SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 585
DOUBLE LAYERED DNA BASED CRYPTOGRAPHY
Manisha1
, Parvinder Bangar2
, Mohit3
1
Asstt.Prof, ECE Dept., M.R.I.E.M., Rohtak, Haryana, India
2
H.O.D, ECE Dept, CBS Group of Institutions, Jhajjar, Haryana, India
3
M.Tech Scholar, ECE Dept, CBS Group of Institutions, Jhajjar, Haryana, India
Abstract
DNA cryptography the new era of cryptography enhanced the cryptography in terms of time complexity as well as capacity. It
uses the DNA strands to hide the information. The repeated sequence of the DNA makes highly difficult for unintended authority
to get the message. The level of security can be increased by using the more than one cover medium. This paper discussed a
technique that uses two cover medium to hide the message one is DNA and the other is image. The message is encrypted and
converted to faked DNA then this faked DNA is hided to the image.
Keywords: DNA, cryptography, DNA cryptography
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION
Redundancy of words and characters in English language
helps cryptanalysts in guessing the cipher text. Acc. to
Shannon theory, the entropy of printed English lies between
0.6 and 1.3 bpc based on successive character prediction
level of a person [1]. Whereas, Cover and King [2],
estimated the entropy as 1.25 bpc. Researchers [3-5]
estimated the entropy of DNA sequences. After comparing it
with the entropies of other natural languages, they
concluded that expressing power of DNA is higher than any
other natural language. Moreover, Tsonis et al. [6] in his
study declared that DNA sequences do not follow any
linguistic properties. Hence, translating any language first to
DNA sequences and then applying cryptography technique
upon it can prevent the attacks based on frequency analysis.
Adding or hiding data in chemical DNA sequences does not
require us to be very clever For most tasks, a flat encoding
of 2 bits/nucleotide, assigned in alphabetical order would be
a sufficient starting point. A=00 C=01 G=10 T=11 With this
basic foundation, we can add binary segments to DNA that
could be used to store interspersed hidden data, annotate
existing DNA sequences, watermark a DNA computing
solution, and so on. Depending on the task, different
operations could be performed on the binary sequence while
the DNA encoding scheme remains constant. For the
purposes of data storage or transport, a compression step on
the binary data would be useful. For a watermark, an
encryption step would be appropriate. For annotation, plain
text or simple codes could be used. After each important
sequence, perhaps it would be useful to add a checksum to
verify that the DNA strand hasn‟t degraded or been altered.
In all cases, the application would drive the operations
performed on the hidden data and in all cases, existing well-
known binary techniques could be used for this purpose.
The motivation for this is simple. The fewer complex and
unprecedented steps are performed on data, the easier it is to
process, embed, extract, and explain in court. Extending this
notion to live DNA requires great care. Unlike, chemical
DNA where changes can be made wherever necessary to
hide data, with live DNA, besides the obvious dangers of
active genetic segments, there are other complications.
Although, only a small percentage of DNA codes directly
for genes, in addition to genes, there are regulatory and
structural regions. Altering or adding sequences that seem
innocuous may have profound effects when processed by
cellular machinery.
2. RELATED WORK
The existing works are explained in the following table i.e.
table 1:
Table 1: Related Work
Author Year Contribution
Wael Adi et al.
[7]
2008 link the unit identity
to its interaction
profile in the network
Lukas Kencl et
al. [8]
2010 solve the information
concealing problem
Hayam Mousa et
al. [9]
2011 introduced a
reversible information
hiding scheme
Jin-Shiuh Taur et
al. [10]
2012 proposed an improved
algorithm named the
Table Lookup
Substitution Method
(TLSM)
Mohammad Reza
Najaf Torkaman
et al. [11]
2012 decrease the usage of
asymmetric
cryptography
Ban Ahmed
Mitras et al. [12]
2012 Increased Security
M. Yamuna et al.
[13]
2013 Proposed four
methods for
encryption of a binary
string
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 586
3. EXISTING WORK
In this existing method, the algorithm first randomly selects
a DNA sequence for example, TAGCATGACT. Each letter
is then given a subscript index starting from 0. Message
index is the first positional index value of the DNA
sequence. As the next step, any complementary rule. As per
the algorithm, a single letter is replaced with a specific letter
defined by the complementary rule. For example, if the
complementary rule 1 is selected, then, as a first bit (most
significant bit) apart from the obtained sequence, a letter „A‟
is inserted which implicitly tells the receiver that rule 1 is
selected. Likewise, if letter „C‟ is inserted, then it tells that
rule 2 is used and „G‟ is used for rule 3.
The message to be encoded is then taken and each letter in
