Abstract
Data security has become a more important and pressing issue as a result of the growing use of computers in everyday life and the unchecked growth of the internet. The unauthorized access to data is prevented by the use of new secure communication methods including cryptography and steganography. The proposed system consists of three levels to hide data inside colored images. The first level is to scatter the data through the use of the seed. The second level is to encrypt the scattered data into deoxyribonucleic acid (DNA) and match each two segments of the string with DNA reference sequence to produce set of index. The last level is to embedding the index set as a row inside the cover image. The results of the experiments proved the efficiency of the proposed system where the PSNR values ranged between (69.5616–82.9210).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mohammed, A.N., Saif, M.A., Ahmed, M., Majid, J.: Steganography and cryptography techniques based secure data transferring through public network channel. Baghdad. Sci. J. 19(6), 1362–1368 (2022). https://doi.org/10.21123/bsj.2022.6142
Rusul, M.N., **an Ali, A., Elaf Ali, A.: Hide text depending on the three channels of pixels in color images using the modified LSB algorithm. Int. J. Electric. Comput. Eng. 10(1), 809–815 (2020). https://doi.org/10.11591/ijece.v10i1.pp809-815
Ahmed, T., Thahab, A.: Secure image steganography based on burrows wheeler transform and dynamic bit embedding. Int. J. Electric. Comput. Eng. (IJECE) 9(1), 460–467 (2019).https://doi.org/10.11591/ijece.v9i1.pp460-467
Nabi, S.H., Sarosh, P., Parah, S., Mohiuddin Bhat, G.: Information embedding using DNA sequences for covert communication, in multimedia security, pp. 111–129. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-8711-5_6
Zou, C., Wang, X., Zhou, C., Xu, S., Huang, C.: A novel image encryption algorithm based on DNA strand exchange and diffusion. Appl. Math. Comput. 430, 127291 (2022). https://doi.org/10.1016/j.amc.2022.127291
Yasir Ahmed, H., Nada Elya, T., Mohammed Qasim, A.: An enhanced approach of image steganographic using discrete shearlet transform and secret sharing. Baghdad. Sci. J. 19(1), 197–207 (2022). https://doi.org/10.21123/bsj.2022.19.1.0197
Zhiguo, Q., Zhenwen, C., **aojun, W.: Matrix coding-based quantum image steganography algorithm. IEEE. 7, 35684–35698 (2019). https://doi.org/10.1109/ACCESS.2019.2894295
Taha, M.S., Mohd Rahim, M.S., Lafta, S.A., Hashim, M.M., Alzuabidi, H.M.: Combination of steganography and cryptography: a short survey, 2nd international conference on sustainable engineering techniques (ICSET 2019). Baghdad. Iraq. IOP Conf. Ser. Mater. Sci. Eng. 518, 1–14 (2019). https://doi.org/10.1088/1757-899X/518/5/052003
European Bioinformatics Institute. http://www.ebi.ac.uk/
Azal, H.: A new method for hiding text in a digital image. J. Southwest Jiaotong. Univ. 55(2), 1–6 (2020). https://doi.org/10.35741/issn.0258-2724.55.2.4
Sarab, M.H., Zuhair Hussein, A., Ghadah, K.A., Safa, A.: Chaos-based color image steganography method using 3 d cat map. Iraqi. J. Sci. 62(9), 3220–3227 (2021). https://doi.org/10.24996/ijs.2021.62.9.34
Hassanain, R.K., Hadi Hussein, M., Keyan Abdul-Aziz, M.: Hiding encrypted text in image steganography. Periodic. Eng. Nat. Sci. 8(2), 703–707 (2020). https://doi.org/10.21533/pen.v8i2.1302
Iman, Q., Zaid Ameen, A., Mustafa, A., Mudhafar, J., Junchao, M., Vincent, O.: A lightweight hybrid scheme for hiding text messages in colour images using LSB, LAH transform and chaotic techniques. J. Actut. Netw. Sens. 11, 66 (2022). https://doi.org/10.3390/jsan11040066
Farhaoui, Y.: All big data mining and analytics. 6(3), I–II (2023). https://doi.org/10.26599/BDMA.2022.9020045
Farhaoui, Y.: AlI big data mining and analytics. 5(4), III (2022). https://doi.org/10.26599/BDMA.2022.9020004
Zahraa, S., Raniah, A., Amal, A.: Hiding encrypted text in image using least significant bit image steganography technique. Int. J. Eng. Res. Adv. Technol. (IJERAT) 6, 8 (2020). https://doi.org/10.31695/IJERAT.2020.3642
Iman, Q.A., Amal, H.K.: Hiding text in speech signal using k-means, LSB techniques and chaotic maps. Int. J. Elect. Comput. Eng. (IJECE) 10(6), 5726–5735 (2020). https://doi.org/10.11591/ijece.v10i6.pp5726-5735
Taleb, A.S.: Obaid embedding secret data in color image using LSB. J. Educ. Pure Sci. Univ. Thi-Qar. 12(2) (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hussein, A.A., Al Baity, R.M., Al-Bawee, S.A. (2024). Three Levels of Security Including Scrambling, Encryption and Embedding Data as Row in Cover Image with DNA Reference Sequence. In: Farhaoui, Y., Hussain, A., Saba, T., Taherdoost, H., Verma, A. (eds) Artificial Intelligence, Data Science and Applications. ICAISE 2023. Lecture Notes in Networks and Systems, vol 837. Springer, Cham. https://doi.org/10.1007/978-3-031-48465-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-48465-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-48464-3
Online ISBN: 978-3-031-48465-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)