SlideShare a Scribd company logo
International Journal of Engineering Research and Development
e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 7 (August 2012), PP. 69-72


    Two Stages Data-Image Steganography Using DNA Sequence
                  Suman Chakraborty1, Prof. Samir Kumar Bandyopadhyay2
              1
               B.P. Poddar Institute of Management and Technology, 137, V.I.P. Road, Kolkata – 700052, India
              2
               Dept. of Computer Sc. & Engg, University of Calcutta, 92 A.P.C. Road, Kolkata – 700009, India



Abstract––In Image steganography Secret massages hide with in an Image where the Secret massage is embedding with
in the Cover image. In this paper an attempt has been made to introduce a method in which Secret information is
hidden within the Cover image and Cover image is hidden within DNA sequence. In this paper two steps steganography
approach are used where Secret information has been hidden in more depth than general steganography approach. Due
to approach unauthorized person may consider Cover image as Secret information. This is a great advantage with
respected to security. To implement this approach three algorithms have been used one for hiding information and other
twos for recovering.

Keywords––DNA, Embedding, Steganography, Cover image, Secret Information, Complement

                                           I.         INTRODUCTION
           The term Steganography comes form the Greek words stegos (cover) and graphy (write). Therefore steganography
literally means covered writing. Steganography unlike cryptography, does not change or scramble the message until it is
illegible for an illegitimate receiver, it camouflages the message to occult its existence.[1]
           DNA sequence, the information in DNA possess some interesting properties which can be utilized to hide data as a
code prepared up of four chemical bases (A,C,G,T) : adenine (A), guanine (G), cytosine (C), and thymine (T).
Conventionally, data hiding approaches frequently implant a secret message into the congregation images. However, this
could deform the congregation image to some degree, and may therefore; medicinal effectiveness and susceptibility for
solving complex, highly comparable computational problems have also been demonstrated. The capability to hide, gloss
information, and watermarks within this intermediate is clearly meaningful. The order, or sequence, of these bases
determines the information accessible for structuring and preserving an organism, comparable to the technique in which
correspondence of the alphabet come into vision in a certain categorize to form sentence and words. DNA bases join up with
both together, A with T and C with G, to configure units called base pairs that can promote greatly from a data hiding
scheme, and a bit of surroundings in retroviral DNA sequences is required to understand this method. Each base is also
closed to a sugar molecule and a phosphate molecule [2].
           In this paper an attempt has been made to explore a new method which makes steganography process more secure
than in general approach. In our approach secret data covered by more than one object, one is outer cover and other is inner
cover. Use DNA complementary rule and magic number sequence to achieve the goal.
           In the next section we will discuss about the background of the proposed work. In Section 3, flow diagram of
steganography method ;Section 4,Binary representation of nucleotides; Section 5, Details of the hiding algorithm; Section
6, Reverse procedure; Section 7, Example and Section 8, Conclusion.

                       II.          BACKGROUND OF THE PROPOSED WORK
          The complimentary DNA sequence means the sequence on the other strand of DNA directly opposite your
specified sequence.
          There are six major Complementary rules for each letter of DNA sequence. For all letter x, C(x), C(C(x)),
C(C(C(x))) is not equal.[3]

    1.     A→T , T→C , C→G ,     G→A
    2.     A→T , T→G , G→C ,     C→A
    3.     A→C , C→T , T→G ,     G→A
    4.     A→C , C→G , G→T ,     T→A
    5.     A→G , G→T , T→C ,     C→A
    6.     A→G , G→C , C→T ,     T→A

     We used the magic number as the forward tracking algorithm. It is very simple to implement and do what is our
purpose. The basic concept of magic number is we select one base value and add nine. If we add the digits of result, it will
produce the base value. If n is base f(n) = R, Rn+..+R2+R1 = n. If we choose 1 as base the result we as follows:
f(1)=1,1+9=10 (1+0=1), 10+9=19 (1+9=10,1+0=1), 19+9=28 (2+8=10, 1+0=1),…[4]

         The proposed method can be viewed graphically as follows


                                                            69
Two Stages Data-Image Steganography Using DNA Sequence



                                           Secret
                                           Information
                                                          Cover
                                                          Image

                                                                       Changed DNA
                                                                       Sequence




                                             Stage-1                        Stage-2

                               III.          STEGANOGRAPHY PROCEDURE
            The actual procedure for hiding data at the sender side and receiver side are presented below through block
diagrams.