the faked DNA sequence is given subscript. Each letter in
the message is converted into its ASCII equivalent and they
are then converted into equivalent binary form. Each two
digits in the converted binary sequence are converted. Then,
the message index position (first position of each letter) in
the faked DNA sequence is applied to each letter of the
converted sequence. Each digit in the resultant sequence is
replaced with its equivalent three digit binary value and the
equivalent alphabet value is replaced for the binary value.
For example, if the obtained binary value is 010 011 101 …
, then it will be replaced as C D F… where A has the value
000, B has 001 and so on. The resultant sequence of
alphabets is transmitted over to the receiver. In the receiver
side, the reverse process is done in which the original
receiver knows the complementary rules and the randomly
selected DNA sequence. The message to be sent is then
encoded with the fake DNA sequence and transmitted. It can
also be elaborated by following diagram:
Fig 1: Encryption using Existing Technique
4. PROPOSED TECHNIQUE
In the existing system, if the unintended user gets to know
that data is hided in the particular DNA then the extraction
of data is possible in the DNA based Steganography. It is
due to the fact the data is in plain form in the DNA. While
the cryptography makes the data in encrypted form but the
data is visible to the unintended user. To make the process
more robust and secure the data must hided must be
cascaded by cryptography and the Steganography. In this
work the input is an color image. The R, G, B component
are extracted from the image. The extracted components are
converted in to the binary format. Then the binary array is
reshaped to the block of 8 bit. Then the secret message is
encrypted to the DNA by using the indexing of the faked
DNA. Then the encrypted message i.e. DNA is hided to
blue component of the image by replacing the LSB of the
each block by one bit. The present work can also be easily
explained by the following diagram:
The decryption process is the reverse of the encryption
process. This work is beneficial due to the double cover
medium one is DNA and the other is image. Moreover, the
DNA is hided to the blue component of the image that
makes system imperceptible.
5. CONCLUSION
The paper proposes an imperceptible technique to secure the
message while transmission. The technique is highly
secured as it uses two cover medium to hide the message.
The message is firstly encrypted to the DNA then the
encrypted DNA is hided in to the blue component of the
image. The system is highly secured and efficient. In future,
the other cover medium can also be used to hide the
message.
REFERENCES
[1]. Shannon, C. “Prediction and entropy of printed
English”. Bell Systems Technical Journal, vol. 30, pp. 50-
64. 1951
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 587
[2]. Cover, T. & King, R. “A convergent gambling estimate
of the entropy of English”, IEEE Transactions on
Information Theory, vol. 24, No. 4: pp. 413-421, 1978.
[3]. Lanctot, J., Li, M., & Yang, E. “Estimating DNA
Sequence Entropy”, Symposium on Discrete Algorithms,
2000.
[4]. Farach, M., Noordewier, M., Savari, S., Shepp, L., &
Wyner, A. “On the entropy ofDNA: algorithms and
measurements based on memory and rapid convergence,
Symposium on Discrete Algorithms, 1995.
[5]. Behr, F., Fossum, V., & Mitzenmacher, M. “Estimating
and Comparing Entropy across Written Natural Languages
Using PPM Compression”, Technical Report TR-12-02,
Harvard University, 2002.
[6]. Tsonis, A., Elsner, J., &Tsoni, P. “Is DNA a language?”
Journal of Theoretical Biology, Vol. 184, No.1, pp. 25-29,
1997
[7]. Adi, W. (2008, August). Clone-Resistant DNA-Like
Secured Dynamic Identity. In Bio-inspired Learning and
Intelligent Systems for Security, 2008. BLISS'08. ECSIS
Symposium on (pp. 148-153). IEEE.
[8]. Kencl, L., & Loebl, M. (2010). DNA-inspired
information concealing: A survey. Computer Science
Review, Volume4, Issue (4), pp. 251-262.
[9]. Mousa, H., Moustafa, K., Abdel-Wahed, W., &
Hadhoud, M. M. (2011). Data hiding based on contrast
mapping using DNA medium. Int. Arab J. Inf. Technol.,
Volume- 8 Issue (2), pp 147-154.
[10]. Taur, J. S., Lin, H. Y., Lee, H. L., & Tao, C. W.
(2012). Data Hiding In Dna Sequences Based On Table
LookUp Substitution. International Journal of
InnovativeComputing, Information and Control, Volume 8
Issue (10).
[11]. Torkaman, M. R. N., Kazazi, N. S., & Rouddini, A.
(2012). Innovative approach to improve hybrid
cryptography by using DNA steganography. International
Journal of New Computer Architectures and their
Applications (IJNCAA), Volume-2 Issue(1), pp. 224-235.
[12]. Mitras, B. A., & Aboo, A. K. (2012). Proposed
Steganography Approach Using Dna Properties.
International Journal of Information Technology and
Business Management, Volume-14 Issue 1.
[13]. Yamuna, M., Dangi, M. K., & Singh, K. (2013).
Encryption of a Binary String Using DNA Sequence.
International Journal of Computer Science, Volume 2, Issue
(02).

