Loading…
Double layer steganography technique using DNA sequences and images
Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently,...
Saved in:
Published in: | PeerJ. Computer science 2023-05, Vol.9, p.e1379-e1379, Article e1379 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913 |
container_end_page | e1379 |
container_issue | |
container_start_page | e1379 |
container_title | PeerJ. Computer science |
container_volume | 9 |
creator | Aljahdali, Asia Othman Al-Harbi, Omnia Abdullah |
description | Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently, data security is an essential component of data communication. One of the most effective methods used to achieve secrecy is steganography. This method hides data within a cover object without raising suspicion. The level of security is improved when two steganography methods are combined. This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system. Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks. The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data. The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method. Eventually, the stego image is sent to the intended recipient. Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments. The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.078 and 72.2, respectively. Finally, the PNG and BMP images show excellent results. On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security. |
doi_str_mv | 10.7717/peerj-cs.1379 |
format | article |
fullrecord | <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_ca8ad3ad99e746919caad2d8e0ee564b</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A749440089</galeid><doaj_id>oai_doaj_org_article_ca8ad3ad99e746919caad2d8e0ee564b</doaj_id><sourcerecordid>A749440089</sourcerecordid><originalsourceid>FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913</originalsourceid><addsrcrecordid>eNptkstvEzEQxlcIRKvSI1e0Ehc4bPDb6xOKUh6RKpB4nC2vPbtxtLGDvYvIf4_TlKqRsA8ej3_zjW19VfUSo4WUWL7bA6RtY_MCU6meVJeEStFwpcjTR_FFdZ3zFiGEOS5DPa8uqKRMcCUuq9VNnLsR6tEcINV5gsGEOCSz3xzqCewm-F8z1HP2YahvvizrDGUfLOTaBFf7nRkgv6ie9WbMcH2_XlU_P374sfrc3H79tF4tbxtbGk8N5l2LqJUUOico6ZVQliOGiUBIIca5xS2TIK1RjGDFRC9R64jtSyCswvSqWp90XTRbvU-lezroaLy-S8Q0aJMmb0fQ1rTGUeOUAsmEwsoa44hrAQFwwbqi9f6ktZ-7HTgLYUpmPBM9Pwl-o4f4W2NEWsQZKwpv7hVSLH-SJ73z2cI4mgBxzpq0pJWScqwK-vqEDqbczYc-Fkl7xPVSMsUYQu2RWvyHKtPBztsYoPclf1bw9qygMBP8mQYz56zX37-ds82JtSnmnKB_eCpG-uglfeclbbM-eqnwrx7_zwP9zzn0LyrYw8U</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2828773519</pqid></control><display><type>article</type><title>Double layer steganography technique using DNA sequences and images</title><source>Publicly Available Content Database</source><source>PubMed Central</source><creator>Aljahdali, Asia Othman ; Al-Harbi, Omnia Abdullah</creator><creatorcontrib>Aljahdali, Asia Othman ; Al-Harbi, Omnia Abdullah</creatorcontrib><description>Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently, data security is an essential component of data communication. One of the most effective methods used to achieve secrecy is steganography. This method hides data within a cover object without raising suspicion. The level of security is improved when two steganography methods are combined. This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system. Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks. The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data. The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method. Eventually, the stego image is sent to the intended recipient. Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments. The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.078 and 72.2, respectively. Finally, the PNG and BMP images show excellent results. On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security.</description><identifier>ISSN: 2376-5992</identifier><identifier>EISSN: 2376-5992</identifier><identifier>DOI: 10.7717/peerj-cs.1379</identifier><identifier>PMID: 37346596</identifier><language>eng</language><publisher>United States: PeerJ. Ltd</publisher><subject>Cryptography ; DNA ; DNA sequences ; DNA sequencing ; Genetic research ; Methods ; Nucleotide sequencing ; PSNR ; Safety and security measures ; Security and Privacy ; Steganography ; Stego image</subject><ispartof>PeerJ. Computer science, 2023-05, Vol.9, p.e1379-e1379, Article e1379</ispartof><rights>2023 Aljahdali and Al-Harbi.</rights><rights>COPYRIGHT 2023 PeerJ. Ltd.</rights><rights>2023 Aljahdali and Al-Harbi 2023 Aljahdali and Al-Harbi</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280544/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280544/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,885,27923,27924,37012,53790,53792</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/37346596$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Aljahdali, Asia Othman</creatorcontrib><creatorcontrib>Al-Harbi, Omnia Abdullah</creatorcontrib><title>Double layer steganography technique using DNA sequences and images</title><title>PeerJ. Computer science</title><addtitle>PeerJ Comput Sci</addtitle><description>Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently, data security is an essential component of data communication. One of the most effective methods used to achieve secrecy is steganography. This method hides data within a cover object without raising suspicion. The level of security is improved when two steganography methods are combined. This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system. Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks. The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data. The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method. Eventually, the stego image is sent to the intended recipient. Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments. The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.078 and 72.2, respectively. Finally, the PNG and BMP images show excellent results. On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security.</description><subject>Cryptography</subject><subject>DNA</subject><subject>DNA sequences</subject><subject>DNA sequencing</subject><subject>Genetic research</subject><subject>Methods</subject><subject>Nucleotide sequencing</subject><subject>PSNR</subject><subject>Safety and security measures</subject><subject>Security and Privacy</subject><subject>Steganography</subject><subject>Stego image</subject><issn>2376-5992</issn><issn>2376-5992</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>DOA</sourceid><recordid>eNptkstvEzEQxlcIRKvSI1e0Ehc4bPDb6xOKUh6RKpB4nC2vPbtxtLGDvYvIf4_TlKqRsA8ej3_zjW19VfUSo4WUWL7bA6RtY_MCU6meVJeEStFwpcjTR_FFdZ3zFiGEOS5DPa8uqKRMcCUuq9VNnLsR6tEcINV5gsGEOCSz3xzqCewm-F8z1HP2YahvvizrDGUfLOTaBFf7nRkgv6ie9WbMcH2_XlU_P374sfrc3H79tF4tbxtbGk8N5l2LqJUUOico6ZVQliOGiUBIIca5xS2TIK1RjGDFRC9R64jtSyCswvSqWp90XTRbvU-lezroaLy-S8Q0aJMmb0fQ1rTGUeOUAsmEwsoa44hrAQFwwbqi9f6ktZ-7HTgLYUpmPBM9Pwl-o4f4W2NEWsQZKwpv7hVSLH-SJ73z2cI4mgBxzpq0pJWScqwK-vqEDqbczYc-Fkl7xPVSMsUYQu2RWvyHKtPBztsYoPclf1bw9qygMBP8mQYz56zX37-ds82JtSnmnKB_eCpG-uglfeclbbM-eqnwrx7_zwP9zzn0LyrYw8U</recordid><startdate>20230516</startdate><enddate>20230516</enddate><creator>Aljahdali, Asia Othman</creator><creator>Al-Harbi, Omnia Abdullah</creator><general>PeerJ. Ltd</general><general>PeerJ Inc</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>ISR</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope></search><sort><creationdate>20230516</creationdate><title>Double layer steganography technique using DNA sequences and images</title><author>Aljahdali, Asia Othman ; Al-Harbi, Omnia Abdullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cryptography</topic><topic>DNA</topic><topic>DNA sequences</topic><topic>DNA sequencing</topic><topic>Genetic research</topic><topic>Methods</topic><topic>Nucleotide sequencing</topic><topic>PSNR</topic><topic>Safety and security measures</topic><topic>Security and Privacy</topic><topic>Steganography</topic><topic>Stego image</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Aljahdali, Asia Othman</creatorcontrib><creatorcontrib>Al-Harbi, Omnia Abdullah</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>Gale In Context: Science</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PeerJ. Computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aljahdali, Asia Othman</au><au>Al-Harbi, Omnia Abdullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Double layer steganography technique using DNA sequences and images</atitle><jtitle>PeerJ. Computer science</jtitle><addtitle>PeerJ Comput Sci</addtitle><date>2023-05-16</date><risdate>2023</risdate><volume>9</volume><spage>e1379</spage><epage>e1379</epage><pages>e1379-e1379</pages><artnum>e1379</artnum><issn>2376-5992</issn><eissn>2376-5992</eissn><abstract>Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently, data security is an essential component of data communication. One of the most effective methods used to achieve secrecy is steganography. This method hides data within a cover object without raising suspicion. The level of security is improved when two steganography methods are combined. This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system. Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks. The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data. The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method. Eventually, the stego image is sent to the intended recipient. Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments. The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.078 and 72.2, respectively. Finally, the PNG and BMP images show excellent results. On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security.</abstract><cop>United States</cop><pub>PeerJ. Ltd</pub><pmid>37346596</pmid><doi>10.7717/peerj-cs.1379</doi><tpages>e1379</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2376-5992 |
ispartof | PeerJ. Computer science, 2023-05, Vol.9, p.e1379-e1379, Article e1379 |
issn | 2376-5992 2376-5992 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_ca8ad3ad99e746919caad2d8e0ee564b |
source | Publicly Available Content Database; PubMed Central |
subjects | Cryptography DNA DNA sequences DNA sequencing Genetic research Methods Nucleotide sequencing PSNR Safety and security measures Security and Privacy Steganography Stego image |
title | Double layer steganography technique using DNA sequences and images |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T23%3A46%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Double%20layer%20steganography%20technique%20using%20DNA%20sequences%20and%20images&rft.jtitle=PeerJ.%20Computer%20science&rft.au=Aljahdali,%20Asia%20Othman&rft.date=2023-05-16&rft.volume=9&rft.spage=e1379&rft.epage=e1379&rft.pages=e1379-e1379&rft.artnum=e1379&rft.issn=2376-5992&rft.eissn=2376-5992&rft_id=info:doi/10.7717/peerj-cs.1379&rft_dat=%3Cgale_doaj_%3EA749440089%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2828773519&rft_id=info:pmid/37346596&rft_galeid=A749440089&rfr_iscdi=true |