Three Levels of Security Including Scrambling, Encryption and Embedding Data as Row in Cover Image with DNA Reference Sequence

  • Conference paper
  • First Online:
Artificial Intelligence, Data Science and Applications (ICAISE 2023)

Abstract

Data security has become a more important and pressing issue as a result of the growing use of computers in everyday life and the unchecked growth of the internet. The unauthorized access to data is prevented by the use of new secure communication methods including cryptography and steganography. The proposed system consists of three levels to hide data inside colored images. The first level is to scatter the data through the use of the seed. The second level is to encrypt the scattered data into deoxyribonucleic acid (DNA) and match each two segments of the string with DNA reference sequence to produce set of index. The last level is to embedding the index set as a row inside the cover image. The results of the experiments proved the efficiency of the proposed system where the PSNR values ranged between (69.5616–82.9210).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 149.79
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 192.59
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mohammed, A.N., Saif, M.A., Ahmed, M., Majid, J.: Steganography and cryptography techniques based secure data transferring through public network channel. Baghdad. Sci. J. 19(6), 1362–1368 (2022). https://doi.org/10.21123/bsj.2022.6142

  2. Rusul, M.N., **an Ali, A., Elaf Ali, A.: Hide text depending on the three channels of pixels in color images using the modified LSB algorithm. Int. J. Electric. Comput. Eng. 10(1), 809–815 (2020). https://doi.org/10.11591/ijece.v10i1.pp809-815

  3. Ahmed, T., Thahab, A.: Secure image steganography based on burrows wheeler transform and dynamic bit embedding. Int. J. Electric. Comput. Eng. (IJECE) 9(1), 460–467 (2019).https://doi.org/10.11591/ijece.v9i1.pp460-467

  4. Nabi, S.H., Sarosh, P., Parah, S., Mohiuddin Bhat, G.: Information embedding using DNA sequences for covert communication, in multimedia security, pp. 111–129. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-8711-5_6

  5. Zou, C., Wang, X., Zhou, C., Xu, S., Huang, C.: A novel image encryption algorithm based on DNA strand exchange and diffusion. Appl. Math. Comput. 430, 127291 (2022). https://doi.org/10.1016/j.amc.2022.127291

    Article  MathSciNet  Google Scholar 

  6. Yasir Ahmed, H., Nada Elya, T., Mohammed Qasim, A.: An enhanced approach of image steganographic using discrete shearlet transform and secret sharing. Baghdad. Sci. J. 19(1), 197–207 (2022). https://doi.org/10.21123/bsj.2022.19.1.0197

  7. Zhiguo, Q., Zhenwen, C., **aojun, W.: Matrix coding-based quantum image steganography algorithm. IEEE. 7, 35684–35698 (2019). https://doi.org/10.1109/ACCESS.2019.2894295

  8. Taha, M.S., Mohd Rahim, M.S., Lafta, S.A., Hashim, M.M., Alzuabidi, H.M.: Combination of steganography and cryptography: a short survey, 2nd international conference on sustainable engineering techniques (ICSET 2019). Baghdad. Iraq. IOP Conf. Ser. Mater. Sci. Eng. 518, 1–14 (2019). https://doi.org/10.1088/1757-899X/518/5/052003

  9. European Bioinformatics Institute. http://www.ebi.ac.uk/

  10. Azal, H.: A new method for hiding text in a digital image. J. Southwest Jiaotong. Univ. 55(2), 1–6 (2020). https://doi.org/10.35741/issn.0258-2724.55.2.4

  11. Sarab, M.H., Zuhair Hussein, A., Ghadah, K.A., Safa, A.: Chaos-based color image steganography method using 3 d cat map. Iraqi. J. Sci. 62(9), 3220–3227 (2021). https://doi.org/10.24996/ijs.2021.62.9.34

  12. Hassanain, R.K., Hadi Hussein, M., Keyan Abdul-Aziz, M.: Hiding encrypted text in image steganography. Periodic. Eng. Nat. Sci. 8(2), 703–707 (2020). https://doi.org/10.21533/pen.v8i2.1302

  13. Iman, Q., Zaid Ameen, A., Mustafa, A., Mudhafar, J., Junchao, M., Vincent, O.: A lightweight hybrid scheme for hiding text messages in colour images using LSB, LAH transform and chaotic techniques. J. Actut. Netw. Sens. 11, 66 (2022). https://doi.org/10.3390/jsan11040066

  14. Farhaoui, Y.: All big data mining and analytics. 6(3), I–II (2023). https://doi.org/10.26599/BDMA.2022.9020045

  15. Farhaoui, Y.: AlI big data mining and analytics. 5(4), III (2022). https://doi.org/10.26599/BDMA.2022.9020004

  16. Zahraa, S., Raniah, A., Amal, A.: Hiding encrypted text in image using least significant bit image steganography technique. Int. J. Eng. Res. Adv. Technol. (IJERAT) 6, 8 (2020). https://doi.org/10.31695/IJERAT.2020.3642

  17. Iman, Q.A., Amal, H.K.: Hiding text in speech signal using k-means, LSB techniques and chaotic maps. Int. J. Elect. Comput. Eng. (IJECE) 10(6), 5726–5735 (2020). https://doi.org/10.11591/ijece.v10i6.pp5726-5735

  18. Taleb, A.S.: Obaid embedding secret data in color image using LSB. J. Educ. Pure Sci. Univ. Thi-Qar. 12(2) (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asraa Abdullah Hussein .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hussein, A.A., Al Baity, R.M., Al-Bawee, S.A. (2024). Three Levels of Security Including Scrambling, Encryption and Embedding Data as Row in Cover Image with DNA Reference Sequence. In: Farhaoui, Y., Hussain, A., Saba, T., Taherdoost, H., Verma, A. (eds) Artificial Intelligence, Data Science and Applications. ICAISE 2023. Lecture Notes in Networks and Systems, vol 837. Springer, Cham. https://doi.org/10.1007/978-3-031-48465-0_10

Download citation

Publish with us

Policies and ethics

Navigation