CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Chaotic Information-hiding Algorithm based on DNA

by Eman I. Abd El- Latif, Mahmoud I. Moussa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 10
Year of Publication: 2015
Authors: Eman I. Abd El- Latif, Mahmoud I. Moussa
10.5120/21740-4949

Eman I. Abd El- Latif, Mahmoud I. Moussa . Chaotic Information-hiding Algorithm based on DNA. International Journal of Computer Applications. 122, 10 ( July 2015), 38-42. DOI=10.5120/21740-4949

@article{ 10.5120/21740-4949,
author = { Eman I. Abd El- Latif, Mahmoud I. Moussa },
title = { Chaotic Information-hiding Algorithm based on DNA },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 10 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number10/21740-4949/ },
doi = { 10.5120/21740-4949 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:10:15.171962+05:30
%A Eman I. Abd El- Latif
%A Mahmoud I. Moussa
%T Chaotic Information-hiding Algorithm based on DNA
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 10
%P 38-42
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes a cryptography technique based on two dimension 2D chaotic system and DNA sequence. The 2D chaotic map generates two artificial DNA sequences S1and S2 to get a cipher message by encrypting the plain message using the first sequence S1. The sender uses the second sequence S2 to hide the cipher message randomly in a real third sequence S3 that is selected from DNA database. The hamming code approach is applied on the original message M to ensure reliable secret communication. The proposed approach provided a more security method compared to previous approaches.

References
  1. A Leier, C Richter, W Banzhaf, H Rauhe, Cryptography with DNA binary strands. in BioSystems (2000), pp. 13-22.
  2. H Shiu, K Ng, J Fang, R Lee, C Huang, Data hiding methods based upon DNA sequences. in Information Sciences( 2010), pp. 2196-2208.
  3. B Shimanovsky, J Feng, M Potkonjak, Hiding data in DNA. in Information Hiding(2003), pp. 373-386.
  4. A Atito, A Khalifa, S Rida, Dna-based data encryption and hiding using playfair and insertion techniques. in Journal of Communications and Computer Engineering(2011), p. 44- 49.
  5. N Kar, A Majumder, A. Saha, A Jamatia, K Chakma, M Pal, An improved data security using DNA sequencing. in Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare(2013), pp. 13-18.
  6. B Roy , A Majumder, An Improved Concept of Cryptography Based on DNA Sequencing. (IJECCE,2012) , pp. 1264-1267.
  7. BA Mitras , AK Aboo, Proposed Steganography
  8. Approach Using DNA Properties. in InternationalJournal of Information Technology and BusinessManagement (2012), pp. 96-102. C Guo, C Chang , Z Wang, A new data hiding scheme based on DNA sequence. Int J Innov Comput Inf Control(2012), pp. 1-11.
  9. FE Ibrahim, MI Moussa , HM Abdalkader ,A Symmetric Encryption Algorithm based on DNA Computing, in InternationalJournalofComputerApplications(2014), pp. 41-45.
  10. Fatma E. Ibrahim, M. I. Moussa, H. M. Abdalkader, "Enhancing the Security of Data Hiding Using Double DNA Sequences", presented at Industry Academia Collaboration Conference (IAC), 6-8 April, Cairo, Egypt, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

DNA Cryptography Chaotic maps and Hamming code.