Loading…

Double layer steganography technique using DNA sequences and images

Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently,...

Full description

Saved in:
Bibliographic Details
Published in:PeerJ. Computer science 2023-05, Vol.9, p.e1379-e1379, Article e1379
Main Authors: Aljahdali, Asia Othman, Al-Harbi, Omnia Abdullah
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913
container_end_page e1379
container_issue
container_start_page e1379
container_title PeerJ. Computer science
container_volume 9
creator Aljahdali, Asia Othman
Al-Harbi, Omnia Abdullah
description Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently, data security is an essential component of data communication. One of the most effective methods used to achieve secrecy is steganography. This method hides data within a cover object without raising suspicion. The level of security is improved when two steganography methods are combined. This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system. Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks. The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data. The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method. Eventually, the stego image is sent to the intended recipient. Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments. The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.078 and 72.2, respectively. Finally, the PNG and BMP images show excellent results. On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security.
doi_str_mv 10.7717/peerj-cs.1379
format article
fullrecord <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_ca8ad3ad99e746919caad2d8e0ee564b</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A749440089</galeid><doaj_id>oai_doaj_org_article_ca8ad3ad99e746919caad2d8e0ee564b</doaj_id><sourcerecordid>A749440089</sourcerecordid><originalsourceid>FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913</originalsourceid><addsrcrecordid>eNptkstvEzEQxlcIRKvSI1e0Ehc4bPDb6xOKUh6RKpB4nC2vPbtxtLGDvYvIf4_TlKqRsA8ej3_zjW19VfUSo4WUWL7bA6RtY_MCU6meVJeEStFwpcjTR_FFdZ3zFiGEOS5DPa8uqKRMcCUuq9VNnLsR6tEcINV5gsGEOCSz3xzqCewm-F8z1HP2YahvvizrDGUfLOTaBFf7nRkgv6ie9WbMcH2_XlU_P374sfrc3H79tF4tbxtbGk8N5l2LqJUUOico6ZVQliOGiUBIIca5xS2TIK1RjGDFRC9R64jtSyCswvSqWp90XTRbvU-lezroaLy-S8Q0aJMmb0fQ1rTGUeOUAsmEwsoa44hrAQFwwbqi9f6ktZ-7HTgLYUpmPBM9Pwl-o4f4W2NEWsQZKwpv7hVSLH-SJ73z2cI4mgBxzpq0pJWScqwK-vqEDqbczYc-Fkl7xPVSMsUYQu2RWvyHKtPBztsYoPclf1bw9qygMBP8mQYz56zX37-ds82JtSnmnKB_eCpG-uglfeclbbM-eqnwrx7_zwP9zzn0LyrYw8U</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2828773519</pqid></control><display><type>article</type><title>Double layer steganography technique using DNA sequences and images</title><source>Publicly Available Content Database</source><source>PubMed Central</source><creator>Aljahdali, Asia Othman ; Al-Harbi, Omnia Abdullah</creator><creatorcontrib>Aljahdali, Asia Othman ; Al-Harbi, Omnia Abdullah</creatorcontrib><description>Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently, data security is an essential component of data communication. One of the most effective methods used to achieve secrecy is steganography. This method hides data within a cover object without raising suspicion. The level of security is improved when two steganography methods are combined. This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system. Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks. The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data. The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method. Eventually, the stego image is sent to the intended recipient. Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments. The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.078 and 72.2, respectively. Finally, the PNG and BMP images show excellent results. On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security.</description><identifier>ISSN: 2376-5992</identifier><identifier>EISSN: 2376-5992</identifier><identifier>DOI: 10.7717/peerj-cs.1379</identifier><identifier>PMID: 37346596</identifier><language>eng</language><publisher>United States: PeerJ. Ltd</publisher><subject>Cryptography ; DNA ; DNA sequences ; DNA sequencing ; Genetic research ; Methods ; Nucleotide sequencing ; PSNR ; Safety and security measures ; Security and Privacy ; Steganography ; Stego image</subject><ispartof>PeerJ. Computer science, 2023-05, Vol.9, p.e1379-e1379, Article e1379</ispartof><rights>2023 Aljahdali and Al-Harbi.</rights><rights>COPYRIGHT 2023 PeerJ. Ltd.</rights><rights>2023 Aljahdali and Al-Harbi 2023 Aljahdali and Al-Harbi</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280544/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280544/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,885,27923,27924,37012,53790,53792</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/37346596$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Aljahdali, Asia Othman</creatorcontrib><creatorcontrib>Al-Harbi, Omnia Abdullah</creatorcontrib><title>Double layer steganography technique using DNA sequences and images</title><title>PeerJ. Computer science</title><addtitle>PeerJ Comput Sci</addtitle><description>Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently, data security is an essential component of data communication. One of the most effective methods used to achieve secrecy is steganography. This method hides data within a cover object without raising suspicion. The level of security is improved when two steganography methods are combined. This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system. Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks. The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data. The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method. Eventually, the stego image is sent to the intended recipient. Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments. The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.078 and 72.2, respectively. Finally, the PNG and BMP images show excellent results. On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security.