This document reviews recent DNA-based data hiding algorithms. It discusses significant features of DNA steganography techniques, including the data hiding method, algorithm type, blindness, encryption, number of hiding layers, conservation of DNA functionality, length expansion, modification rate, DNA selection, and what is proposed. The document analyzes and compares recent DNA data hiding algorithms based on these parameters. It aims to identify limitations and present approaches for more secure, efficient and reliable DNA-based data hiding algorithms in future work.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
One of the essential challenges nowadays; is how to secure data with the increase of its volume as well as its transmission rate. The most frequent approach used to give a high degree of protection, preserve data from hackers, and accomplish multilayer security is steganography combined with encryption. DNA (Deoxyribonucleic Acid) is considered as a new promising carrier for data security while achieving powerful security and maximum protection. In this paper, a secure DNA cryptosystem model which combines steganography with encryption is introduced and categorized into two layers. The original data are hidden in the first layer into a reference DNA based on the insertion method to obtain a fake DNA sequence. In the second layer, this fake DNA sequence, which is the first layer's output, is encrypted using an indexing cipher to produce an encrypted message in the form of indexes. The proposed model guarantees multilayer security to the secret data with high performance and low-time wasting. It addresses the long-generation key problem of the DNA cryptography. The experimental results assess and validate the theoretical security analysis and model performance.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
Delay and disruption tolerant network (DTN) is used for long area communication in computer network, where there is no direct connection between the sender and receiver and there was no internet facility. Delay tolerant network generally perform store and forward techniques as a result intermediate node can view the message, the possible solution is using encryption techniques to protect the message. Starting stages of DTN RSA, DES, 3DES encryption algorithms are used but now a day’s attribute based encryption (ABE) techniques are used. Attribute based encryption technique can be classified in to two, key policy attribute based encryption (KPABE) and cipher policy attribute based encryption (CPABE). In this paper we perform a categorized survey on different encryption techniques presents in delay tolerant networks. This categorized survey is very helpful for researchers to propose modified encryption techniques. Finally the paper compares the performance and effectiveness of different encryption algorithms.
Data protection based neural cryptography and deoxyribonucleic acidIJECEIAES
The need to a robust and effective methods for secure data transferring makes the more credible. Two disciplines for data encryption presented in this paper: machine learning and deoxyribonucleic acid (DNA) to achieve the above goal and following common goals: prevent unauthorized access and eavesdropper. They used as powerful tool in cryptography. This paper grounded first on a two modified Hebbian neural network (MHNN) as a machine learning tool for message encryption in an unsupervised method. These two modified Hebbian neural nets classified as a: learning neural net (LNN) for generating optimal key ciphering and ciphering neural net CNN) for coding the plaintext using the LNN keys. The second granulation using DNA nucleated to increase data confusion and compression. Exploiting the DNA computing operations to upgrade data transmission security over the open nets. The results approved that the method is effective in protect the transferring data in a secure manner in less time
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
One of the essential challenges nowadays; is how to secure data with the increase of its volume as well as its transmission rate. The most frequent approach used to give a high degree of protection, preserve data from hackers, and accomplish multilayer security is steganography combined with encryption. DNA (Deoxyribonucleic Acid) is considered as a new promising carrier for data security while achieving powerful security and maximum protection. In this paper, a secure DNA cryptosystem model which combines steganography with encryption is introduced and categorized into two layers. The original data are hidden in the first layer into a reference DNA based on the insertion method to obtain a fake DNA sequence. In the second layer, this fake DNA sequence, which is the first layer's output, is encrypted using an indexing cipher to produce an encrypted message in the form of indexes. The proposed model guarantees multilayer security to the secret data with high performance and low-time wasting. It addresses the long-generation key problem of the DNA cryptography. The experimental results assess and validate the theoretical security analysis and model performance.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
Delay and disruption tolerant network (DTN) is used for long area communication in computer network, where there is no direct connection between the sender and receiver and there was no internet facility. Delay tolerant network generally perform store and forward techniques as a result intermediate node can view the message, the possible solution is using encryption techniques to protect the message. Starting stages of DTN RSA, DES, 3DES encryption algorithms are used but now a day’s attribute based encryption (ABE) techniques are used. Attribute based encryption technique can be classified in to two, key policy attribute based encryption (KPABE) and cipher policy attribute based encryption (CPABE). In this paper we perform a categorized survey on different encryption techniques presents in delay tolerant networks. This categorized survey is very helpful for researchers to propose modified encryption techniques. Finally the paper compares the performance and effectiveness of different encryption algorithms.
Data protection based neural cryptography and deoxyribonucleic acidIJECEIAES
The need to a robust and effective methods for secure data transferring makes the more credible. Two disciplines for data encryption presented in this paper: machine learning and deoxyribonucleic acid (DNA) to achieve the above goal and following common goals: prevent unauthorized access and eavesdropper. They used as powerful tool in cryptography. This paper grounded first on a two modified Hebbian neural network (MHNN) as a machine learning tool for message encryption in an unsupervised method. These two modified Hebbian neural nets classified as a: learning neural net (LNN) for generating optimal key ciphering and ciphering neural net CNN) for coding the plaintext using the LNN keys. The second granulation using DNA nucleated to increase data confusion and compression. Exploiting the DNA computing operations to upgrade data transmission security over the open nets. The results approved that the method is effective in protect the transferring data in a secure manner in less time
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process. Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a
consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to
initial condition, due to which small change in input produces a major change in output. This paper
summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The
algorithms covered both private key encryption as well as public key encryption technique in the paper.
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
A novel image encryption scheme based on DCT transform and DNA sequencenooriasukmaningtyas
Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Furthermore, empirical results on real images and security analysis demonstrate that our scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack and statistical attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Development of depth map from stereo images using sum of absolute differences...nooriasukmaningtyas
This article proposes a framework for the depth map reconstruction using stereo images. Fundamentally, this map provides an important information which commonly used in essential applications such as autonomous vehicle navigation, drone’s navigation and 3D surface reconstruction. To develop an accurate depth map, the framework must be robust against the challenging regions of low texture, plain color and repetitive pattern on the input stereo image. The development of this map requires several stages which starts with matching cost calculation, cost aggregation, optimization and refinement stage. Hence, this work develops a framework with sum of absolute difference (SAD) and the combination of two edge preserving filters to increase the robustness against the challenging regions. The SAD convolves using block matching technique to increase the efficiency of matching process on the low texture and plain color regions. Moreover, two edge preserving filters will increase the accuracy on the repetitive pattern region. The results show that the proposed method is accurate and capable to work with the challenging regions. The results are provided by the Middlebury standard dataset. The framework is also efficiently and can be applied on the 3D surface reconstruction. Moreover, this work is greatly competitive with previously available methods.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
More Related Content
Similar to Significant features for steganography techniques using deoxyribonucleic acid: a review
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process. Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a
consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to
initial condition, due to which small change in input produces a major change in output. This paper
summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The
algorithms covered both private key encryption as well as public key encryption technique in the paper.
