Abstract

Information protection and secrecy are major concerns, especially regarding the internet’s rapid growth and widespread usage. Unauthorized database access is becoming more common and is being combated using a variety of encrypted communication methods, such as encryption and data hiding. DNA cryptography and steganography are used as carriers by utilizing the bio-molecular computing properties that have become more common in recent years. This study examines recently published DNA steganography algorithms, which use DNA to encrypt confidential data transmitted through an insecure communication channel. Several DNA-based steganography strategies will be addressed, with a focus on the algorithm’s advantages and drawbacks. Probability cracking, blindness, double layer of security, and other considerations are used to compare steganography algorithms. This research would help and create more effective and accurate DNA steganography strategies in the future.

Highlights

  • The concept of security refers to the prevention of unauthorized access to information

  • Steganography is a method of concealing data that does not require the use of a key

  • We look at the data hidden in Deoxyribonucleic acid (DNA)

Read more

Summary

Introduction

The concept of security refers to the prevention of unauthorized access to information. Encryption and concealment of information (both similar concepts) are commonly used to keep communications secure [2, 3] fact that both methods have the same purpose. Still, their development and use are vastly different. The development of a steganography technique could allow more sensitive data to be hidden within the carrier while maintaining the properties of the stego file [1, 5]. Steganography is a method of concealing data that does not require the use of a key. It is known as a less reliable approach [8, 9] Another way to hide information is to hide confidential data, which uses one key for all operations (embedding and extraction). DNA has been suggested as a possible candidate for computational purposes [18]

DNA structure
DNA computing
Binary code of DNA
Comparative study
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.