Secure Image Transmission Scheme based on DNA Sequences

Secure Image Transmission Scheme based on DNA Sequences

© 2022 by IJETT Journal
Volume-70 Issue-9
Year of Publication : 2022
Authors : Abhishek Sharma Padmanabhan, S. Sapna
DOI : 10.14445/22315381/IJETT-V70I9P220

How to Cite?

Abhishek Sharma Padmanabhan, S. Sapna, "Secure Image Transmission Scheme based on DNA Sequences" International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 194-206, 2022. Crossref,

Cryptography and steganography are the most widely utilized and adopted fields of secure data communication. Data transfer can be secured using a combination of these methods. The data is transmitted from sender to receiver using cryptography, the most secure method. At the same time, steganography performs the information hiding in the form of video, image, or text within a cover image. The sensitive data is hidden, so it is not visible to the human eye. The data is stored and transferred more securely by adding DNA technology to the cryptography. It provides additional data security level and is most commonly employed to implement computation. This research developed a new method for combining cryptography with steganography. There are two phases to the proposed method: image encryption and hide phases and image extraction phases. Encryption is done by using the Signcryption algorithm. Four standard images were utilized as test material for the evaluation. Four factors are used to determine the performance of the proposed method as Peak signal-to-noise ratio (PSNR), Mean Square Error, Entropy, and Structural Similarity Index Measure (SSIM) for hiding and extracting the messages. The implementation is done in python. The proposed method achieves better performance when compared to the previously published works.

Cryptography, steganography, DNA sequences, Data security, Performance evaluation, Ciphertext.