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
A novel image encryption scheme based on DCT transform and DNA sequencenooriasukmaningtyas
Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Furthermore, empirical results on real images and security analysis demonstrate that our scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack and statistical attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to Significant features for steganography techniques using deoxyribonucleic acid: a review (20)
Development of depth map from stereo images using sum of absolute differences...nooriasukmaningtyas
This article proposes a framework for the depth map reconstruction using stereo images. Fundamentally, this map provides an important information which commonly used in essential applications such as autonomous vehicle navigation, drone’s navigation and 3D surface reconstruction. To develop an accurate depth map, the framework must be robust against the challenging regions of low texture, plain color and repetitive pattern on the input stereo image. The development of this map requires several stages which starts with matching cost calculation, cost aggregation, optimization and refinement stage. Hence, this work develops a framework with sum of absolute difference (SAD) and the combination of two edge preserving filters to increase the robustness against the challenging regions. The SAD convolves using block matching technique to increase the efficiency of matching process on the low texture and plain color regions. Moreover, two edge preserving filters will increase the accuracy on the repetitive pattern region. The results show that the proposed method is accurate and capable to work with the challenging regions. The results are provided by the Middlebury standard dataset. The framework is also efficiently and can be applied on the 3D surface reconstruction. Moreover, this work is greatly competitive with previously available methods.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
Control of a servo-hydraulic system utilizing an extended wavelet functional ...nooriasukmaningtyas
Servo-hydraulic systems have been extensively employed in various industrial applications. However, these systems are characterized by their highly complex and nonlinear dynamics, which complicates the control design stage of such systems. In this paper, an extended wavelet functional link neural network (EWFLNN) is proposed to control the displacement response of the servo-hydraulic system. To optimize the controller's parameters, a recently developed optimization technique, which is called the modified sine cosine algorithm (M-SCA), is exploited as the training method. The proposed controller has achieved remarkable results in terms of tracking two different displacement signals and handling external disturbances. From a comparative study, the proposed EWFLNN controller has attained the best control precision compared with those of other controllers, namely, a proportional-integralderivative (PID) controller, an artificial neural network (ANN) controller, a wavelet neural network (WNN) controller, and the original wavelet functional link neural network (WFLNN) controller. Moreover, compared to the genetic algorithm (GA) and the original sine cosine algorithm (SCA), the M-SCA has shown better optimization results in finding the optimal values of the controller's parameters.
Decentralised optimal deployment of mobile underwater sensors for covering la...nooriasukmaningtyas
This paper presents the problem of sensing coverage of layers of the ocean in three dimensional underwater environments. We propose distributed control laws to drive mobile underwater sensors to optimally cover a given confined layer of the ocean. By applying this algorithm at first the mobile underwater sensors adjust their depth to the specified depth. Then, they make a triangular grid across a given area. Afterwards, they randomly move to spread across the given grid. These control laws only rely on local information also they are easily implemented and computationally effective as they use some easy consensus rules. The feature of exchanging information just among neighbouring mobile sensors keeps the information exchange minimum in the whole networks and makes this algorithm practicable option for undersea. The efficiency of the presented control laws is confirmed via mathematical proof and numerical simulations.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Smart monitoring system using NodeMCU for maintenance of production machinesnooriasukmaningtyas
Maintenance is an activity that helps to reduce risk, increase productivity, improve quality, and minimize production costs. The necessity for maintenance actions will increase efficiency and enhance the safety and quality of products and processes. On getting these conditions, it is necessary to implement a monitoring system used to observe machines' conditions from time to time, especially the machine parts that often experience problems. This paper presents a low-cost intelligent monitoring system using NodeMCU to continuously monitor machine conditions and provide warnings in the case of machine failure. Not only does it provide alerts, but this monitoring system also generates historical data on machine conditions to the Google Cloud (Google Sheet), includes which machines were down, downtime, issues occurred, repairs made, and technician handling. The results obtained are machine operators do not need to lose a relatively long time to call the technician. Likewise, the technicians assisted in carrying out machine maintenance activities and online reports so that errors that often occur due to human error do not happen again. The system succeeded in reducing the technician-calling time and maintenance workreporting time up to 50%. The availability of online and real-time maintenance historical data will support further maintenance strategy.
Design and simulation of a software defined networkingenabled smart switch, f...nooriasukmaningtyas
Using sustainable energy is the future of our planet earth, this became not only economically efficient but also a necessity for the preservation of life on earth. Because of such necessity, smart grids became a very important issue to be researched. Many literatures discussed this topic and with the development of internet of things (IoT) and smart sensors, smart grids are developed even further. On the other hand, software defined networking is a technology that separates the control plane from the data plan of the network. It centralizes the management and the orchestration of the network tasks by using a network controller. The network controller is the heart of the SDN-enabled network, and it can control other networking devices using software defined networking (SDN) protocols such as OpenFlow. A smart switching mechanism called (SDN-smgrid-sw) for the smart grid will be modeled and controlled using SDN. We modeled the environment that interact with the sensors, for the sun and the wind elements. The Algorithm is modeled and programmed for smart efficient power sharing that is managed centrally and monitored using SDN controller. Also, all if the smart grid elements (power sources) are connected to the IP network using IoT protocols.
Efficient wireless power transmission to remote the sensor in restenosis coro...nooriasukmaningtyas
In this study, the researchers have proposed an alternative technique for designing an asymmetric 4 coil-resonance coupling module based on the series-to-parallel topology at 27 MHz industrial scientific medical (ISM) band to avoid the tissue damage, for the constant monitoring of the in-stent restenosis coronary artery. This design consisted of 2 components, i.e., the external part that included 3 planar coils that were placed outside the body and an internal helical coil (stent) that was implanted into the coronary artery in the human tissue. This technique considered the output power and the transfer efficiency of the overall system, coil geometry like the number of coils per turn, and coil size. The results indicated that this design showed an 82% efficiency in the air if the transmission distance was maintained as 20 mm, which allowed the wireless power supply system to monitor the pressure within the coronary artery when the implanted load resistance was 400 Ω.
Grid reactive voltage regulation and cost optimization for electric vehicle p...nooriasukmaningtyas
Expecting large electric vehicle (EV) usage in the future due to environmental issues, state subsidies, and incentives, the impact of EV charging on the power grid is required to be closely analyzed and studied for power quality, stability, and planning of infrastructure. When a large number of energy storage batteries are connected to the grid as a capacitive load the power factor of the power grid is inevitably reduced, causing power losses and voltage instability. In this work large-scale 18K EV charging model is implemented on IEEE 33 network. Optimization methods are described to search for the location of nodes that are affected most due to EV charging in terms of power losses and voltage instability of the network. Followed by optimized reactive power injection magnitude and time duration of reactive power at the identified nodes. It is shown that power losses are reduced and voltage stability is improved in the grid, which also complements the reduction in EV charging cost. The result will be useful for EV charging stations infrastructure planning, grid stabilization, and reducing EV charging costs.
Topology network effects for double synchronized switch harvesting circuit on...nooriasukmaningtyas
Energy extraction takes place using several different technologies, depending on the type of energy and how it is used. The objective of this paper is to study topology influence for a smart network based on piezoelectric materials using the double synchronized switch harvesting (DSSH). In this work, has been presented network topology for circuit DSSH (DSSH Standard, Independent DSSH, DSSH in parallel, mono DSSH, and DSSH in series). Using simulation-based on a structure with embedded piezoelectric system harvesters, then compare different topology of circuit DSSH for knowledge is how to connect the circuit DSSH together and how to implement accurately this circuit strategy for maximizing the total output power. The network topology DSSH extracted power a technique allows again up to in terms of maximal power output compared with network topology standard extracted at the resonant frequency. The simulation results show that by using the same input parameters the maximum efficiency for topology DSSH in parallel produces 120% more energy than topology DSSH-series. In addition, the energy harvesting by mono-DSSH is more than DSSH-series by 650% and it has exceeded DSSHind by 240%.
