Search In this Thesis
   Search In this Thesis  
العنوان
Deoxyribonucleic Acid Based Steganography /
المؤلف
Kamel, Ghada Hamed Aly.
هيئة الاعداد
باحث / Ghada Hamed Aly Kamel
مشرف / Mohamed Fahmy Tolba
مشرف / Safaa Amin El-Sayed
مشرف / Mohammed Abd El-Rahman Marey
تاريخ النشر
2017.
عدد الصفحات
167 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Computer Science (miscellaneous)
تاريخ الإجازة
1/1/2017
مكان الإجازة
اتحاد مكتبات الجامعات المصرية - Scientific Computing
الفهرس
Only 14 pages are availabe for public view

from 167

from 167

Abstract

The research on developing data security techniques has been increased continuously, due to the indispensable need for powerful data protection in different applications, these include ownership protection, annotation, copyrighting, authentication and military applications. Cryptography and steganography are the most common and widely used techniques in computer security. Cryptography includes encrypting and decrypting some data into incomprehensible formats. While steganography aims to hide the existence of the message in a different media such as image, audio, video, etc. so that an intruder is mainly prevented from suspecting that the data is there. DNA is explored as a new carrier for data hiding due to its huge variations and its high capacity in which 〖10〗^6 TB of data can be stored in one gram of DNA. However, like every data storage device, hiding data in DNA requires a high protection level through a secure algorithm. This leads to a DNA steganography research field based on DNA computing, where the properties of biotechnology are exploited in steganography.
Mainly, there are two approaches in DNA based steganography topic. First approach: Techniques that provide high data hiding capacity but at the expense of the original biological properties of the used DNA reference sequence and it is the widest approach. This approach in most cases may result in dangerous side effects that may lead to the death of an organism related to the used sequence in the steganography process. The second approach cares about preserving the DNA biological and chemical properties but at the expense of either the data hiding capacity allowed or the algorithms’ cracking probability.
In this thesis, the second approach is achieved to allow merging the proposed algorithms with the industry in practical way and without any dangerous effects through two proposed algorithms. The first proposed one is a hybrid crypto-steganography algorithm is proposed that achieves double layers of security through two phases. In the first phase, the confidential data is converted to DNA using a proposed generic N-bits binary coding rule that leads to lower cracking probability compared by others. Then, DNA and amino acids Playfair is applied as a first phase to encrypt the DNA of the message resulting in ambiguity. In the second phase, the cipher text is placed with the ambiguity using 3:1 placement strategy. Then they are shuffled to be hidden in DNA at random positions generated by using a true real random number seed that is obtained from the atmospheric noise, thereby achieving very low cracking probability. The proposed technique is a blind preserved one as it achieves zero modification for the generated protein without extra data. The drawback of the first implemented algorithm in the steganography field is the low capacity which is overcome by merging the DNA based cryptography concepts with the proposed steganography technique that results in a double layer security level and low cracking probability. The achievement is that the selected cryptography algorithm results in the same size of the input data with no extra information.
The drawback of the first proposed algorithm gets a new objective which is providing higher data capacity using DNA with preserving its main structure. For the sake of this, the second proposed algorithm is implemented to combine the DNA conservative mutation concepts with the steganography. It results in utilizing the DNA in an effective and non-negativity for neither the DNA nor the steganography process. The idea is that the conservative mutation is exploited in a way to support high capacity, thanks to the use of each DNA base to hide two bits that is considered the first achievement. Since, most of the steganography algorithms support high capacity at the expense of the DNA modification rate which prevents it from being carried out practically. The second achievement in this study is selecting the conservative mutation specially to solve the tradeoff between the high capacity feature and preserving the original biochemical properties of the used sequence which is one of the main challenges considered in this research work. Besides minimizing the data that’s sent to the receiver to strengthen the algorithm’s security as compared with other techniques, results in sending only the carrier DNA sequence containing the secret data which is the final and third achievement in the steganography field.
After some deep biological view, the second proposed algorithm is modified to generalize the conservative mutation for each amino acid by getting all its possible substitutions with the other amino acids that have the same structure and functions. This proposed modification results in minimizing the algorithm’s cracking probability by nearly fourteen billion trials. Even in the worst-case scenario, if the intruder success in taking away some parts of data, the extracted part is not meaningful, since the data is hidden in an arbitrary DNA bases which complexes the cracking process.
Besides that, for the first-time real large sized data to three megabytes of different formats are used to evaluate the performance of the proposed algorithm and investigate its scalability. The experimental results prove that the proposed technique is the one that overcomes the weakness points in the current steganography techniques as it merges the highest capacity feature with preserving the biochemical properties of the used DNA sequence through a blind and a highly-secure algorithm without any generated extra information and with the lowest achieved cracking probability.