2020
DOI: 10.1007/s42452-019-1930-1
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of DNA based steganography techniques

Abstract: This study investigates the most recent data hiding techniques based on DNA steganography, including the highly improved DNA-based steganography technique, the data hiding using double DNA sequences method, and the enhanced DNA-based steganography technique. The strengths and weaknesses of these techniques are discussed. Additionally, the security of these techniques is analyzed based on several security parameters that measure the quality of DNA steganography with respect to many factors, including, but not l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Data hiding using DNA sequences are classified into three main methods as described in [10,11]. These three methods are insertion-based, complementary-pair-based, and substitution-based.…”
Section: Related Workmentioning
confidence: 99%
“…Data hiding using DNA sequences are classified into three main methods as described in [10,11]. These three methods are insertion-based, complementary-pair-based, and substitution-based.…”
Section: Related Workmentioning
confidence: 99%
“…8) Payload: is the amount of extra data added to the DNA sequence due to the implementation of the DNA steganography algorithm. The best scenario occurs when the payload equals zero [24]. 9) Modification rate: denotes the ratio of change in the fake DNA sequence compared to the original one.…”
Section: Dna Nucleotide Binary Formmentioning
confidence: 99%
“…9) Modification rate: denotes the ratio of change in the fake DNA sequence compared to the original one. A high modification rate may spoil the protein's operations in the DNA sequence [24].…”
Section: Dna Nucleotide Binary Formmentioning
confidence: 99%
“…Amongst several techniques of information security, the two foremost runners in keeping information confined only to the authorized include Cryptography and Steganography [12]. Devices.…”
Section: A Privacymentioning
confidence: 99%