Improving the design of super-lift Luo converter using hybrid switching capac...nooriasukmaningtyas
In this article, an improvement to the positive output super-lift Luo converter (POSLC) has been proposed to get high gain at a low duty cycle. Also, reduce the stress on the switch and diodes, reduce the current through the inductors to reduce loss, and increase efficiency. Using a hybrid switch unit composed of four inductors and two capacitors it is replaced by the main inductor in the elementary circuit. It’s charged in parallel with the same input voltage and discharged in series. The output voltage is increased according to the number of components. The gain equation is modeled. The boundary condition between continuous conduction mode (CCM) and discontinuous conduction mode (DCM) has been derived. Passive components are designed to get high output voltage (8 times at D=0.5) and low ripple about (0.004). The circuit is simulated and analyzed using MATLAB/Simulink. Maximum power point tracker (MPPT) controls the converter to provide the most interest from solar energy.
Third harmonic current minimization using third harmonic blocking transformernooriasukmaningtyas
Zero sequence blocking transformers (ZSBTs) are used to suppress third harmonic currents in 3-phase systems. Three-phase systems where singlephase loading is present, there is every chance that the load is not balanced. If there is zero-sequence current due to unequal load current, then the ZSBT will impose high impedance and the supply voltage at the load end will be varied which is not desired. This paper presents Third harmonic blocking transformer (THBT) which suppresses only higher harmonic zero sequences. The constructional features using all windings in single-core and construction using three single-phase transformers explained. The paper discusses the constructional features, full details of circuit usage, design considerations, and simulation results for different supply and load conditions. A comparison of THBT with ZSBT is made with simulation results by considering four different cases
Power quality improvement of distribution systems asymmetry caused by power d...nooriasukmaningtyas
With an increase of non-linear load in today’s electrical power systems, the rate of power quality drops and the voltage source and frequency deteriorate if not properly compensated with an appropriate device. Filters are most common techniques that employed to overcome this problem and improving power quality. In this paper an improved optimization technique of filter applies to the power system is based on a particle swarm optimization with using artificial neural network technique applied to the unified power flow quality conditioner (PSO-ANN UPQC). Design particle swarm optimization and artificial neural network together result in a very high performance of flexible AC transmission lines (FACTs) controller and it implements to the system to compensate all types of power quality disturbances. This technique is very powerful for minimization of total harmonic distortion of source voltages and currents as a limit permitted by IEEE-519. The work creates a power system model in MATLAB/Simulink program to investigate our proposed optimization technique for improving control circuit of filters. The work also has measured all power quality disturbances of the electrical arc furnace of steel factory and suggests this technique of filter to improve the power quality.
Studies enhancement of transient stability by single machine infinite bus sys...nooriasukmaningtyas
Maintaining network synchronization is important to customer service. Low fluctuations cause voltage instability, non-synchronization in the power system or the problems in the electrical system disturbances, harmonics current and voltages inflation and contraction voltage. Proper tunning of the parameters of stabilizer is prime for validation of stabilizer. To overcome instability issues and get reinforcement found a lot of the techniques are developed to overcome instability problems and improve performance of power system. Genetic algorithm was applied to optimize parameters and suppress oscillation. The simulation of the robust composite capacitance system of an infinite single-machine bus was studied using MATLAB was used for optimization purpose. The critical time is an indication of the maximum possible time during which the error can pass in the system to obtain stability through the simulation. The effectiveness improvement has been shown in the system
Renewable energy based dynamic tariff system for domestic load managementnooriasukmaningtyas
To deal with the present power-scenario, this paper proposes a model of an advanced energy management system, which tries to achieve peak clipping, peak to average ratio reduction and cost reduction based on effective utilization of distributed generations. This helps to manage conventional loads based on flexible tariff system. The main contribution of this work is the development of three-part dynamic tariff system on the basis of time of utilizing power, available renewable energy sources (RES) and consumers’ load profile. This incorporates consumers’ choice to suitably select for either consuming power from conventional energy sources and/or renewable energy sources during peak or off-peak hours. To validate the efficiency of the proposed model we have comparatively evaluated the model performance with existing optimization techniques using genetic algorithm and particle swarm optimization. A new optimization technique, hybrid greedy particle swarm optimization has been proposed which is based on the two aforementioned techniques. It is found that the proposed model is superior with the improved tariff scheme when subjected to load management and consumers’ financial benefit. This work leads to maintain a healthy relationship between the utility sectors and the consumers, thereby making the existing grid more reliable, robust, flexible yet cost effective.
Energy harvesting maximization by integration of distributed generation based...nooriasukmaningtyas
The purpose of distributed generation systems (DGS) is to enhance the distribution system (DS) performance to be better known with its benefits in the power sector as installing distributed generation (DG) units into the DS can introduce economic, environmental and technical benefits. Those benefits can be obtained if the DG units' site and size is properly determined. The aim of this paper is studying and reviewing the effect of connecting DG units in the DS on transmission efficiency, reactive power loss and voltage deviation in addition to the economical point of view and considering the interest and inflation rate. Whale optimization algorithm (WOA) is introduced to find the best solution to the distributed generation penetration problem in the DS. The result of WOA is compared with the genetic algorithm (GA), particle swarm optimization (PSO), and grey wolf optimizer (GWO). The proposed solutions methodologies have been tested using MATLAB software on IEEE 33 standard bus system
Intelligent fault diagnosis for power distribution systemcomparative studiesnooriasukmaningtyas
Short circuit is one of the most popular types of permanent fault in power distribution system. Thus, fast and accuracy diagnosis of short circuit failure is very important so that the power system works more effectively. In this paper, a newly enhanced support vector machine (SVM) classifier has been investigated to identify ten short-circuit fault types, including single line-toground faults (XG, YG, ZG), line-to-line faults (XY, XZ, YZ), double lineto-ground faults (XYG, XZG, YZG) and three-line faults (XYZ). The performance of this enhanced SVM model has been improved by using three different versions of particle swarm optimization (PSO), namely: classical PSO (C-PSO), time varying acceleration coefficients PSO (T-PSO) and constriction factor PSO (K-PSO). Further, utilizing pseudo-random binary sequence (PRBS)-based time domain reflectometry (TDR) method allows to obtain a reliable dataset for SVM classifier. The experimental results performed on a two-branch distribution line show the most optimal variant of PSO for short fault diagnosis.
A deep learning approach based on stochastic gradient descent and least absol...nooriasukmaningtyas
More than eighty-five to ninety percentage of the diabetic patients are affected with diabetic retinopathy (DR) which is an eye disorder that leads to blindness. The computational techniques can support to detect the DR by using the retinal images. However, it is hard to measure the DR with the raw retinal image. This paper proposes an effective method for identification of DR from the retinal images. In this research work, initially the Weiner filter is used for preprocessing the raw retinal image. Then the preprocessed image is segmented using fuzzy c-mean technique. Then from the segmented image, the features are extracted using grey level co-occurrence matrix (GLCM). After extracting the fundus image, the feature selection is performed stochastic gradient descent, and least absolute shrinkage and selection operator (LASSO) for accurate identification during the classification process. Then the inception v3-convolutional neural network (IV3-CNN) model is used in the classification process to classify the image as DR image or non-DR image. By applying the proposed method, the classification performance of IV3-CNN model in identifying DR is studied. Using the proposed method, the DR is identified with the accuracy of about 95%, and the processed retinal image is identified as mild DR.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Significant features for steganography techniques using deoxyribonucleic acid: a review
1. Indonesian Journal of Electrical Engineering and Computer Science
Vol. 21, No. 1, January 2021, pp. 338~347
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i1.pp338-347 338
Journal homepage: http://ijeecs.iaescore.com
Significant features for steganography techniques using
deoxyribonucleic acid: a review
Nichirvan Asaad Zebari1
, Dilovan Asaad Zebari2
, Diyar Qader Zeebaree3
, Jwan Najeeb Saeed4
1
Department of Computer Engineering, Harran University, Sanliurfa, Turkey
2,3
Research Center of Duhok Polytechnic University, Duhok, Kurdistan Region, Iraq
4
IT Department, Duhok Technical Institute, Duhok Polytechnic University, Duhok, Kurdistan Region, Iraq
Article Info ABSTRACT
Article history:
Received Apr 14, 2020
Revised Jul 5, 2020
Accepted Jul 28, 2020
Information security and confidentiality are the prime concern of any type of
communication. Rapidly evolution of technology recently, leads to increase
the intruder’s ability and a main challenge to information security. Therefore,
utilizing the non-traditional basics for information security is required, such
as DNA which is focused as a new aspect to achieve better security. In this
paper, a survey of more recent DNA based on data hiding algorithms are
covered. With particular emphasis of different parameters several data hiding
algorithms based on DNA has been reviewed. To present a more secure an
efficient data hiding algorithms based on DNA for future works, this willbe
helpful.