</description><subject>Cryptography</subject><subject>DNA</subject><subject>DNA sequences</subject><subject>DNA sequencing</subject><subject>Genetic research</subject><subject>Methods</subject><subject>Nucleotide sequencing</subject><subject>PSNR</subject><subject>Safety and security measures</subject><subject>Security and Privacy</subject><subject>Steganography</subject><subject>Stego image</subject><issn>2376-5992</issn><issn>2376-5992</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>DOA</sourceid><recordid>eNptkstvEzEQxlcIRKvSI1e0Ehc4bPDb6xOKUh6RKpB4nC2vPbtxtLGDvYvIf4_TlKqRsA8ej3_zjW19VfUSo4WUWL7bA6RtY_MCU6meVJeEStFwpcjTR_FFdZ3zFiGEOS5DPa8uqKRMcCUuq9VNnLsR6tEcINV5gsGEOCSz3xzqCewm-F8z1HP2YahvvizrDGUfLOTaBFf7nRkgv6ie9WbMcH2_XlU_P374sfrc3H79tF4tbxtbGk8N5l2LqJUUOico6ZVQliOGiUBIIca5xS2TIK1RjGDFRC9R64jtSyCswvSqWp90XTRbvU-lezroaLy-S8Q0aJMmb0fQ1rTGUeOUAsmEwsoa44hrAQFwwbqi9f6ktZ-7HTgLYUpmPBM9Pwl-o4f4W2NEWsQZKwpv7hVSLH-SJ73z2cI4mgBxzpq0pJWScqwK-vqEDqbczYc-Fkl7xPVSMsUYQu2RWvyHKtPBztsYoPclf1bw9qygMBP8mQYz56zX37-ds82JtSnmnKB_eCpG-uglfeclbbM-eqnwrx7_zwP9zzn0LyrYw8U</recordid><startdate>20230516</startdate><enddate>20230516</enddate><creator>Aljahdali, Asia Othman</creator><creator>Al-Harbi, Omnia Abdullah</creator><general>PeerJ. Ltd</general><general>PeerJ Inc</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>ISR</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope></search><sort><creationdate>20230516</creationdate><title>Double layer steganography technique using DNA sequences and images</title><author>Aljahdali, Asia Othman ; Al-Harbi, Omnia Abdullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cryptography</topic><topic>DNA</topic><topic>DNA sequences</topic><topic>DNA sequencing</topic><topic>Genetic research</topic><topic>Methods</topic><topic>Nucleotide sequencing</topic><topic>PSNR</topic><topic>Safety and security measures</topic><topic>Security and Privacy</topic><topic>Steganography</topic><topic>Stego image</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Aljahdali, Asia Othman</creatorcontrib><creatorcontrib>Al-Harbi, Omnia Abdullah</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>Gale In Context: Science</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PeerJ. Computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aljahdali, Asia Othman</au><au>Al-Harbi, Omnia Abdullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Double layer steganography technique using DNA sequences and images</atitle><jtitle>PeerJ. Computer science</jtitle><addtitle>PeerJ Comput Sci</addtitle><date>2023-05-16</date><risdate>2023</risdate><volume>9</volume><spage>e1379</spage><epage>e1379</epage><pages>e1379-e1379</pages><artnum>e1379</artnum><issn>2376-5992</issn><eissn>2376-5992</eissn><abstract>Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increased risk of various types of attacks. Consequently, data security is an essential component of data communication. One of the most effective methods used to achieve secrecy is steganography. This method hides data within a cover object without raising suspicion. The level of security is improved when two steganography methods are combined. This approach is known as multilevel steganography, which hides sensitive data in two cover objects in order to provide a two-level security system. Accordingly, we developed a technique that focuses on protecting secrecy while also being robust to attacks. The new technique uses a multi-layer steganography mechanism by using DNA sequences and images as carriers for sensitive data. The technique intends to hide secret messages in the DNA using the substation algorithm, and then the fake DNA is embedded in an image utilizing the discrete cosine transform (DCT) method. Eventually, the stego image is sent to the intended recipient. Different types of images with different sizes and lengths of messages and DNA sequences were used during the experiments. The results show that the proposed mechanism is resistant to histogram and chi-square attacks. The maximum mean value observed was 0.05, which means the histograms of the original and stego images are nearly identical, and the stego image does not raise any suspicion regarding the existence of secret information. In addition, the imperceptibility ratios were good, as the highest PSNR and MSE values were 0.078 and 72.2, respectively. Finally, the PNG and BMP images show excellent results. On the other hand, the JPG images failed to meet the expected ratio of imperceptibility and security.</abstract><cop>United States</cop><pub>PeerJ. Ltd</pub><pmid>37346596</pmid><doi>10.7717/peerj-cs.1379</doi><tpages>e1379</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2376-5992
ispartof PeerJ. Computer science, 2023-05, Vol.9, p.e1379-e1379, Article e1379
issn 2376-5992
2376-5992
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_ca8ad3ad99e746919caad2d8e0ee564b
source Publicly Available Content Database; PubMed Central
subjects Cryptography
DNA
DNA sequences
DNA sequencing
Genetic research
Methods
Nucleotide sequencing
PSNR
Safety and security measures
Security and Privacy
Steganography
Stego image
title Double layer steganography technique using DNA sequences and images
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T23%3A46%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Double%20layer%20steganography%20technique%20using%20DNA%20sequences%20and%20images&rft.jtitle=PeerJ.%20Computer%20science&rft.au=Aljahdali,%20Asia%20Othman&rft.date=2023-05-16&rft.volume=9&rft.spage=e1379&rft.epage=e1379&rft.pages=e1379-e1379&rft.artnum=e1379&rft.issn=2376-5992&rft.eissn=2376-5992&rft_id=info:doi/10.7717/peerj-cs.1379&rft_dat=%3Cgale_doaj_%3EA749440089%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c511t-15b803c73ebd632f969c5041260090455c1847e7ca9421946f708d2cf6f76c913%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2828773519&rft_id=info:pmid/37346596&rft_galeid=A749440089&rfr_iscdi=true