Sender Side (Hiding)

        Cover Image                        DNA Sequence                            Hide Secret
                                                                                   Information with in
                                                                                   Cover Image
                                                                                   (Algorithm -1)
        Secret                             Digital Form
        Information




                                                                                   Unmatched DNA sequence of Cover
                                                                                   Image




                                                                                   Send Unmatched DNA sequence



Receiver Side (Recovering)

               Received Unmatched                           Decode                             DNA Sequence of Cover
               DNA sequence                                 (Algorithm-2)                      Image




                                                                                               Compare Received DNA
                                                                                               Sequence with Cover
                                                                                               Image DNA Sequence
                                                                                                  (Algorithm-3)




                                                                                               Secret
                                                                                               Information




                                                                  70
Two Stages Data-Image Steganography Using DNA Sequence

                  IV.            BINARY REPRESENTATION OF NUCLEOTIDES
          Algorithm 1 &2 use two methods to convert nucleotide in binary form –1)using 2 bits , 2)using 3 bits.2 bits
encoding use for normal DNA sequence and 3 bits for special purpose .Tabel-1 and Tabel-2 showing 2-bits and 3-bits
representation respectively.
                                             Nucleotide Binary
                                                         Form

                                                      A              00
                                                      C              01
                                                      G              10
                                                      T              11
                                                          Tabel-1
                                                 Nucleotide         Binary
                                                                    Form
                                                      A                000
                                                      C                001
                                                      G                010
                                                      T                011
                                                          Tabel-2

                                            V.            ALGORITHM
Algorithm-1
This algorithm uses for embedding secret image within cover image. Following postulates for the algorithm-
         DNA sequence length of a Cover image >=Greatest magic number. Length of DNA sequence relates with Length
          of Secret information bit stream.
         Embed secret image bit stream into DNA sequence of Cover image by magic no. sequence.

Step-1: Take DNA sequence of Cover image.
Step-2: Take Secret information bit stream.
Step-3: Generate magic number (No. of magic number = No. of bits in Secret information
       bit stream) .
Step-4: Embed Secret information bits with in DNA sequence by DNA sequence
          Complementary rules, embed position is magic number wise.
          If secret bit is 1 then
          Use Complementary rule-1 and convert that complementary form in
          binary 2 bits wise.
           (Any of the rule can be use from six rules)
          Otherwise
          Convert that nucleotide in binary 3 bits wise

Step-5: Changed DNA sequence (S′ ).
Step-6: End.

Algorithm-2
Step-1: Take received DNA sequence (S′) as input.
Step-2: If (magic number. wise position) and (2 bits representation) Then
           Reverse mapping of Complementary rule-1.
           Otherwise
           No change.
Step-3: Cover image DNA sequence S.
Step-4: End.


Algorithm-3
Step-1: Take S and S′.
Step-2: i=0.
Step-3: Compare S and S′ only magic number wise positions.
Step-4: If C(S) =S′
          Secret [i++] =1
          Otherwise
          Secret [i++] =0
Step-5: Array “Secret” contains bit stream of Secret information.



                                                              71
Two Stages Data-Image Steganography Using DNA Sequence

                                                 VI.           EXAMPLE
The process is illustrated through the following example.

Sender side




For the above Cover image corresponding DNA sequence is “CTTCCGTGCGATGTA GCCGGTATCTTTGGACAT
TGGTATATTTCATGC” which is chosen arbitrarily.

Secret massage 100011

Complementary Rule-1: A→T, T→C, C→G, G→A.