Keywords:
Cryptography
Data hiding
Data security
DNA
This is an open access article under the CC BY-SA license.
Corresponding Author:
Nichirvan Asaad Zebari
Department of Computer Engineering
Harran University, Sanliurfa, Turkey
Email: kurdid08@gmail.com
1. INTRODUCTION
In the recent past, trends in internet applications have necessitated transmission security. The
exposure of information during transmission has given rise to the requirement of encryption when
transmitting confidential data [1, 2]. Security is a major concern of any type of communication thereby
making security and confidentiality necessary for thriving networks. This is due to the unreliable and
unsecure nature of the underlying communication network over which the transfer of sensitive information is
carried out [3].
The most widely implemented methods in the communication and computer security fields are
cryptography and data hiding. Encryption and data hiding approaches are used to investigate and improve
individual privacy [4, 5]. The main goal of cryptography is to protect the message from attackers by
replacing the original plaintext message with an unintelligible format called a cipher message. In
cryptography, if the system is broken, the intruder can find out the real meaning of the message through the
process of cryptanalysis. Therefore, the use of cryptography disguises the message thereby keeping it secure
from intruders even though the cipher message is made public after encryption [6-8]. Cryptography
techniques are divided into two major categories: substitution and transposition. The substitution ciphers
encrypt the confidential data by substituting the data one piece at a time. While in the transposition cipher,
the positions held by units of confidential data are shifted according to a regular system, so that the cipher
data constitutes a permutation of the confidential data [9].
2. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Significant features for steganography techniques using deoxyribonucleic… (Nichirvan Asaad Zebari)
339
In contrast, data hiding is used in order to avoid rousing the suspicion of attackers. Data hiding is a
science that involves communicating secret data using an appropriate carrier. Data hiding gets a role on the
stage of information security. Data hiding refers to the technique of hiding information in digital media in
order to conceal the existence of the information [10]. Usually, secure communication is achieved through
the application of encryption. But nowadays, the day-by-day rise in the demand for security have led to the
use of data hiding for information security [11].
The data hiding technique should cause minimal change in the characteristics of the original media
once the data is covered in order to conceal its existence. The main objective behind data hiding is to hide
data with minimal differences between the original carrier and the modified one (concealing the message)
that can be observed by the naked eye. As a consequence, this reduces suspicion on the existence of a
concealed message and is characterized by improved algorithm security. As a result, the hacker cannot easily
uncover the underlying confidential information [2]. Data hiding is more secure and often preferred to
cryptography for two reasons: cryptology is not sufficient in isolation, for the transmission of data over an
insecure, public channel; it is the science of covered writing. On the other hand, data hiding is hidden writing
which aims at hiding the existence of the message [9, 12, 13].
A general data hiding system usually consists of two algorithms: embedding and extraction. An
embedding algorithm outlines the details for the combination of two files to obtain a stego file made up of the
secret data and the carrier. The extraction algorithm, on the other hand, outlines the details of how to subtract
a file from another file. Moreover, some schemes use an additional key to increase the security level [13, 14].
Based on these, key data hiding algorithms can be divided into three main categories as shown in Figure1:
pure data hiding, secret key and public key algorithms. Firstly, pure data hiding does not use any key; its
security is based on the privacy of the algorithm [15, 16]. Secondly, the secret key algorithm uses a single
key for both embedding and extraction processes. One of the greatest benefits of secret key algorithms is the
fast speed of embedding and extraction processes [17, 18]. Finally, the public key algorithm uses a pair of
keys: one for embedding and another one for the extraction process. Robustness is the main attribute of
public key algorithms; the knowledge of one key by a third party does not guarantee the discovery of the
other key [17, 19]. However, this algorithm has lower speed compared to the private key algorithm by a
factor of 100-1000 [20].
Figure1. Steganography types
Figure 2 shows several multimedia which can serve as data hiding carriers include text, video,
audio, and image. Every carrier has its own characteristics and its availability in a certain region which
determines the amount of secret information that can be concealed by each carrier [11, 21]. Deoxyribonucleic
acid (DNA) is a recent carrier have been used in data hiding area [22, 23]. In this paper, we focus only on
data hiding in DNA. The rest of the paper is organized as follow. Section II briefly introduces the background
of DNA. Section 2 explained using DNA sequences as a carrier in data hiding technique. Comparative study
of recent algorithms is given in Section 3. Finally, the conclusion and future work are given in Section 4.
3. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 338 - 347
340
Figure 2. Block diagram of DNA steganography technique
2. DNA
In molecular biology, genetic information and features are stored in DNA. These genetic materials
characterize all the behavioral and physical aspects of an organism as it encodes the genetic instructions used
in to facilitate the functions of all known living organisms. DNA is a nucleic acid that contains the genetic
instructions used in the development and functioning of all known living organisms and viruses [24, 25].
Genetic material known as DNA structure has been found out by Watson and Crick in (1953). DNA
is a long molecule located in all living organism's body cells; it is formed by two backbone strands twisted
around each other, called a Double helix as shown in Figure 3. Each DNA strand composed of many of tiny
subunits called nucleotide. Adenine (A), thymine (T), guanine (G), and cytosine (C) are the four different
bases located in DNA sequence which are stick out with sugar and phosphate backbone to complete the
nucleotide. Biologically there are two different pairs of DNA bases which are Purine (A and G) and
Pyrimidine (T and C). Constantly (A) linked to (T) within two hydrogen bonds and (C) linked to (G) within
three hydrogen bonds [26, 27]. Every three adjacent nucleotides constitute a unit known as a codon. With
four possible bases, the three nucleotides can give 43 = 64 different possibilities, and these combinations are
used to specify 20 different amino acids used by living organisms. The arrangement of the amino acids
dictates the structure and function of the resultant protein [17].
DNA can be encoded into a binary form through the use of a binary coding rule. Researchers are
free to choose any equivalent binary form for each base (A) can be '00', '01', '10', or '11', and so on. This
coding, in addition to the randomness properties makes DNA a suitable candidate for application in both
computing and cryptography. Thus, coding DNA to binary form can give 4! = 24 encoding ways [28]. DNA
is being proposed for use in many computational applications in a bid to solve many NP-complete and other
hard problems [9]. The first experimental of data hiding technique in DNA had done successfully by Clelland
using DNA microdots, for concealing secret data [29]. Figure 4 shows a polymer comprised of monomers
referred to as deoxyribose nucleotides made up of three components [30].
Recently, protecting confidential data in DNA is born as a new data hiding field. A confidential data
instead of chains of zeros and ones can be expressed as a chain of DNA bases. Nowadays a rapid
development occurred in the field of data protection; hence a new data hiding approach been depended by
protecting data in DNA. Through implementing many researchers on this area data hiding in DNA
demonstrated by many researchers as an efficient medium [31]. Data hiding of DNA sequence considered as
a branch of cryptography despite of using no encryption [19, 32].
