Abstract

In the last two decades, the field of DNA-based steganography has emerged as a promising domain to provide security for sensitive information transmitted over an untrusted channel. DNA is strongly nominated by researchers in this field to exceed other data covering mediums like video, image, and text due to its structural characteristics. Features like enormous hiding capacity, high computational power, and the randomness of its building contents, all sustained to prove DNA supremacy. There are mainly three types of DNA-based algorithms. These are insertion, substitution, and complementary rule-based algorithms. In the last few years, a new generation of DNA-based steganography approaches has been proposed by researchers. These modern algorithms overpass the performance of the old ones either by exploiting a biological factor that exists in the DNA itself or by using a suitable technique available in another field of computer science like artificial intelligence, data structure, networking, etc. The main goal of this paper is to thoroughly analyze these modern DNA-based steganography approaches. This will be achieved by explaining their working mechanisms, stating their pros and cons, and proposing suggestions to improve these methods. Additionally, a biological background about DNA structure, the main security parameters, and classical concealing approaches will be illustrated to give a comprehensive picture of the field.

Highlights

  • Nowadays, the reliance on computer systems and the Internet has dramatically increased

  • While cryptography aims to alter the message in such a way it becomes unreadable to a third party, steganography provides a concealing medium to the message

  • Low power is required when dealing with deoxyribonucleic acid (DNA) computing which leads to fast execution

Read more

Summary

A Review of Modern DNA-based Steganography Approaches

There are mainly three types of DNA-based algorithms. In the last few years, a new generation of DNA-based steganography approaches has been proposed by researchers. These modern algorithms overpass the performance of the old ones either by exploiting a biological factor that exists in the DNA itself or by using a suitable technique available in another field of computer science like artificial intelligence, data structure, networking, etc. The main goal of this paper is to thoroughly analyze these modern DNA-based steganography approaches. This will be achieved by explaining their working mechanisms, stating their pros and cons, and proposing suggestions to improve these methods.

INTRODUCTION
C Code TCT TCC TCA TCG CCT CCC CCA CCG ACT ACC ACA ACG GCT GCC GCA GCG
SECURITY ANALYSIS
DNA-BASED STEGANOGRAPHY TECHNIQUES
Insertion-Based Techniques
Substitution-Based Techniques
Complementary Rule-based Techniques
Hybrid Techniques
ANALYSIS OF MODERN APPROACHES
Exploiting Biological Features
The Field of Networking
The Field of Data Structure
The Field of Artificial Intelligence
Aim of the paper
Findings
CONCLUSION AND RECOMMENDATION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.