[1] Alrikabi, H.T. and Hazim, H.T., “Enhanced Data Security of Communication System Using Combined Encryption and Steganography,” International Journal of Interactive Mobile Technologies, vol. 15, no. 16, 2015.
[2] Sujitha, B., Parvathy, V.S., Lydia, E.L., Rani, P., Polkowski, Z. and Shankar, K, “Optimal Deep Learning-Based Image Compression Technique for Data Transmission on Industrial Internet of Things Applications,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 7, pp. E3976, 2021. Abhishek Sharma Padmanabhan & S. Sapna / IJETT, 70(9), 194-206, 2022 205
[3] El-Khamy, S.E., Korany, N.O. and Mohamed, A.G, “A New Fuzzy-DNA Image Encryption and Steganography Technique,” IEEE Access, vol. 8, pp. 148935-148951.
[4] Shankar, K., Elhoseny, M., Kumar, R.S., Lakshmanaprabu, S.K. and Yuan, X, “Secret Image Sharing Scheme With Encrypted Shadow Images Using Optimal Homomorphic Encryption Technique,” Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 5, pp. 1821-1833, 2020.
[5] Shankar, K., Elhoseny, M., Perumal, E., Ilayaraja, M. and Sathesh Kumar, K, “An Efficient Image Encryption Scheme Based on Signcryption Technique With Adaptive Elephant Herding Optimization,” In Cybersecurity and Secure Information Systems , Springer, Cham, pp. 31-42, 2019.
[6] Gutub, A. and Al-Ghamdi, M, “Hiding Shares By Multimedia Image Steganography for Optimized Counting-Based Secret Sharing,” Multimedia Tools and Applications, vol. 79, no. 11, pp. 7951-7985, 2020.
[7] Voleti, L., Balajee, R.M., Vallepu, S.K., Bayoju, K. and Srinivas, D, March, “A Secure Image Steganography Using Improved LSB Technique and Vigenere Cipher Algorithm,” In 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS) , IEEE, pp. 1005-1010, 2021.
[8] Nunna, K.C. and Marapareddy, R, March, “Secure Data Transfer Through Internet Using Cryptography and Image Steganography” In 2020 Southeastcon , IEEE, vol. 2, pp. 1-5, 2020.
[9] Ambika, Biradar, R.L. and Burkpalli, V, “Encryption-Based Steganography of Images By Multiobjective Whale Optimal Pixel Selection,” International Journal of Computers and Applications, pp. 1-10, 2019.
[10] Dhevanandhini, G. and Yamuna, G, “An Efficient Approach for Secure Video Watermarking Through Compression Standard: A Signcryption and H. 264 Paradigm,” Annals of the Romanian Society for Cell Biology, pp. 16610-16620, 2021.
[11] Ullah, S., Li, X.Y. and Lan, Z, “A Novel Trusted Third Party Based Signcryption Scheme,” Multimedia Tools and Applications, vol. 79, no. 31, pp. 22749-22769, 2020.
[12] Islam, M.R., Tanni, T.R., Parvin, S., Sultana, M.J. and Siddiqa, A, “A Modified LSB Image Steganography Method Using Filtering Algorithm and Stream of Password,” Information Security Journal: A Global Perspective, vol. 30, no. 6, pp. 359-370, 2021.
[13] Hashim, M.M., Rahim, M.S.M., Johi, F.A., Taha, M.S. and Hamad, H.S, “Performance Evaluation Measurement of Image Steganography Techniques with Analysis of LSB Based on Variation Image Formats,” International Journal of Engineering & Technology, vol. 7, no. 4, pp. 3505-3514, 2018.
[14] Selvi, S., Gobi, M., Kanchana, M. and Mary, S.F, July, “Hyper Elliptic Curve Cryptography in Multi Cloud-Security Using DNA (Genetic) Techniques,” In 2017 International Conference on Computing Methodologies and Communication (ICCMC) , IEEE, pp. 934- 939, 2017.
[15] Bala, B.K. and Kumar, A.B, “The Combination of Steganography and Cryptography for Medical Image Applications,” Biomedical and Pharmacology Journal, vol. 10, no. 4, pp. 1793-1797, 2017.
[16] Fang, D. and Sun, S, “A New Scheme for Image Steganography Based on Hyperchaotic Map and DNA Sequence,” Journal of Information Hiding Multimedia Signal Process., vol. 9, no. 2, pp. 392-399, 2018.
[17] Khari, M., Garg, A.K., Gandomi, A.H., Gupta, R., Patan, R. and Balusamy, B, “Securing Data in Internet of Things (Iot) Using Cryptography and Steganography Techniques,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50, no. 1, pp. 73- 80, 2019.
[18] Elmasry, W, “New LSB-Based Colour Image Steganography Method to Enhance the Efficiency in Payload Capacity, Security and Integrity Check,” Sādhanā, vol. 43, no. 5, pp. 1-14, 2018.
[19] Olu Osaronwolu, Matthias Daniel, V. I. E Anireh, "A Secured Deduplication of Encrypted Data Over an Attribute-Based Cloud Storage," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 7, pp. 77-83, 2020. Crossref,
[20] Kassim, S., Hamiche, H., Djennoune, S. and Bettayeb, M, “ A Novel Secure Image Transmission Scheme Based on Synchronization of Fractional-Order Discrete-Time Hyperchaotic Systems,” Nonlinear Dynamics, vol. 88, no. 4, pp. 2473-2489, 2017.
[21] Hureib, E.S. and Gutub, A.A, “Enhancing Medical Data Security Via Combining Elliptic Curve Cryptography and Image Steganography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 20, no. 8, pp. 1-8, 2020.
[22] Duan, X., Guo, D., Liu, N., Li, B., Gou, M. and Qin, C, “A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network,” IEEE Access, vol. 8, pp. 25777-25788, 2020.
[23] Saxena, A.K., Sinha, S. and Shukla, P, “Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach,” International Journal of Image, Graphics and Signal Processing, vol. 10, no. 4, pp. 13, 2018.
[24] Alzubi, J.A., Alzubi, O.A., Suseendran, G. and Akila, D, “A Novel Chaotic Map Encryption Methodology for Image Cryptography and Secret Communication With Steganography,” International Journal Recent Technology Engineering, vol. 8, no. 1C2, pp. 1122-1128, 2019.
[25] Rachmawanto, E.H. and Sari, C.A, “Secure Image Steganography Algorithm Based on Dct With Otp Encryption,” Journal of Applied Intelligent System, vol. 2, no. 1, pp. 1-11, 2017.
[26] Ahmed, A. and Ahmed, A, “A Secure Image Steganography Using LSB and Double XOR Operations,” International Journal of Computer Science and Network Security, vol. 20, no. 5, pp. 139-144, 2020.
[27] Shivam Saxena, "Introduction to DNA Computing," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 2, pp. 19-21, 2020. Crossref, .
[28] Dash, S., Das, M.N. and Das, M, “Secured Image Transmission Through Region-Based Steganography Using Chaotic Encryption,” In Computational Intelligence in Data Mining , Springer, Singapore, pp. 535-545, 2019.
[29] Ramasamy, J. and Kumaresan, J.S, “Image Encryption and Cluster-Based Framework for Secured Image Transmission in Wireless Sensor Networks,” Wireless Personal Communications, vol. 112, no. 3, pp. 1355-1368, 2020.
[30] Yousif, A.J, “Image Steganography Based on Wavelet Transform and Color Space Approach,” Diyala Journal of Engineering Sciences, vol. 13, no. 3, pp. 23-34, 2020.
[31] Denis, R. and Madhubala, P, “Evolutionary Computing Assisted Visually-Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication Over Cloud Environment,” International Journal of Computer Networks and Applications (IJCNA), vol. 7, no. 6, pp. 208-230, 2020.
[32] Avudaiappan, T., Balasubramanian, R., Pandiyan, S.S., Saravanan, M., Lakshmanaprabu, S.K. and Shankar, K, “Medical Image Security Using Dual Encryption With Oppositional Based Optimization Algorithm,” Journal of Medical Systems, vol. 42, no. 11, pp. 1- 11, 2018.
[33] Rosalina, N.H, “An Approach of Securing Data Using Combined Cryptography and Steganography,” International Journal of Mathematical Sciences and Computing (IJMSC), vol. 6, no.1 pp. 1-9, 2020.
[34] Guillén-Fernández, O., Meléndez-Cano, A., Tlelo-Cuautle, E., Núñez-Pérez, J.C. and Rangel-Magdaleno, J.D.J, “On the Synchronization Techniques of Chaotic Oscillators and Their FPGA-Based Implementation for Secure Image Transmission,” Plos One, vol. 14, no. 2, pp. E0209618, 2019.