The long-term storage medium of data and an ultra-compact made the DNA to be utilized for
concealing, storing, and transmitting information’s is similar to, multimedia carriers. Comparing with other
mediums, the area of data hiding in DNA behind several advantages is becoming popular extensively. By
combining two DNA sequences with each other, protecting data in DNA can be done just like other medium
where used traditional algorithms for concealing information inside them [33-35]. The very high storage
capacity feature is one of the most significant benefits of using DNA sequences as a carrier for concealing
confidential data. It has ability to store tremendous amount of data, and only one cm (one gram) of DNA has
potential to store 455 Exabyte’s of data. Adding to that, more security in term of cryptography and data
4. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Significant features for steganography techniques using deoxyribonucleic… (Nichirvan Asaad Zebari)
341
hiding can be provided for converting any secret data into DNA sequences with more simplicity. Because of
that DNA maybe consists of more than 3 billion nucleotides and due to complexity and randomness, it can be
considered as a highly efficient carrier for storing information [30, 36].
Figure 3. DNA structure [9]
Figure 4. The structure of deoxyribose nucleic DNA[30]
Online databases such as european bioinformatics institute (EBI) and national centre for
biotechnology information (NCBI) store vast number of DNA sequences. Thus, for message retrieving the
intruders face hard effort to select the exact DNA sequence. The utilization of biological characteristics for
embedding data within DNA sequences can be observed as great future of them. The utilization of
appropriate methods of data compression provide concealing big amount of information within title DNA,
while the same method can be depended with other media that will be used for concealing less data.
However, one of the most crucial DNA sequence characteristics is visibility. The real and fake DNA
sequence can be distinguished by unauthorized users because the very low visibility. Hence, it is extremely
hard or unachievable for the intruders to break the data hiding system of DNA sequences because of the
complexity of operations and convert nature of DNA [30, 37]. So, these DNA’s benefits and characteristics
exploited to conceal confidential data within it.
Several advantages achieved by comparing protecting data in DNA with hiding data in image. First,
one of the drawbacks of image is that the opportunity of intruders to extract the message and the distortion
will be increased with increasing the embedding capacity and concealing more data. In the other hand,
because of that DNA sequence consists of four distinct letters A, C, G, and T which are unmeaning by most
people, there is no worry about distortion in it. Second, because of that each base of DNA requires two bits of
memory while each pixel of image requires eight bits of memory for storing, the embedding capacity of DNA
is extremely bigger than image. Therefore, one bit per nucleotide (bpn) in DNA is equal to four bits per pixel
5. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 338 - 347
342
(bpp) in image. Third, computational efficiency in DNA sequence is much better than image because it is
quite hard to embed and easy to extract the data applying data hiding algorithms on image while the
procedure in DNA is vice versa exactly [1, 35].
3. COMPARATIVE STUDY
Based on different parameters in Table I recent DNA algorithms based on data hiding are compared.
The first parameter is the method which is used to hide secret data within DNA reference. In [38] insertion,
complementary pair, and substitution techniques proposed which are considered the main techniques for most
proposed DNA based on data hiding algorithms. The second parameter is the type of data hiding algorithm,
there are three types which are pure data hiding we denoted as (PR), secret key data hiding denoted as (ST),
and public key data hiding denoted as (PC). The third parameter shows the blindness property of the
proposed algorithm, if the algorithm is blind, we showed by (Y) if the algorithm is un-blind, we showed by
(N). The fourth parameter shows if the algorithm combined with an encryption technique, (Y) means
combined while (N) means does not combined with any encryption technique. The fifth parameter, this
shows if the proposed algorithm is a single layer data hiding by (S) or a double layer data hiding by (D). The
sixth parameter, this tells the algorithm conserved the original functionality of the DNA after hiding by (Y)
and (N) means does not conserved. The seventh parameter, which shows if the algorithm expands the DNA
reference length after hiding by (Y) and (N) means does not expand the length of DNA reference. The eighth
parameter shows that if the proposed algorithm considered as a high modification rate (H) or (L) as a low
modification rate. DNA is a ninth parameter which shows that how the proposed algorithm selected the DNA
reference. Finally, the last parameter shows that the algorithm is based on what is proposed. As a result, the
mentioned parameters can be described as a main parameter in DNA based on data hiding.
The conclusion of the previous algorithms has been concluded in Table I. The limitation has been
showed in the proposed table based on several parameters as mentioned before. The main objective behind
this comparison is to present that how to exploit these parameters to propose a more secure, efficient, and
reliable data hiding algorithm based on DNA.
The strengthen of the first parameter which represented by hiding method is substitution which
considered as a more efficient of the three main methods because the payload is always keeping as zero.
Another parameter which should be supported by hiding data in DNA is key to makes much more difficult to
attack the algorithm. Because key is considered as a one of the most crucial parameters in security, it is
preferred to use a key as well as to produce not a pure algorithm. The most important parameter which should
be focused during hiding data in DNA is blindness property. As long as does not sending the original carrier
to the receiver is considered as a more secure algorithm. Thus, to avoid sending original carrier the algorithm
should be blind. Un-blind means the original carrier should be send to the receiver which considered as a less
secure technique. To provide a double layer data hiding technique into two aspects. First, confidential data
should be encrypted before hiding to provide double secured layer technique. Hiding cipher data within DNA
reference instead of the original data is considered as a strengthen feature of the proposed technique. Second,
hiding data in more depth than the original data hiding techniques to provide double hiding layer. This
property will be achieved by integrating a multimedia carrier with DNA reference. Biologically to provide
more security is conserving original functionality of the DNA reference after embedding confidential data is
considered as a main parameter, this means functionality of producing proteins is not affected by exploiting
some DNA properties such as silent mutation and codon redundancy this does not make the attention of
attackers. Finally, the quality of stego carrier is considered as a crucial parameter in data hiding field.
Producing some distortions in multimedia carriers after embedding data makes more attention for attackers.
Thus, minimizing this distortion is considered as a very important parameter. In DNA sequences, the length
of DNA as well as the modification rate are used as two measures of stego DNA quality. No expansion in
DNA length (payload is equal zero) with low modification rate will result as a superior quality of DNA after
embedding confidential data. As a result, the main target behind addressed parameters is to increase the
degree of security as possible and to prevent intruders to retrieve the confidential data by any way. Therefore,
we can conclude that the main objective for the proposed data hiding algorithms based on DNA is to be not
pure system, blind, double secured layers, double hided layers, biologically conserved, and with superior
quality. Hiding data in DNA will provide more security by achieving more of these parameters. Three of
these parameters have been done in [20, 26, 39-46], most of them focused on not to be a pure system, blind
property, and double secured layer. Four of these parameters have been done in [36, 47-49], all of them
provided not to be pure system as well as double secured layer. Five parameters have been done in [50-55],
most of them focused on not to be a pure system, blind property, double secured layer, and double hided
layer. Finally, most of parameters have been done in [18, 56, 57], they achieved that not to be a pure system,
blind property, conserving biological functionality, and producing better quality.
6. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Significant features for steganography techniques using deoxyribonucleic… (Nichirvan Asaad Zebari)
343
Table 1. comparative study of DNA based on data hiding
Ref. Method
Data
hiding
type
Blind
or not
Encrypted
or not
Single/
Double
layer
DNA
original
Function
conservation
DNA
reference
length
expansion
Modifi
cation
rate
DNA
reference
Based on Limitation
[1]
Table lookup
substitution
method
(TLSM)
PR N N S N -- H NCBI
Substitution
method
Biological DNA
functionality does not
maintain
[26]
Complement
ary
PR N N S Y N L NCBI
Features of
DNA
Unblind technique also
the size of massage has
been increased
[28]
Least
significant
base
substitution
(LSBase)
ST Y N S Y N L NCBI
Codon
degeneracy
Low security based on
the probability cracking
[35]
Dictionary
based
substitution
method
(DBSM)
PR Y N S N Y -- NCBI
Original
substitution and
complementary
rule
Security is low due to
expanding the length of
stego DNA and
increasing the size of
the binary message in
some cases
[36] Substitution ST N Y S N N H NCBI
Technique used
in [47]
Security is low due to
high modification rate
and changing the
functionality of amino
acid also its unblind
technique
[38]
Insertion
Complement
ary
Substitution
PR N N S N Y L NCBI
Properties of
DNA
sequences
Unblind algorithm and
the rate of modification
is quite high as well as
the functionality of
amino acid is changed
[39] Insertion ST Y Y S N Y -- NCBI
Biological
properties of
DNA as amino
acids
Payload not equal to
zero also it needs more
data during the
extraction process
[41] Histogram ST Y N S -- N -- ----
Histogram
technique
Hiding secret data only
in nucleotides which
their marks are equal to
zeros after converting to
binary
[42] Insertion PC N Y S N Y H NCBI
DNA sequence
and structure of
amino acid
Its payload not equal to
zero, unblind method,
and high modification
rate. During the hiding
process, the amino acid
functionality has been
modified
[43]
Two by two
generic
complementa
ry rules and
LSB
ST N Y D -- -- --
rando
mly
LSB technique,
amino acids,
and codons
The receiver needs
multiple data to extract
the secret data as well
as it is considered as an
unblind algorithm
[44]
Swiping
message
bases
ST Y Y S N -- H NCBI
2D chaotic,
XOR, and
hamming code
approach
The functionality of
biological DNA has
been maintained also it
has high modification
rate
[45]
GCBS and
insertion
ST Y Y S N Y H NCBI
Some features
of DNA
sequence
The redundancy process
has been used highly in
the process of
embedding and the
modification rate is
high. Also, its payload
not equal zero
[46]
LSB or
module
function
ST Y N D -- -- --
secret
data
Secret sharing
scheme with
the DNA-XOR
operator for
color images
Consuming time during
the process of data
extraction.
[47] Substitution ST N Y S N N -- NCBI
Amino acid
and generic
two-by-two
complementary
rule
The functionality of
biological DNA has
been changed and its
security depends on the
reference of DNA
[48]
Complement
ary
ST Y Y D -- -- -- text
Image gridding
method, LSB,
and MSB
It has low capacity
[49] Substitution ST N Y S N N H NCBI
The technique
used in [47]
Unsecured technique
because the probability
cracking is very low
7. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 338 - 347
344
Ref. Method
Data
hiding
type
Blind
or not
Encrypted
or not
Single/
Double
layer
DNA
original
Function
conservation
DNA
reference
length
expansion
Modifi
cation
rate
DNA
reference
Based on Limitation
[50]
Substituting
the least
significant 2-
bit
ST Y Y D -- -- --
Cheby
shev
maps
Chebyshev
maps, addition
and subtraction
operations
Receiver needs DNA
reference during the
extraction as well as its
calculation is complex
[51]
Replacing
third bases of
degenerative
codons
ST Y Y D N -- -- image
2D chaotic
map,
degenerative
codon,
addition,
subtraction
rules, and LSB
There is two parts of the
method header of
extraction and the data
extractions
[52]
Replacing
degenerative
genetic code
ST Y Y D N -- -- image
2D chaotic
map,
degenerative
genetic code,
2D logistic
map,
For secret data
extraction, the receiver
needs multiple secret
key
[53]
Base
substitution
ST Y Y D -- -- -- image
2D logistic
map, LSB, and
codon property
The process of hiding
and extracting require
multiple data which
makes the security rate
of the extracting secret
data is high against
attackers
[54]
Randomized
LSBase
substitution
PC Y Y D -- -- -- NCBI
LSB, amino
acids, and
codon
degeneracy
The functionality of
biological DNA has
been modified during
the embedding process
[55]
Substitution
of [1] method
ST N Y S Y N H NCBI
Microdot, non-
coding region
of DNA
sequence, and
prime sequence
In non-coding region
the modification rate is
high also receiver
require multiple data for
secret data extraction
[56]
Used rules in
table I
PR Y Y S Y N L NCBI
Repeated
nucleotides in
DNA and XOR
operation
It cannot convert any
punctuation marks of
secret text to secret
DNA, also the rule
which used to replace
text to DNA should be
known by both sender
and receiver
[57] Substitution ST Y Y S Y N L NCBI
Amino acids,
n-bits coding,
LSBase, some
DNA
properties
In the case of highly
repeated bases in the
selected DNA
reference, the
modification rate will
be high
[58]
Complement
ary
ST N Y S N N -- EBI
Substitution
method
Unblind technique
[59]
Complement
ary defined
as
substitution
PR N N S N N L NCBI
Injective
mapping
mechanism and
repeated
nucleotides
Multiple data should be
known by the sender
and receiver such as
hiding rule and injective
mapping which makes
the security is low.
Also, the modification
rate is quite high, and it
is considered as an
unblind technique
[60]
Complement
ary
PT Y N D --
--
-- image Magic number
[61]
Complement
ary
PC N Y S N N L NCBI
Prime numbers
and substitution
method
Unblind method with
sending the position of
the DNA nucleotide
which holds the secret
data which makes the
probability cracking is
very low. Also, during
the process, the size of
the secret data has been
increased
[62]
Complement
ary
PR N N S -- -- --
rando
mly
Some of
chemical
structure of
DNA
The selected random
DNA reference with
complementary rule
must send to the
receiver for the
extraction process
8. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Significant features for steganography techniques using deoxyribonucleic… (Nichirvan Asaad Zebari)
345
Ref. Method
Data
hiding
type
Blind
or not
Encrypt
ed
or not
Single/
Double
layer
DNA original
Function
conservation
DNA
reference
length
expansion
Modifi
cation
rate
DNA
reference
Based on Limitation
[63]
LSB
insertion
ST N N D -- -- --
rando
mly
gray Scale
Image
The security rate of
hiding process is very
low due to the hiding
process
[64]
Complement
ary
PR N N D -- -- --
rando
mly
LSB and MSB
Steganography key is
not enough secure
[65]
Complement
ary
ST N N S N N H
rando
mly
Traditional
vigenère cipher
and DNA
features
Modifying the
functionality of the
amino acid during
embedding process
[66]
Improved
insertion
ST N N S N Y -- NCBI XOR operation
The payload not equal
to zero as well as the
functionality of original
DNA has been changed
[67]
Modified
insertion
PR N N S N Y --
rando
mly
General table
of DNA codons
Changing the
information of the
organism’s life and
expanding the length of
the reference of DNA
during hiding process
[68]
Complement
ary
PR N Y D -- -- --
rando
mly
MSB and R, G,
B component
of image
Using only one
component of the cover
image for embedding
secret DNA bases. Also,
its capacity is very low.
