility of LSB,” Proc. - 2015 2nd IEEE Int. Conf. Adv. Comput. Commun. Eng. ICACCE 2015, pp. 583–587, 2015, doi: 10.1109/ICACCE.2015.19.

[4] Q. Zhang, L. Guo, and X. Wei, “A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system,” Optik (Stuttg)., vol. 124, no. 18, pp. 3596–3600, 2013, doi: 10.1016/j.ijleo.2012.11.018. [Online]. Available: http://dx.doi.org/10.1016/j.ijleo.2012.11.018

[5] R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence,” Opt. Lasers Eng., vol. 56, pp. 83–93, 2014, doi: 10.1016/j.optlaseng.2013.12.003. [Online]. Available: http://dx.doi.org/10.1016/j.optlaseng.2013.12.003

[6] Q. Zhang, L. Guo, and X. Wei, “Image encryption using DNA addition combining with chaotic maps,” Math. Comput. Model., vol. 52, no. 11–12, pp. 2028–2035, 2010, doi: 10.1016/j.mcm.2010.06.005. [Online]. Available: http://dx.doi.org/10.1016/j.mcm.2010.06.005

[7] P. Wasiewicz, J. J. Mulawka, W. R. Rudnicki, and B. Lesyng, “Adding numbers with DNA,” Proc. IEEE Int. Conf. Syst. Man Cybern., vol. 1, pp. 265–270, 2000, doi: 10.1109/ICSMC.2000.885000.

[8] K. Menaka, “Message encryption using DNA sequences,” Proc. - 2014 World Congr. Comput. Commun. Technol. WCCCT 2014, pp. 182–184, 2014, doi: 10.1109/WCCCT.2014.35.

[9] S. Jain, N. Raviv, and J. Bruck, “Attaining the 2nd Chargaff Rule by Tandem Duplications,” IEEE Int. Symp. Inf. Theory - Proc., vol. 2018–June, pp. 2241–2245, 2018, doi: 10.1109/ISIT.2018.8437526.

[10] E. Walsh, “What Is the Complementary Base Pairing Rule?,” sciencing.com, 2019. [Online]. Available: https://sciencing.com/complementary-base-pairing-rule-8728565.html. [Accessed: 29-Jun-2019]

[11] X. Zhou, W. Gong, W. Fu, and L. Jin, “An Improved Method for LSB Based Color Image steganography C ombined with C ryptography,” 2016 IEEE/ACIS 15th Int. Conf. Comput. Inf. Sci., pp. 1–4, 2016, doi: 10.1109/ICIS.2016.7550955.

[12] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010, doi: 10.1016/j.sigpro.2009.08.010. [Online]. Available: http://dx.doi.org/10.1016/j.sigpro.2009.08.010



DOI: https://doi.org/10.22146/ijccs.61767

Article Metrics

Abstract views : 2669 | views : 2645

Refbacks

  • There are currently no refbacks.




Copyright (c) 2021 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



Copyright of :
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN 1978-1520 (print); ISSN 2460-7258 (online)
is a scientific journal the results of Computing
and Cybernetics Systems
A publication of IndoCEISS.
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Fax: +62274 555133
email:ijccs.mipa@ugm.ac.id | http://jurnal.ugm.ac.id/ijccs



View My Stats1
View My Stats2