8,360 research outputs found

    Data Hiding Methods Based upon DNA Sequences

    Get PDF
    [[abstract]]In this paper, three data hiding methods are proposed, based upon properties of DNA sequences. It is highlighted that DNA sequences possess some interesting properties which can be utilized to hide data. These three methods are: the Insertion Method, the Complementary Pair Method and the Substitution Method. For each method, a reference DNA sequence S is selected and the secret message M is incorporated into it so that S′ is obtained. S′ is then sent to the receiver and the receiver is able to identify and extract the message M hidden in S′. Furthermore, the robustness and the tightly embedded capacity analysis of the three proposed methods are demonstrated. Finally, experimental results indicate a better performance of the proposed methods compared to the performance of the competing methods with respect to several parameters such as capacity, payload and bpn

    Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective

    Full text link
    Rapid advances in human genomics are enabling researchers to gain a better understanding of the role of the genome in our health and well-being, stimulating hope for more effective and cost efficient healthcare. However, this also prompts a number of security and privacy concerns stemming from the distinctive characteristics of genomic data. To address them, a new research community has emerged and produced a large number of publications and initiatives. In this paper, we rely on a structured methodology to contextualize and provide a critical analysis of the current knowledge on privacy-enhancing technologies used for testing, storing, and sharing genomic data, using a representative sample of the work published in the past decade. We identify and discuss limitations, technical challenges, and issues faced by the community, focusing in particular on those that are inherently tied to the nature of the problem and are harder for the community alone to address. Finally, we report on the importance and difficulty of the identified challenges based on an online survey of genome data privacy expertsComment: To appear in the Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2019, Issue

    Information Hiding Based on DNA Sequences

    Get PDF
    يعد أمن المعلومات مصدر قلق رئيسي، خاصة في ضوء التوسع السريع في استخدام الإنترنت في السنوات الأخيرة. نتيجة لهذا التوسع، كانت هناك حالات وصول غير قانوني، والتي تم تخفيفها من خلال اعتماد مجموعة متنوعة من بروتوكولات الاتصال الآمن، بما في ذلك التشفير وإخفاء البيانات. في السنوات الأخيرة، كانت هناك زيادة في استخدام الحمض النووي للتشفير وإخفاء البيانات كناقل، مع الاستفادة من قدراته الجزيئية الحيوية. في إخفاء البيانات. نتيجة لذلك، في نهج إخفاء البيانات، يتم استخدام قواعد الحمض النووي كناقل للمعلومات لتعزيز الأمن. يندمج علم إخفاء المعلومات والتشفير المستند إلى الحمض النووي بين السمات البيولوجية والتقنيات التقليدية من أجل تحقيق خوارزمية مؤمنة جيدًا تستغلها. لذلك، توفر تسلسلات الحمض النووي قدرة عالية على البيانات بما في ذلك الحفاظ على الخصائص الكيميائية والبيولوجية لتسلسل الحمض النووي.Information security is a major source of worry, especially in light of the rapid expansion of internet use in recent years. As a result of this expansion, there have been incidences of illegal access, which have been mitigated by the adoption of a variety of secure communication protocols, including encryption and data concealment. DNA's bio-molecular properties have seen an uptick in popularity as a carrier for cryptography and data hiding in recent years. when information needs to be hidden. Therefore, DNA bases are utilized as information carriers in the data concealing strategy to increase safety. DNA-based steganography and cryptography combine a biological property with conventional methods to provide an algorithm with increased security. Because of their ability to maintain their chemical and biological characteristics, DNA sequences also have a high data capacity

    Data Hiding Based DNA Issues: A Review

    Get PDF
    يعد أمن المعلومات مصدر قلق رئيسي ، لا سيما مع نمو استخدام الإنترنت. بسبب هذا النمو ظهرت حالات اختراق للبيانات المرسلة منها الوصول غير المصرح به التي يتم التصدي له باستخدام تقنيات اتصال آمنة متنوعة  وهي ؛ التشفير وإخفاء البيانات. تتعلق الاتجاهات الحديثة بالحمض النووي المستخدم في التشفير وإخفاء البيانات كحامل للبيانات من خلال استغلال خصائصه الجزيئية الحيوية. تقدم هذه الورقة استبيانًا حول البحوث المنشورة المستندة إلى الحمض النووي لاخفاء البيانات المهمة  كحامي لها  والمنقولة عبر قناة غير آمنة  لمعرفة  نقاط القوة والضعف فيها. لمساعدة البحث المستقبلي في تصميم تقنيات أكثر كفاءة وأمانًا للاخفاء في الحمض نوويSecurity of Information are a key concern, particularly with the extension growth of internet usage. This growth comes the incidents of unauthorized access which are countered by the use of varied secure communication techniques, namely; cryptography and data hiding. More recent trends are concerned with DNA used for cryptography and data hiding as a carrier exploiting its bio-molecular properties. This paper provides a review about published DNA based data hiding techniques using the DNA as a safeguard to critical data that transmitted on an insecure channel, to find out the strength and weaknesses points of them. This will help the future research in designing of more efficient and secure data hiding techniques-based DNA

    JPEG steganography with particle swarm optimization accelerated by AVX

    Get PDF
    Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography. Optimization methods can improve the properties of images with embedded secret but introduce additional computational complexity to their processing. AVX instructions available in modern CPUs are, in this work, used to accelerate data parallel operations that are part of image steganography with advanced optimizations.Web of Science328art. no. e544
    corecore