PR= pure data hiding; ST= secret key data hiding; PC= public key data hiding Y=yes; N=no; S=single D=double; H=high; L=low
4. CONCLUSION AND FEATURE WORK
Nowadays, in security area the most famous techniques to be used for securing data are
cryptography and data hiding. A massive evolution of modern and robust data hiding techniques has required
due to surging data storage requirements. Presently, an efficient and reliable biological carrier has been
discovered for hiding data which known as DNA. DNA bio-molecular computational abilities are exploited
to be use in both techniques’ cryptography and data hiding. In this paper we have focused on new aspect to
achieve better security depending on DNA to enable secure transmit of the confidential data over the
unsecure network. Different DNA-based algorithms for data hiding are addressed and analyzed with an
evaluation comparison highlighting their security issues. Different parameters are compared such as: which
method is used in hiding data, type of technique, blindness property, secured layer, hided layer, biologically
conserved, quality of stego DNA. The main purpose of this comparative study is to equip the future
researchers with the knowledge to conduct future research in the field of data hiding to introduce or improve
more secure, efficient, and reliable data hiding approaches-based DNA. Therefore, the future researchers
need to propose a robust data hiding techniques based on DNA by integrating all or most of the introduced
parameters to achieve a secure, efficient, and reliable data hiding technique. By achieving all of these
parameters in a technique, retrieving the confidential data by attackers will be near to zero.
REFERENCES
[1] J.-S. Taur, H.-Y. Lin, H.-L. Lee, and C.-W. Tao, "Data hiding in DNA sequences based on table lookup
substitution," International Journal of Innovative Computing, Information and Control, vol. 8, no. 10, pp. 6585-
6598, 2012.
[2] D. A. Zebari, H. Haron, D. Q. Zeebaree, and A. M. Zain, "A Simultaneous Approach for Compression and
Encryption Techniques Using Deoxyribonucleic Acid," in 2019 13th International Conference on Software,
Knowledge, Information Management and Applications (SKIMA), 2019, pp. 1-6, IEEE.
[3] D. A. Zebari, H. Haron, S. R. Zeebaree, and D. Q. Zeebaree, "Multi-Level of DNA Encryption Technique Based on
DNA Arithmetic and Biological Operations," in 2018 International Conference on Advanced Science and
Engineering (ICOASE), pp. 312-317, IEEE, 2018.
[4] A. Cheddad, "Steganoflage: a new image steganography algorithm," University of Ulster, 2009.
[5] A. Aieh, A. Sen, S. R. Dash, and S. Dehuri, "Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem
with Diffie hellman key sharing technique," in Proceedings of the 2015 Third International Conference on
Computer, Communication, Control and Information Technology (C3IT), pp. 1-6: IEEE, 2015.
[6] V. K. Yadav and S. Batham, "A novel approach of bulk data hiding using text steganography," Procedia Computer
Science, vol. 57, pp. 1401-1410, 2015.
[7] A. M. A. Brifcani and W. M. A. Brifcani, "Stego-based-crypto technique for high security applications,"
International Journal of Computer Theory and Engineering, vol. 2, no. 6, p. 835, 2010.
[8] A. M. Abdulazeez and A. S. Tahir, "Design and Implementation of Advanced Encryption Standard Security
Algorithm using FPGA," Int. J. of Computers & Technology, vol. 4, no. 9, pp. 1988-1993, 2013.
9. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 338 - 347
346
[9] G. Hamed, M. Marey, S. A. El-Sayed, and M. F. Tolba, "Comparative study for various DNA based steganography
techniques with the essential conclusions about the future research," in 2016 11th International Conference on
Computer Engineering & Systems (ICCES), 2016, pp. 220-225: IEEE.
[10] A. Nickfarjam, H. Ebrahimpour-Komleh, and A. P. Najafabadi, "Image hiding using neighborhood similarity," in
2014 6th Conference on Information and Knowledge Technology (IKT), 2014, pp. 79-82, IEEE.
[11] M. S. Subhedar and V. H. Mankar, "Current status and key issues in image steganography: A survey," Computer
science review, vol. 13, pp. 95-113, 2014.
[12] M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin, and M. Shamsuddin, "Information hiding using steganography,"
in 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings, pp. 21-25: IEEE,
2003.
[13] Q. M. Hussein, "New Metrics for Steganography Algorithm Quality". IJAST, vol. 29 no. 2, 2020.
[14] P. Kumari and R. Kapoor, "Image Steganography for data embedding & extraction using LSB technique,"
International Journal of Computer Applications & Information Technology, vol. 9, no. 2, p. 192, 2016.
[15] R. G. Goswami and S. Tamrakar, "Evolution of Data Hiding By Neural Network and Retrieval or Encrypted Image,
Text, Audio and Video Files," International Journal of Emerging Technology and Advanced Engineering, vol. 3,
no. 5, pp. 153-158, 2013.
[16] A. M. Nickfarjam and Z. Azimifar, "Image steganography based on pixel ranking and particle swarm
optimization," in The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP
2012), pp. 360-363: IEEE, 2012.
[17] R. Kaur and M. Mahajan, "Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for
Video Embedding," International Journal of Modern Education and Computer Science, vol. 8, no. 9, p. 51, 2016.
[18] A. Khalifa, "LSBase: A key encapsulation scheme to improve hybrid crypto-systems using DNA steganography,"
in 2013 8th International Conference on Computer Engineering & Systems (ICCES), pp. 105-110: IEEE, 2013.
[19] S. Jain and V. Bhatnagar, "Analogy of various DNA based security algorithms using cryptography and
steganography," in 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques
(ICICT), pp. 285-291: IEEE, 2014.
[20] P. A. Manisha, "A Survey on DNA Based Cryptography," International Journal of Scientific Engineering and
Research (IJSER), vol. 3, no. 4, pp. 132-134, 2015.
[21] J.-S. Pan, T.-G. Ngo, and T.-K. Dao, "A Data Hiding Approach Based on Reference-Affected Matrix," in Advances
in Intelligent Information Hiding and Multimedia Signal Processing: Springer, pp. 53-64, 2020.
[22] S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini, "Towards DNA based data security in the
cloud computing environment," Computer Communications, 2020.
[23] S. P. Singh and M. E. Naidu, "DNA QR coding for data security using DNA sequence," International Journal of
Information Technology, pp. 1-6, 2020.
[24] M. Borda and O. Tornea, "DNA secret writing techniques," in 2010 8th International Conference on
Communications, pp. 451-456: IEEE, 2010.
[25] R. Satra12, W. A. Kusuma, and H. Sukoco, "Accelerating Computation of DNA Multiple Sequence Alignment in
Distributed Environment," 2014.
[26] M. R. Abbasy, P. Nikfard, A. Ordi, and M. R. N. Torkaman, "DNA base data hiding algorithm," International
Journal of New Computer Architectures and their Applications (IJNCAA), vol. 2, no. 1, pp. 183-192, 2012.
[27] N. I. Udzir, "Review of DNA and Pseudo DNA Cryptography."
[28] A. Singh and R. Singh, "Information hiding techniques based on DNA inconsistency: An overview," in 2015 2nd
International Conference on Computing for Sustainable Global Development (INDIACom), pp. 2068-2072: IEEE,
2015.
[29] J.-S. Chen, Y.-B. Chen, P.-f. Hsu, N. Nguyen-Huu, and Y.-L. Lo, "Cryptographic scheme using genetic algorithm
and optical responses of periodic structures," Optics express, vol. 19, no. 9, pp. 8187-8199, 2011.
[30] D. Zebari, H. Haron, and S. Zeebaree, "Security Issues in DNA Based on Data Hiding: A Review," International
Journal of Applied Engineering Research, ISSN, pp. 0973-4562, 2017.
[31] M. B. Beck and R. V. Yampolskiy, "Hiding Color Images in DNA Sequences," in MAICS, pp. 25-29, 2015.
[32] C. Sreeja, M. Misbahuddin, and M. H. NP, "DNA for information security: A Survey on DNA computing and a
pseudo DNA method based on central dogma of molecular biology," in International Conference on Computing
and Communication Technologies, pp. 1-6: IEEE, 2014.
