DNA Base Data Hiding Algorithm

نویسندگان

  • Mohammad Reza Abbasy
  • Pourya Nikfard
  • Ali Ordi
  • Mohammad Reza Najaf Torkaman
چکیده

Proposing an algorithm by using software point of view for the purpose of implementing data hiding based on DNA sequences to increase the complexity is the main target of this paper. The implementation of algorithm is applicable because of some interesting characteristics of DNA sequences. Both of DNA’s features and Binary Coding Technology beside Complementary Pairing Rules are explained through the paper. Since, both of a secret message (M) and DNA reference sequence is needed. Data hiding is started by applying three different and separate steps to prepare M ́ ́ ́. The receiver will apply the process of identifying and extracting the original message (M) which had been hidden in DNA reference sequence. As the security of the algorithm is crucial part, it will appear in security issue’s section.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing an algorithm for use to hide sensitive association rules through perturb technique

Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...

متن کامل

Data Hiding in Dna Sequences Based on Table Lookup Substitution

Hiding secret messages in DNA sequences has become a popular research in recent years. In this paper, we propose an improved algorithm named the Table Lookup Substitution Method (TLSM) to enhance the performance of an existing data hiding method called the substitution method. Moreover, a general form of the TLSM is discussed, which includes the original method as a special case. After that, a ...

متن کامل

Data Hiding Method Based on Graph Coloring and Pixel Block‘s Correlation in Color Image

An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map

The reversible image hiding method is one data hiding technique for protecting secret data or copyright. The reversible image hiding method can completely reconstruct the cover image from the stego-image after the embedded secret data are completely extracted. However, many proposed reversible image hiding methods require a location map to restore the cover images. Although the location map can...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012