More Related Content

What's hot

DENIAL OF SERVICE LOG ANALYSIS USING DENSITY K-MEANS METHOD
DENIAL OF SERVICE LOG ANALYSIS USING DENSITY K-MEANS METHODDENIAL OF SERVICE LOG ANALYSIS USING DENSITY K-MEANS METHOD
DENIAL OF SERVICE LOG ANALYSIS USING DENSITY K-MEANS METHODArdymulya Iswardani
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
Data mining with human genetics to enhance gene based algorithm and
Data mining with human genetics to enhance gene based algorithm andData mining with human genetics to enhance gene based algorithm and
Data mining with human genetics to enhance gene based algorithm andIAEME Publication
 
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...IRJET Journal
 
Sentiment Analysis of Bengali text using Gated Recurrent Neural Network
Sentiment Analysis of Bengali text using Gated Recurrent Neural NetworkSentiment Analysis of Bengali text using Gated Recurrent Neural Network
Sentiment Analysis of Bengali text using Gated Recurrent Neural NetworkA. Hasib Uddin
 
Data collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksData collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksPvrtechnologies Nellore
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
 
Unit 1 Introduction to Data Compression
Unit 1 Introduction to Data CompressionUnit 1 Introduction to Data Compression
Unit 1 Introduction to Data CompressionDr Piyush Charan
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
 
Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)Raghavendra Pokuri
 
Randomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithmsRandomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithmsijcisjournal
 
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance csandit
 
Detection of speech under stress using spectral analysis
Detection of speech under stress using spectral analysisDetection of speech under stress using spectral analysis
Detection of speech under stress using spectral analysiseSAT Publishing House
 
Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...IJECEIAES
 
Power spectrum sequence analysis of rheumatic
Power spectrum sequence analysis of rheumaticPower spectrum sequence analysis of rheumatic
Power spectrum sequence analysis of rheumaticeSAT Publishing House
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
 
Application of Hybrid Genetic Algorithm Using Artificial Neural Network in Da...
Application of Hybrid Genetic Algorithm Using Artificial Neural Network in Da...Application of Hybrid Genetic Algorithm Using Artificial Neural Network in Da...
Application of Hybrid Genetic Algorithm Using Artificial Neural Network in Da...IOSRjournaljce
 
Power spectrum sequence analysis of rheumatic arthritis (ra disease using dsp...
Power spectrum sequence analysis of rheumatic arthritis (ra disease using dsp...Power spectrum sequence analysis of rheumatic arthritis (ra disease using dsp...
Power spectrum sequence analysis of rheumatic arthritis (ra disease using dsp...eSAT Journals
 
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...IJERA Editor
 

What's hot (20)

DENIAL OF SERVICE LOG ANALYSIS USING DENSITY K-MEANS METHOD
DENIAL OF SERVICE LOG ANALYSIS USING DENSITY K-MEANS METHODDENIAL OF SERVICE LOG ANALYSIS USING DENSITY K-MEANS METHOD
DENIAL OF SERVICE LOG ANALYSIS USING DENSITY K-MEANS METHOD
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
Data mining with human genetics to enhance gene based algorithm and
Data mining with human genetics to enhance gene based algorithm andData mining with human genetics to enhance gene based algorithm and
Data mining with human genetics to enhance gene based algorithm and
 