[33] T. Mandge and V. Choudhary, "A DNA encryption technique based on matrix manipulation and secure key
generation scheme," in 2013 International Conference on Information Communication and Embedded Systems
(ICICES), pp. 47-52: IEEE, 2013.
[34] M. Najaftorkaman and N. S. Kazazi, "A method to encrypt information with DNA-based cryptography,"
International Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 4, no. 3, pp. 417-426, 2015.
[35] R. Agrawal, M. Srivastava, A. Sharma, "Data hiding using dictionary based substitution method in DNA
sequences," 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1-6: IEEE, 2014.
[36] S. Marwan, A. Shawish, and K. Nagaty, "DNA-based cryptographic methods for data hiding in DNA media,"
Biosystems, vol. 150, pp. 110-118, 2016.
[37] M. R. Abbasy and B. Shanmugam, "Enabling data hiding for resource sharing in cloud computing environments
based on DNA sequences," in 2011 IEEE World Congress on Services, pp. 385-390: IEEE, 2011.
[38] H. Shiu, K.-L. Ng, J.-F. Fang, R. C. Lee, and C.-H. Huang, "Data hiding methods based upon DNA sequences,"
Information Sciences, vol. 180, no. 11, pp. 2196-2208, 2010.
10. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Significant features for steganography techniques using deoxyribonucleic… (Nichirvan Asaad Zebari)
347
[39] A. Atito, A. Khalifa, and S. Rida, "DNA-based data encryption and hiding using playfair and insertion techniques,"
Journal of Communications and Computer Engineering, vol. 2, no. 3, p. 44, 2012.
[40] R. Wazirali, Z. Chaczko, and L. Carrion, "Bio-informatics with genetic steganography technique," in
Computational Intelligence and Efficiency in Engineering Systems: Springer, pp. 333-345, 2015.
[41] Y.-H. Huang, C.-C. Chang, and C.-Y. Wu, "A DNA-based data hiding technique with low modification rates,"
Multimedia Tools and applications, vol. 70, no. 3, pp. 1439-1451, 2014.
[42] M. Skariya and M. Varghese, "Enhanced double layer security using RSA over DNA based data encryption
system," International Journal of Computer Science& Engineering Technology (IJCSET), vol. 4, no. 06, pp. 746-
750, 2013.
[43] C. Shyamasree and S. Anees, "Highly secure DNA-based audio steganography," in 2013 International Conference
on Recent Trends in Information Technology (ICRTIT), pp. 519-524: IEEE, 2013.
[44] E. I. A. El-Latif and M. I. Moussa, "Chaotic Information-hiding Algorithm based on DNA," International Journal
of Computer Applications, vol. 122, no. 10, pp. 41-45, 2015.
[45] A. Khalifa, A. Elhadad, and S. Hamad, "Secure blind data hiding into pseudo DNA sequences using playfair
ciphering and generic complementary substitution," Appl Math, vol. 10, no. 4, pp. 1483-1492, 2016.
[46] T. Tuncer and E. Avci, "A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing
scheme for color images," Displays, vol. 41, pp. 1-8, 2016.
[47] A. Khalifa and A. Atito, "High-capacity DNA-based steganography," in 2012 8th International Conference on
Informatics and Systems (INFOS), pp. BIO-76-BIO-80: IEEE, 2012.
[48] A. Majumdar, M. Sharma, N. Kar, "An Improved Approach to Steganography using DNA Characteristics" 2014.
[49] S. Marwan, A. Shawish, and K. Nagaty, "An Enhanced DNA-based Steganography Technique with a Higher
Hiding Capacity," in Bioinformatics, pp. 150-157, 2015.
[50] H. Liu, D. Lin, and A. Kadir, "A novel data hiding method based on deoxyribonucleic acid coding," Computers &
Electrical Engineering, vol. 39, no. 4, pp. 1164-1173, 2013.
[51] P. Das and N. Kar, "A highly secure DNA based image steganography," in 2014 International Conference on
Green Computing Communication and Electrical Engineering (ICGCCEE), pp. 1-5: IEEE, 2014.
[52] P. Das and N. Kar, "A DNA based image steganography using 2D chaotic map," in 2014 International Conference
on Electronics and Communication Systems (ICECS), pp. 1-5: IEEE, 2014.
[53] P. Das, S. Deb, N. Kar, and B. Bhattacharya, "An improved DNA based dual cover steganography," Procedia
Computer Science, vol. 46, pp. 604-611, 2015.
[54] R. M. Tank, H. D. Vasava, and V. Agrawal, "DNA-based audio steganography," Oriental journal of Computer
Science and Technology, vol. 8, pp. 43-48, 2015.
[55] S. A. M. Marwan, A. Shawish, and K. Nagaty, "Utilizing DNA Strands for Secured Data-Hiding with High
Capacity," International Journal of Interactive Mobile Technologies (iJIM), vol. 11, no. 2, pp. 88-98, 2017.
[56] F. E. Ibrahim, M. Moussa, and H. Abdalkader, "Enhancing the security of data hiding using double DNA
sequences," in Industry Academia Collaboration Conference (IAC), pp. 6-8.
[57] G. Hamed, M. Marey, S. A. El-Sayed, and M. F. Tolba, "Hybrid technique for steganography-based on DNA with
n-bits binary coding rule," in 2015 7th International Conference of Soft Computing and Pattern Recognition
(SoCPaR), 2015, pp. 95-102: IEEE.
[58] M. R. N. Torkaman, N. S. Kazazi, and A. Rouddini, "Innovative approach to improve hybrid cryptography by using
DNA steganography," International Journal on New Computer Architectures and Their Applications, vol. 202, pp.
225-236, 2012.
[59] C. Guo, C.-C. Chang, and Z.-H. Wang, "A new data hiding scheme based on DNA sequence," Int. J. Innov.
Comput. Inf. Control, vol. 8, no. 1, pp. 139-149, 2012.
[60] S. Chakraborty and S. K. Bandyopadhyay, "Two stages data-image steganography using dna sequence,"
International Journal of Engineering Research and Development, vol. 2, no. 7, pp. 69-72, 2012.
[61] B. A. Mitras and A. Abo, "Proposed steganography approach using DNA properties," International Journal Of
Information Technology and Business Management, vol. 14, no. 1, pp. 96-102, 2013.
[62] K. Menaka, "Message encryption using DNA sequences," in 2014 World Congress on Computing and
Communication Technologies, pp. 182-184: IEEE, 2014.
[63] M. S. Chakraborty and K. Bandyopadhyay, "Data Hiding by Image Steganography Appling DNA Sequence
Arithmetic," International Journal of Advanced Information Science and Technology (IJAIST), vol. 44, p. 44, 2015.
[64] S. Indora, "Cascaded DNA cryptography and steganography," in 2015 International Conference on Green
Computing and Internet of Things (ICGCIoT), pp. 104-107: IEEE, 2015.
[65] K. Meena, K. Menaka, and R. Subramanian, "Secure Message Transfer Using DNA Sequences," Journal of
Computational Intelligence in Bioinformatics, vol. 9, no. 1, pp. 1-6, 2016.
[66] P. Malathi, M. Manoaj, R. Manoj, V. Raghavan, and R. Vinodhini, "Highly improved DNA based steganography,"
Procedia Computer Science, vol. 115, pp. 651-659, 2017.
[67] M. Yamuna and A. Elakkiya, "Amino Acids in Data Encryption," J Anal Pharm Res, vol. 2, no. 5, p. 00030, 2016.
[68] K. Kaur, "A Double Layer Encryption Algorithm based on DNA and RSA for Security on Cloud," International
Research Journal of Engineering and Technology, vol. 3, no. 03, pp. 1742-1745, 2016.