Open Access Open Access  Restricted Access Subscription or Fee Access

Enhanced DNA Computing Biological Model for Implementing a Covert Communication Channel

Richa Arora, Vinay Chopra

Abstract


DNA computing, also known as molecular computing,is a new approach to massively parallel computation. It harnesses the enormous parallel computing ability and high memory density of biomolecules,which brings potential challenges and opportunities to traditional cryptography. DNA Steganography is a new field arising with DNA computing research in recent years. Most of the techniques that were implemented were based on modulating a media file to hide the information required to be transmitted. If the transmission is rather continuous in time, one may refer to the technique as a covert communication channel between two parties.Various methods of advanced steganalysis techniques, with varying degrees of success, were developed to detect the existence of such hidden messages in a media file.

In this work, we present an alternative approach to hiding data in text files. We use different DNA-operations and the message is embedded within a vector sequence. The proposed method covers all the words of English Dictionary for framing a message.


Keywords


DNA Computing, DNA Steganography, DNA Vector

Full Text:

PDF

References


Wendell M. Smith, "DNA Based Steganography for Security Marking," Xix International Security Printers’ Conferences, Montreux, 14-16 May,2003.

Bruce Williams, "Restriction Endonucleases,"http://www.molecularworkshop.com/data/endonucleases.html, August 2005.

Boneh D, Dunworth C, Lipton R. Breaking DES using a molecular computer[R]. Technical ReportCS-TR-489-95, Princeton University,1995.

Adleman L,et al.On applying molecular computation to the data encryption strands in DNA based computers[C] Proc. of the 2ed Annu.Meet, E B Baum et al. eds. Princeton, NJ, 1996: 28-48.

Bruce Williams, “Cutting DNA Close to Ends, "http://www.ikp.unibe.ch/molbio/cutting.html, USA, April 7, 2003.

LabBench Activity, "Cutting DNA with Restriction Enzymes, "http://www.phschool.com/science/biology_place/labbench/lab6/cutdna.html,2006.

Ashish Gehani, Thomas LaBean, and John Reif, ”DNA-Based Cryptography,” IMACS DNA-Based Computers V, American Mathematical Society, USA, 2000.

Amosa M, Paun G, Rozenbergd G. Topics in the theory of DNA computing[J]. Theoretical Computer Science 287 (2002) 3~38.

Guozhen Xiao, et al. New field of cryptography: DNA cryptography[J], Chinest Science Bulletin, 2006, 51(10):1139 1144.

Gehani A, LaBean T H, Reif J H. DNA-based cryptography. Dismacs Series in Discrete Mathematics and Theoretical Computer Science,2000, 54: 233-249.

Leier A, Richter C, Banzhaf W, et al. Cryptography with DNA binary strands. 2000, 57(1):13-22.

Kartalopoulos S.V. DNA-inspired cryptographic method in optical communications, authentication and data mimicking Military Communications Conference. 2005,2:774-779.

Kazuo T, Akimitsu O, Isao S. Public-key system using DNA as a oneway function for key distribution[J]. Biosystems, 2005, 81,25-29.

Magdy saeb, Eman el-abd, Mohamed E. El-Zanaty ‘On covert data communication Channels Employing DNA Recombinant and Mutagenesis-based Steganographic Techniques’. Proceedings of 2007 annual Conference on Computer Engineering and Applications.

Zuwairie Ibrahim, Tri Basuki Kurniawan, Marzuki Khalid, and Osamu Ono ‘A DNA Sequence Design for Direct Proportional Length-Based DNA Computing using DNASequenceGenerator’ 0-7695-2882-1/07 $25.00 ©2007 IEEE

C. Richter, A. Leier, W. Banzhaf, and H. Rauhe Cho, Dong-Yeon Private and Public Key DNA Steganography

W. Bender, D. Gruhl, N. Morimoto, A. Lu ‘Techniques of Data hiding’

’Steganography-The Art of Hiding Data’, Kefa Rabah, Information Technology Journal 3 (3): 245-269, 2004 ISSN 1682-6027 © 2004 Asian Network for Scientific Information

Gupta, GauraV, Mehra, Nipun and ChakraVerty, DNA Computing, The Indian Programmer, June 12, 2004.

J. Gray, T. Frutos, A. Berman, A. Condon, M. Lagally, L. Smith, and R. Corn. "Reducing Errors in DNA Computing by Appropriate Word Design". Draft, 1996.

Junhui He, Shaohua Tang, TingtingWu ‘On the Security of Steganographic Techniques’ 2008 Congress on Image and Signal Processing


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.