Embedded position magic number wise are- 2, 11, 20, 29, 38, 47(No. of bit in secret massage is 6)

          Position :      2        11      20       29       38       47
            S:         CTT CCG TGC GAT GTA GCC GGT ATC TTT GGA CAT TGG TAT ATT TCA TGC
Secret massage :          1            0             0             0             1
1

Changed DNA sequence : CCT CCG TGCGAT GTA GCCGGTATC TTT G GACAT TGG T TTATT TC A T AC
(Complementary
   Rule-1 )

Binary form :            0101110101101110011000011101100100101100101100110111111110010000100111110
                            1011111100 1111110100110001


Receiver Side

Changed DNA Sequence : CCT CCG TGCGAT GTA GCCGGTATC TTT G GACAT TGG T TTATT TC A T AC
                  (0101110101101110011000011101100100101100101100110111111110010000100111110
                         1011111100 1111110100110001 )
Using Algorithm-2       : CTT CCG TGCGAT GTA GCCGGTATC TTT GGACAT TGG T ATATT TC A T GC

Cover Image DNA             :   CTT CCG TGCGAT GTA GCCGGTATC TTT GGACAT TGG T ATATT TC A T GC
Sequence

Secret Information          :      1         0                   0               0        1                    1
(Using Algorithm-3)


                                           VII.             CONCLUSION
         In this paper two steps steganography approach are used where Secret information has been hidden in more depth
than general steganography approach. The procedure for the method is illustrated with example.

                                                        REFERENCE
  [1].   J. Fridich, and R. Du, “Secure Steganographics Methods for Palette Images”, In Information Hiding, 3rd International Workshop,
         Springer 1999, pp. 47-60.
  [2].   Prof. Samir Kumar Bandyopadhyay and S Chakraborty, “Image Hiding in DNA Sequence Using Arithmetic Encoding”, Journal
         of Global Research in Computer Science, Volume 2, No.4, April 2011.
  [3].   Mohammad Reza Najaf Torkaman1, Nazanin Sadat Kazazi, Azizallah Rouddini,” Innovative Approach to Improve Hybrid
         Cryptography by Using DNA Steganography” International Journal on New Computer Architectures and Their Applications
         (IJNCAA) 2(1): 225-236.
  [4].   Prof. Samir K Bandyopadhyay and Indra K Maitra,” Hiding of Data using Researved Field of Palette for Steganography”,
         Journal of Computer Science and Engineering, Volume 1, Issue 2, june 2010.




                                                                72

More Related Content

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development

Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
IOSR Journals
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
cscpconf
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
Journal For Research
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
IJERA Editor
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
IJERA Editor
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
IRJET Journal
 
Hv3114921496
Hv3114921496Hv3114921496
Hv3114921496
IJERA Editor
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
IJORCS
 
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image EncryptionIRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
IRJET Journal
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
Mumbai Academisc
 
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...
Varun Ojha
 
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET Journal
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
Mumbai Academisc
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
CSCJournals
 
Secure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTSecure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFT
ijcisjournal
 
Gh2411361141
Gh2411361141Gh2411361141
Gh2411361141
IJERA Editor
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
IRJET Journal
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
Rasheed Karuvally
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
 
Hv3114921496
Hv3114921496Hv3114921496
Hv3114921496
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
 
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image EncryptionIRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Enc...
 
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
Secure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTSecure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFT
 
Gh2411361141
Gh2411361141Gh2411361141
Gh2411361141
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
IJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
IJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
IJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
IJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
IJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
IJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
IJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
IJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
IJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 

Recently uploaded (20)

PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com Volume 2, Issue 7 (August 2012), PP. 69-72 Two Stages Data-Image Steganography Using DNA Sequence Suman Chakraborty1, Prof. Samir Kumar Bandyopadhyay2 1 B.P. Poddar Institute of Management and Technology, 137, V.I.P. Road, Kolkata – 700052, India 2 Dept. of Computer Sc. & Engg, University of Calcutta, 92 A.P.C. Road, Kolkata – 700009, India Abstract––In Image steganography Secret massages hide with in an Image where the Secret massage is embedding with in the Cover image. In this paper an attempt has been made to introduce a method in which Secret information is hidden within the Cover image and Cover image is hidden within DNA sequence. In this paper two steps steganography approach are used where Secret information has been hidden in more depth than general steganography approach. Due to approach unauthorized person may consider Cover image as Secret information. This is a great advantage with respected to security. To implement this approach three algorithms have been used one for hiding information and other twos for recovering. Keywords––DNA, Embedding, Steganography, Cover image, Secret Information, Complement I. INTRODUCTION The term Steganography comes form the Greek words stegos (cover) and graphy (write). Therefore steganography literally means covered writing. Steganography unlike cryptography, does not change or scramble the message until it is illegible for an illegitimate receiver, it camouflages the message to occult its existence.[1] DNA sequence, the information in DNA possess some interesting properties which can be utilized to hide data as a code prepared up of four chemical bases (A,C,G,T) : adenine (A), guanine (G), cytosine (C), and thymine (T). Conventionally, data hiding approaches frequently implant a secret message into the congregation images. However, this could deform the congregation image to some degree, and may therefore; medicinal effectiveness and susceptibility for solving complex, highly comparable computational problems have also been demonstrated. The capability to hide, gloss information, and watermarks within this intermediate is clearly meaningful. The order, or sequence, of these bases determines the information accessible for structuring and preserving an organism, comparable to the technique in which correspondence of the alphabet come into vision in a certain categorize to form sentence and words. DNA bases join up with both together, A with T and C with G, to configure units called base pairs that can promote greatly from a data hiding scheme, and a bit of surroundings in retroviral DNA sequences is required to understand this method. Each base is also closed to a sugar molecule and a phosphate molecule [2]. In this paper an attempt has been made to explore a new method which makes steganography process more secure than in general approach. In our approach secret data covered by more than one object, one is outer cover and other is inner cover. Use DNA complementary rule and magic number sequence to achieve the goal. In the next section we will discuss about the background of the proposed work. In Section 3, flow diagram of steganography method ;Section 4,Binary representation of nucleotides; Section 5, Details of the hiding algorithm; Section 6, Reverse procedure; Section 7, Example and Section 8, Conclusion. II. BACKGROUND OF THE PROPOSED WORK The complimentary DNA sequence means the sequence on the other strand of DNA directly opposite your specified sequence. There are six major Complementary rules for each letter of DNA sequence. For all letter x, C(x), C(C(x)), C(C(C(x))) is not equal.[3] 1. A→T , T→C , C→G , G→A 2. A→T , T→G , G→C , C→A 3. A→C , C→T , T→G , G→A 4. A→C , C→G , G→T , T→A 5. A→G , G→T , T→C , C→A 6. A→G , G→C , C→T , T→A We used the magic number as the forward tracking algorithm. It is very simple to implement and do what is our purpose. The basic concept of magic number is we select one base value and add nine. If we add the digits of result, it will produce the base value. If n is base f(n) = R, Rn+..+R2+R1 = n. If we choose 1 as base the result we as follows: f(1)=1,1+9=10 (1+0=1), 10+9=19 (1+9=10,1+0=1), 19+9=28 (2+8=10, 1+0=1),…[4] The proposed method can be viewed graphically as follows 69
