CFP last date
22 April 2024
Reseach Article

Chaotic Information-hiding Algorithm based on DNA

by Eman I. Abd El- Latif, Mahmoud I. Moussa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 10
Year of Publication: 2015
Authors: Eman I. Abd El- Latif, Mahmoud I. Moussa
10.5120/21740-4949

Eman I. Abd El- Latif, Mahmoud I. Moussa . Chaotic Information-hiding Algorithm based on DNA. International Journal of Computer Applications. 122, 10 ( July 2015), 38-42. DOI=10.5120/21740-4949

@article{ 10.5120/21740-4949,
author = { Eman I. Abd El- Latif, Mahmoud I. Moussa },
title = { Chaotic Information-hiding Algorithm based on DNA },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 10 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number10/21740-4949/ },
doi = { 10.5120/21740-4949 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:10:15.171962+05:30
%A Eman I. Abd El- Latif
%A Mahmoud I. Moussa
%T Chaotic Information-hiding Algorithm based on DNA
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 10
%P 38-42
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes a cryptography technique based on two dimension 2D chaotic system and DNA sequence. The 2D chaotic map generates two artificial DNA sequences S1and S2 to get a cipher message by encrypting the plain message using the first sequence S1. The sender uses the second sequence S2 to hide the cipher message randomly in a real third sequence S3 that is selected from DNA database. The hamming code approach is applied on the original message M to ensure reliable secret communication. The proposed approach provided a more security method compared to previous approaches.

References
  1. A Leier, C Richter, W Banzhaf, H Rauhe, Cryptography with DNA binary strands. in BioSystems (2000), pp. 13-22.
  2. H Shiu, K Ng, J Fang, R Lee, C Huang, Data hiding methods based upon DNA sequences. in Information Sciences( 2010), pp. 2196-2208.
  3. B Shimanovsky, J Feng, M Potkonjak, Hiding data in DNA. in Information Hiding(2003), pp. 373-386.
  4. A Atito, A Khalifa, S Rida, Dna-based data encryption and hiding using playfair and insertion techniques. in Journal of Communications and Computer Engineering(2011), p. 44- 49.
  5. N Kar, A Majumder, A. Saha, A Jamatia, K Chakma, M Pal, An improved data security using DNA sequencing. in Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare(2013), pp. 13-18.
  6. B Roy , A Majumder, An Improved Concept of Cryptography Based on DNA Sequencing. (IJECCE,2012) , pp. 1264-1267.
  7. BA Mitras , AK Aboo, Proposed Steganography
  8. Approach Using DNA Properties. in InternationalJournal of Information Technology and BusinessManagement (2012), pp. 96-102. C Guo, C Chang , Z Wang, A new data hiding scheme based on DNA sequence. Int J Innov Comput Inf Control(2012), pp. 1-11.
  9. FE Ibrahim, MI Moussa , HM Abdalkader ,A Symmetric Encryption Algorithm based on DNA Computing, in InternationalJournalofComputerApplications(2014), pp. 41-45.
  10. Fatma E. Ibrahim, M. I. Moussa, H. M. Abdalkader, "Enhancing the Security of Data Hiding Using Double DNA Sequences", presented at Industry Academia Collaboration Conference (IAC), 6-8 April, Cairo, Egypt, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

DNA Cryptography Chaotic maps and Hamming code.