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
 
Sentiment Analysis of Bengali text using Gated Recurrent Neural Network
Sentiment Analysis of Bengali text using Gated Recurrent Neural NetworkSentiment Analysis of Bengali text using Gated Recurrent Neural Network
Sentiment Analysis of Bengali text using Gated Recurrent Neural Network
 
Data collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksData collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networks
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
 
Unit 1 Introduction to Data Compression
Unit 1 Introduction to Data CompressionUnit 1 Introduction to Data Compression
Unit 1 Introduction to Data Compression
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)
 
Randomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithmsRandomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithms
 
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
 
Detection of speech under stress using spectral analysis
Detection of speech under stress using spectral analysisDetection of speech under stress using spectral analysis
Detection of speech under stress using spectral analysis
 
Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...
 
Power spectrum sequence analysis of rheumatic
Power spectrum sequence analysis of rheumaticPower spectrum sequence analysis of rheumatic
Power spectrum sequence analysis of rheumatic
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 
1207.2600
1207.26001207.2600
1207.2600
 
Application of Hybrid Genetic Algorithm Using Artificial Neural Network in Da...
Application of Hybrid Genetic Algorithm Using Artificial Neural Network in Da...Application of Hybrid Genetic Algorithm Using Artificial Neural Network in Da...
Application of Hybrid Genetic Algorithm Using Artificial Neural Network in Da...
 
Power spectrum sequence analysis of rheumatic arthritis (ra disease using dsp...
Power spectrum sequence analysis of rheumatic arthritis (ra disease using dsp...Power spectrum sequence analysis of rheumatic arthritis (ra disease using dsp...
Power spectrum sequence analysis of rheumatic arthritis (ra disease using dsp...
 
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
 

Viewers also liked

Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY Abhishek Majumdar
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 

Viewers also liked (7)

Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
581 517-525
581 517-525581 517-525
581 517-525
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 

Similar to Double layered dna based cryptography

DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONDATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONijcisjournal
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA CryptographyIRJET Journal
 
An Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyAn Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyYasmine Anino
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageIOSR Journals
 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6sophiabelthome
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingeSAT Publishing House
 
A novel image encryption scheme based on DCT transform and DNA sequence
A novel image encryption scheme based on DCT transform and  DNA sequenceA novel image encryption scheme based on DCT transform and  DNA sequence
A novel image encryption scheme based on DCT transform and DNA sequencenooriasukmaningtyas
 
Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...eSAT Journals
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programmingeSAT Publishing House
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyjournalBEEI
 
Improving the data recovery for short length LT codes
Improving the data recovery for short length LT codes Improving the data recovery for short length LT codes
Improving the data recovery for short length LT codes IJECEIAES
 
Data reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological dataData reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological dataeSAT Journals
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyAM Publications
 

Similar to Double layered dna based cryptography (20)

DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONDATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
 
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORKCLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
 
An Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyAn Survey On DNA Based Cryptography
An Survey On DNA Based Cryptography
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
W4301117121
W4301117121W4301117121
W4301117121
 
A novel image encryption scheme based on DCT transform and DNA sequence
A novel image encryption scheme based on DCT transform and  DNA sequenceA novel image encryption scheme based on DCT transform and  DNA sequence
A novel image encryption scheme based on DCT transform and DNA sequence
 
Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programming
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
 
H42054550
H42054550H42054550
H42054550
 
Improving the data recovery for short length LT codes
Improving the data recovery for short length LT codes Improving the data recovery for short length LT codes
Improving the data recovery for short length LT codes
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Data reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological dataData reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological data
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 