  • 2. Two Stages Data-Image Steganography Using DNA Sequence Secret Information Cover Image Changed DNA Sequence Stage-1 Stage-2 III. STEGANOGRAPHY PROCEDURE The actual procedure for hiding data at the sender side and receiver side are presented below through block diagrams. Sender Side (Hiding) Cover Image DNA Sequence Hide Secret Information with in Cover Image (Algorithm -1) Secret Digital Form Information Unmatched DNA sequence of Cover Image Send Unmatched DNA sequence Receiver Side (Recovering) Received Unmatched Decode DNA Sequence of Cover DNA sequence (Algorithm-2) Image Compare Received DNA Sequence with Cover Image DNA Sequence (Algorithm-3) Secret Information 70
  • 3. Two Stages Data-Image Steganography Using DNA Sequence IV. BINARY REPRESENTATION OF NUCLEOTIDES Algorithm 1 &2 use two methods to convert nucleotide in binary form –1)using 2 bits , 2)using 3 bits.2 bits encoding use for normal DNA sequence and 3 bits for special purpose .Tabel-1 and Tabel-2 showing 2-bits and 3-bits representation respectively. Nucleotide Binary Form A 00 C 01 G 10 T 11 Tabel-1 Nucleotide Binary Form A 000 C 001 G 010 T 011 Tabel-2 V. ALGORITHM Algorithm-1 This algorithm uses for embedding secret image within cover image. Following postulates for the algorithm-  DNA sequence length of a Cover image >=Greatest magic number. Length of DNA sequence relates with Length of Secret information bit stream.  Embed secret image bit stream into DNA sequence of Cover image by magic no. sequence. Step-1: Take DNA sequence of Cover image. Step-2: Take Secret information bit stream. Step-3: Generate magic number (No. of magic number = No. of bits in Secret information bit stream) . Step-4: Embed Secret information bits with in DNA sequence by DNA sequence Complementary rules, embed position is magic number wise. If secret bit is 1 then Use Complementary rule-1 and convert that complementary form in binary 2 bits wise. (Any of the rule can be use from six rules) Otherwise Convert that nucleotide in binary 3 bits wise Step-5: Changed DNA sequence (S′ ). Step-6: End. Algorithm-2 Step-1: Take received DNA sequence (S′) as input. Step-2: If (magic number. wise position) and (2 bits representation) Then Reverse mapping of Complementary rule-1. Otherwise No change. Step-3: Cover image DNA sequence S. Step-4: End. Algorithm-3 Step-1: Take S and S′. Step-2: i=0. Step-3: Compare S and S′ only magic number wise positions. Step-4: If C(S) =S′ Secret [i++] =1 Otherwise Secret [i++] =0 Step-5: Array “Secret” contains bit stream of Secret information. 71
  • 4. Two Stages Data-Image Steganography Using DNA Sequence VI. EXAMPLE The process is illustrated through the following example. Sender side For the above Cover image corresponding DNA sequence is “CTTCCGTGCGATGTA GCCGGTATCTTTGGACAT TGGTATATTTCATGC” which is chosen arbitrarily. Secret massage 100011 Complementary Rule-1: A→T, T→C, C→G, G→A. Embedded position magic number wise are- 2, 11, 20, 29, 38, 47(No. of bit in secret massage is 6) Position : 2 11 20 29 38 47 S: CTT CCG TGC GAT GTA GCC GGT ATC TTT GGA CAT TGG TAT ATT TCA TGC Secret massage : 1 0 0 0 1 1 Changed DNA sequence : CCT CCG TGCGAT GTA GCCGGTATC TTT G GACAT TGG T TTATT TC A T AC (Complementary Rule-1 ) Binary form : 0101110101101110011000011101100100101100101100110111111110010000100111110 1011111100 1111110100110001 Receiver Side Changed DNA Sequence : CCT CCG TGCGAT GTA GCCGGTATC TTT G GACAT TGG T TTATT TC A T AC (0101110101101110011000011101100100101100101100110111111110010000100111110 1011111100 1111110100110001 ) Using Algorithm-2 : CTT CCG TGCGAT GTA GCCGGTATC TTT GGACAT TGG T ATATT TC A T GC Cover Image DNA : CTT CCG TGCGAT GTA GCCGGTATC TTT GGACAT TGG T ATATT TC A T GC Sequence Secret Information : 1 0 0 0 1 1 (Using Algorithm-3) VII. CONCLUSION In this paper two steps steganography approach are used where Secret information has been hidden in more depth than general steganography approach. The procedure for the method is illustrated with example. REFERENCE [1]. J. Fridich, and R. Du, “Secure Steganographics Methods for Palette Images”, In Information Hiding, 3rd International Workshop, Springer 1999, pp. 47-60. [2]. Prof. Samir Kumar Bandyopadhyay and S Chakraborty, “Image Hiding in DNA Sequence Using Arithmetic Encoding”, Journal of Global Research in Computer Science, Volume 2, No.4, April 2011. [3]. Mohammad Reza Najaf Torkaman1, Nazanin Sadat Kazazi, Azizallah Rouddini,” Innovative Approach to Improve Hybrid Cryptography by Using DNA Steganography” International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(1): 225-236. [4]. Prof. Samir K Bandyopadhyay and Indra K Maitra,” Hiding of Data using Researved Field of Palette for Steganography”, Journal of Computer Science and Engineering, Volume 1, Issue 2, june 2010. 72