CFP last date
20 May 2024
Reseach Article

Hiding Secret Messages using Artificial DNA Sequences Generated by Integer Chaotic Maps

by Eihab Bashier, Ghaidaa Ahmed, Hussam-aldeen Othman, Rayan Shappo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 15
Year of Publication: 2013
Authors: Eihab Bashier, Ghaidaa Ahmed, Hussam-aldeen Othman, Rayan Shappo
10.5120/12035-7970

Eihab Bashier, Ghaidaa Ahmed, Hussam-aldeen Othman, Rayan Shappo . Hiding Secret Messages using Artificial DNA Sequences Generated by Integer Chaotic Maps. International Journal of Computer Applications. 70, 15 ( May 2013), 1-5. DOI=10.5120/12035-7970

@article{ 10.5120/12035-7970,
author = { Eihab Bashier, Ghaidaa Ahmed, Hussam-aldeen Othman, Rayan Shappo },
title = { Hiding Secret Messages using Artificial DNA Sequences Generated by Integer Chaotic Maps },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 15 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number15/12035-7970/ },
doi = { 10.5120/12035-7970 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:55.027119+05:30
%A Eihab Bashier
%A Ghaidaa Ahmed
%A Hussam-aldeen Othman
%A Rayan Shappo
%T Hiding Secret Messages using Artificial DNA Sequences Generated by Integer Chaotic Maps
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 15
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Almost all the existing DNA steganography techniques are based on DNA sequences from the existing databases such as the Gen- Bank. With the current available computational powers, bruteforce attacks on those DNA data sequences can easily be carried out. In this paper, the technique of generating artificial DNA sequences using chaotic maps running on the domain of integer numbers is introduced. Then, two steganography algorithms for hiding a cipher message in artificial DNA sequences, before sending it to the other party are developped; where the natural techniques by which the genes are hidden, accessed in the DNA and translated are simulated in this paper. The purpose of using this type of chaotic maps is to allow the compatibility between devices with different architictures, such that the extraction and decryption of the hidden message can be carried out correctly. The first algorithm has low computational requirements but vulnerable to statistical attacks when the cipher message is divided into large number of sub-messages. This issue is dealt with in the second algorithm.

References
  1. G. Ahmed, H. Othman, and R. Shappo. Information hiding using dna stegnography, 2012. B. Sc. dissertation report, Faculty of Mathematical Sciences, University of Khartoum.
  2. M. M. Amin, S. Ibrahim, M. Salleh, and M. R. Katmin. Information hiding using stegnography, 2003.
  3. S. T. Amin, Magdy Saeb, and Salah El-Gindi. A dna-based implementation of yaea encryption algorithm, 2011. Availabe online at Accessed at Magdy Saeb homepage: http://www. magdysaeb. net/images/DNAYAEAaminsaeb. pdf, Cited 07/07/2011, Accessed 02/01/2012.
  4. A. Atito, A. Khalifa, and S. Z. Rida. Dna-based data encryption and hiding using playfair and insertion techniques. Journal of Communications & Computer Engineering, 2(3):44–49, 2012.
  5. S. Chakraborty and S. K. Bandyopadhyay. Two stages data-image steganography using dna sequence. International Journal of Engineering Research and Development, 2(7):69–72, 2012.
  6. R. Enayatifar, F. Mahmoudi, and K. Mirzaei. Using the chaotic map in image steganography. In Proceedings of the 2009 International Conference on Information Management and Engineering, ICIME '09, pages 491–495, Washington, DC, USA, 2009. IEEE Computer Society.
  7. A. Gehani, T. H. LaBean, and J. H. Reif. Dna-based cryptography. DIMACS Series in Discrete Mathematics and Theoretical Computer Sciences, 54:233–249, 2000.
  8. N. F. Johnson and S. Jajodia. Exploring steganography: Seeing the unseen. Computer, 31(2):26–34, 1998.
  9. A. Kanso and H. S. Own. Steganographic algorithm based on a chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(8):3287 – 3302, 2012.
  10. I. K. Maitra, S. Nag, B. Datta, and S. K. Bandyopadhyay. Steganalysis: Review on recent approaches. Journal of Global Research in Computer Science, 2(1):1–5, 2011.
  11. T. Mandge and V. Choudhary. A review on emerging cryptography technique: Dna cryptography. In IJCA Proceedings on International Conference Technology and Computer Science 2012, volume ICRTITCS, pages 9–13, 2013.
  12. H. Mousa, K. Moustafa, W. Abdel-wahed, and M. Hadhoud. Data hiding based on contrast mapping using dna medium. The International Arab Journal of Information Technology, 8(2):147–154, 2011.
  13. M. R. Torkaman, N. S. Kazazi, and A. Rouddini. Innovative approach to improve hybrid cryptography by using dna steganography. International Journal of New Computer Architectures and Their Applications, 2(1):225–236, 2012.
  14. A. Vierstraete. The central dogma of mollecular biology. http://users. ugent. be/ avierstr/ principles/centraldogma. html, accessed 01/03/2013.
  15. Q. Zhang, X. Xue, and X. Wei. A novel image encryption algorithm based on dna subsequence operation. The Scientific World Journal, 2012:10, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Chaotic maps Cryptography DNA steganography Genes Message hiding