Double layered dna based cryptography

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 585 DOUBLE LAYERED DNA BASED CRYPTOGRAPHY Manisha1 , Parvinder Bangar2 , Mohit3 1 Asstt.Prof, ECE Dept., M.R.I.E.M., Rohtak, Haryana, India 2 H.O.D, ECE Dept, CBS Group of Institutions, Jhajjar, Haryana, India 3 M.Tech Scholar, ECE Dept, CBS Group of Institutions, Jhajjar, Haryana, India Abstract DNA cryptography the new era of cryptography enhanced the cryptography in terms of time complexity as well as capacity. It uses the DNA strands to hide the information. The repeated sequence of the DNA makes highly difficult for unintended authority to get the message. The level of security can be increased by using the more than one cover medium. This paper discussed a technique that uses two cover medium to hide the message one is DNA and the other is image. The message is encrypted and converted to faked DNA then this faked DNA is hided to the image. Keywords: DNA, cryptography, DNA cryptography --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Redundancy of words and characters in English language helps cryptanalysts in guessing the cipher text. Acc. to Shannon theory, the entropy of printed English lies between 0.6 and 1.3 bpc based on successive character prediction level of a person [1]. Whereas, Cover and King [2], estimated the entropy as 1.25 bpc. Researchers [3-5] estimated the entropy of DNA sequences. After comparing it with the entropies of other natural languages, they concluded that expressing power of DNA is higher than any other natural language. Moreover, Tsonis et al. [6] in his study declared that DNA sequences do not follow any linguistic properties. Hence, translating any language first to DNA sequences and then applying cryptography technique upon it can prevent the attacks based on frequency analysis. Adding or hiding data in chemical DNA sequences does not require us to be very clever For most tasks, a flat encoding of 2 bits/nucleotide, assigned in alphabetical order would be a sufficient starting point. A=00 C=01 G=10 T=11 With this basic foundation, we can add binary segments to DNA that could be used to store interspersed hidden data, annotate existing DNA sequences, watermark a DNA computing solution, and so on. Depending on the task, different operations could be performed on the binary sequence while the DNA encoding scheme remains constant. For the purposes of data storage or transport, a compression step on the binary data would be useful. For a watermark, an encryption step would be appropriate. For annotation, plain text or simple codes could be used. After each important sequence, perhaps it would be useful to add a checksum to verify that the DNA strand hasn‟t degraded or been altered. In all cases, the application would drive the operations performed on the hidden data and in all cases, existing well- known binary techniques could be used for this purpose. The motivation for this is simple. The fewer complex and unprecedented steps are performed on data, the easier it is to process, embed, extract, and explain in court. Extending this notion to live DNA requires great care. Unlike, chemical DNA where changes can be made wherever necessary to hide data, with live DNA, besides the obvious dangers of active genetic segments, there are other complications. Although, only a small percentage of DNA codes directly for genes, in addition to genes, there are regulatory and structural regions. Altering or adding sequences that seem innocuous may have profound effects when processed by cellular machinery. 2. RELATED WORK The existing works are explained in the following table i.e. table 1: Table 1: Related Work Author Year Contribution Wael Adi et al. [7] 2008 link the unit identity to its interaction profile in the network Lukas Kencl et al. [8] 2010 solve the information concealing problem Hayam Mousa et al. [9] 2011 introduced a reversible information hiding scheme Jin-Shiuh Taur et al. [10] 2012 proposed an improved algorithm named the Table Lookup Substitution Method (TLSM) Mohammad Reza Najaf Torkaman et al. [11] 2012 decrease the usage of asymmetric cryptography Ban Ahmed Mitras et al. [12] 2012 Increased Security M. Yamuna et al. [13] 2013 Proposed four methods for encryption of a binary string
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 586 3. EXISTING WORK In this existing method, the algorithm first randomly selects a DNA sequence for example, TAGCATGACT. Each letter is then given a subscript index starting from 0. Message index is the first positional index value of the DNA sequence. As the next step, any complementary rule. As per the algorithm, a single letter is replaced with a specific letter defined by the complementary rule. For example, if the complementary rule 1 is selected, then, as a first bit (most significant bit) apart from the obtained sequence, a letter „A‟ is inserted which implicitly tells the receiver that rule 1 is selected. Likewise, if letter „C‟ is inserted, then it tells that rule 2 is used and „G‟ is used for rule 3. The message to be encoded is then taken and each letter in the faked DNA sequence is given subscript. Each letter in the message is converted into its ASCII equivalent and they are then converted into equivalent binary form. Each two digits in the converted binary sequence are converted. Then, the message index position (first position of each letter) in the faked DNA sequence is applied to each letter of the converted sequence. Each digit in the resultant sequence is replaced with its equivalent three digit binary value and the equivalent alphabet value is replaced for the binary value. For example, if the obtained binary value is 010 011 101 … , then it will be replaced as C D F… where A has the value 000, B has 001 and so on. The resultant sequence of alphabets is transmitted over to the receiver. In the receiver side, the reverse process is done in which the original receiver knows the complementary rules and the randomly selected DNA sequence. The message to be sent is then encoded with the fake DNA sequence and transmitted. It can also be elaborated by following diagram: Fig 1: Encryption using Existing Technique 4. PROPOSED TECHNIQUE In the existing system, if the unintended user gets to know that data is hided in the particular DNA then the extraction of data is possible in the DNA based Steganography. It is due to the fact the data is in plain form in the DNA. While the cryptography makes the data in encrypted form but the data is visible to the unintended user. To make the process more robust and secure the data must hided must be cascaded by cryptography and the Steganography. In this work the input is an color image. The R, G, B component are extracted from the image. The extracted components are converted in to the binary format. Then the binary array is reshaped to the block of 8 bit. Then the secret message is encrypted to the DNA by using the indexing of the faked DNA. Then the encrypted message i.e. DNA is hided to blue component of the image by replacing the LSB of the each block by one bit. The present work can also be easily explained by the following diagram: The decryption process is the reverse of the encryption process. This work is beneficial due to the double cover medium one is DNA and the other is image. Moreover, the DNA is hided to the blue component of the image that makes system imperceptible. 5. CONCLUSION The paper proposes an imperceptible technique to secure the message while transmission. The technique is highly secured as it uses two cover medium to hide the message. The message is firstly encrypted to the DNA then the encrypted DNA is hided in to the blue component of the image. The system is highly secured and efficient. In future, the other cover medium can also be used to hide the message. REFERENCES [1]. Shannon, C. “Prediction and entropy of printed English”. Bell Systems Technical Journal, vol. 30, pp. 50- 64. 1951
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 587 [2]. Cover, T. & King, R. “A convergent gambling estimate of the entropy of English”, IEEE Transactions on Information Theory, vol. 24, No. 4: pp. 413-421, 1978. [3]. Lanctot, J., Li, M., & Yang, E. “Estimating DNA Sequence Entropy”, Symposium on Discrete Algorithms, 2000. [4]. Farach, M., Noordewier, M., Savari, S., Shepp, L., & Wyner, A. “On the entropy ofDNA: algorithms and measurements based on memory and rapid convergence, Symposium on Discrete Algorithms, 1995. [5]. Behr, F., Fossum, V., & Mitzenmacher, M. “Estimating and Comparing Entropy across Written Natural Languages Using PPM Compression”, Technical Report TR-12-02, Harvard University, 2002. [6]. Tsonis, A., Elsner, J., &Tsoni, P. “Is DNA a language?” Journal of Theoretical Biology, Vol. 184, No.1, pp. 25-29, 1997 [7]. Adi, W. (2008, August). Clone-Resistant DNA-Like Secured Dynamic Identity. In Bio-inspired Learning and Intelligent Systems for Security, 2008. BLISS'08. ECSIS Symposium on (pp. 148-153). IEEE. [8]. Kencl, L., & Loebl, M. (2010). DNA-inspired information concealing: A survey. Computer Science Review, Volume4, Issue (4), pp. 251-262. [9]. Mousa, H., Moustafa, K., Abdel-Wahed, W., & Hadhoud, M. M. (2011). Data hiding based on contrast mapping using DNA medium. Int. Arab J. Inf. Technol., Volume- 8 Issue (2), pp 147-154. [10]. Taur, J. S., Lin, H. Y., Lee, H. L., & Tao, C. W. (2012). Data Hiding In Dna Sequences Based On Table LookUp Substitution. International Journal of InnovativeComputing, Information and Control, Volume 8 Issue (10). [11]. Torkaman, M. R. N., Kazazi, N. S., & Rouddini, A. (2012). Innovative approach to improve hybrid cryptography by using DNA steganography. International Journal of New Computer Architectures and their Applications (IJNCAA), Volume-2 Issue(1), pp. 224-235. [12]. Mitras, B. A., & Aboo, A. K. (2012). Proposed Steganography Approach Using Dna Properties. International Journal of Information Technology and Business Management, Volume-14 Issue 1. [13]. Yamuna, M., Dangi, M. K., & Singh, K. (2013). Encryption of a Binary String Using DNA Sequence. International Journal of Computer Science, Volume 2, Issue (02).