Abstract
Security of the digital data is one of the major concerns of the today’s world. There are several methods for digital data security that can be found in the literature. Biological sequences have some features that make it worthy for the digital data security processes. In this work, DNA encryption and its different approaches are discussed to give a brief overview on the data security methods based on DNA encryption. This work can be highly beneficial for future research on DNA encryption and can be applied on different domains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sarddar, D., Chakraborty, S., Roy, M.: An efficient approach to calculate dynamic time quantum in round Robin algorithm for efficient load balancing. Int. J. Comput. Appl. 123(14), 48–52 (2015)
Mali, K., Chakraborty, S., Roy, M.: A study on statistical analysis and security evaluation parameters in image encryption. IJSRD Int. J. Sci. Res. Dev. 3, 2321–2613 (2015)
Cui, G., Qin, L., Wang, Y., Zhang, X.: Information security technology based on DNA computing. In: 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), pp. 288–291 (2007)
Seal, A., Chakraborty, S., Mali, K.: A new and resilient image encryption technique based on pixel manipulation, value transformation and visual transformation utilizing single–level haar wavelet transform, vol. 458 (2017)
Mali, K., Chakraborty, S., Seal, A., Roy, M.: An efficient image cryptographic algorithm based on frequency domain using Haar wavelet transform. Int. J. Secur. Appl. 9(12), 279–288 (2015)
Hore, S., Chatterjee, S., Chakraborty, S., Shaw, R.K.: Analysis of different feature description algorithm in object recognition (2016)
Chakraborty, S., Chatterjee, S., Ashour, A.S., Mali, K., Dey, N.: Intelligent computing in medical imaging: a study. In: Dey, N. (ed.) Advancements in applied metaheuristic computing IGI global, pp. 143–163 (2017)
Chakraborty, S., Roy, M., Hore, S.: A study on different edge detection techniques in digital image processing. In: Feature Detectors and Motion Detection in Video Processing. IGI Global, pp. 100–122 (2016)
Roy, M., Mali, K., Chatterjee, S., Chakraborty, S., Debnath, R., Sen, S.: A study on the applications of the biomedical image encryption methods for secured computer aided diagnostics. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 881–886 (2019)
Basha, D.: Analysis on DNA based cryptography to secure data transmission (2011)
Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In: Bio-Inspired Computing: Theories and Applications, pp. 37–42 (2008)
Tanaka, K., Okamoto, A., Saito, I.: Public-key system using DNA as a one-way function for key distribution. Biosystems 81(1), 25–29 (2005)
Chakraborty, S., et al.: Modified cuckoo search algorithm in microscopic image segmentation of hippocampus. Microsc. Res. Tech. 80(10), 1051–1072 (2017)
Chakraborty, S., Bhowmik, S.: Blending roulette wheel selection with simulated annealing for job shop scheduling problem. In: Michael Faraday IET International Summit 2015, p. 100(7) (2015)
Chakraborty, S., Bhowmik, S.: An efficient approach to job shop scheduling problem using simulated annealing. Int. J. Hybrid Inf. Technol. 8(11), 273–284 (2015)
Chakraborty, S., Bhowmik, S.: Job shop scheduling using simulated annealing. In: First International Conference on Computation and Communication Advancement, vol. 1(1), pp. 69–73 (2013)
Chakraborty, S., Seal, A., Roy, M.: An elitist model for obtaining alignment of multiple sequences using genetic algorithm. In: 2nd National Conference NCETAS 2015, vol. 4(9), pp. 61–67 (2015)
Roy, M., et al.: Biomedical image enhancement based on modified Cuckoo search and morphology. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), pp. 230–235 (2017)
Chakraborty, S., et al.: Detection of skin disease using metaheuristic supported artificial neural networks. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), pp. 224–229 (2017)
Chakraborty, S., et al.: Image based skin disease detection using hybrid neural network coupled bag-of-features. In: 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2017, vol. 2018 (2018)
Chakraborty, S., et al.: Bio-medical image enhancement using hybrid metaheuristic coupled soft computing tools. In: 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2017, vol. 2018 (2018)
Chakraborty, S., Mali, K.: Application of multiobjective optimization techniques in biomedical image segmentation—a study. In: Multi-objective optimization. Springer, Singapore, pp. 181–194 (2018)
Chakraborty, S., Raman, A., Sen, S., Mali, K., Chatterjee, S., Hachimi, H.: Contrast optimization using Elitist metaheuristic optimization and gradient approximation for biomedical image enhancement. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 712–717 (2019)
Chakraborty, S., Chatterjee, S., Chatterjee, A., Mali, K., Goswami, S., Sen, S.: Automated breast cancer identification by analyzing histology slides using metaheuristic supported supervised classification coupled with bag-of-features. In: 2018 Fourth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp. 81–86 (2018)
Hore, S., et al.: An integrated interactive technique for image segmentation using stack based seeded region growing and thresholding. Int. J. Electr. Comput. Eng. 6(6) (2016)
Hore, S., et al.: Finding contours of hippocampus brain cell using microscopic image analysis. J. Adv. Microsc. Res. 10(2), 93–103 (2015)
Chakraborty, S., Chatterjee, S., Dey, N., Ashour, A.S., Shi, F.: Gradient approximation in retinal blood vessel segmentation. In: 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON), pp. 618–623 (2017)
Roy, M., et al.: Cellular image processing using morphological analysis. In: 2017 IEEE 8th annual ubiquitous computing, electronics and mobile communication conference (UEMCON), pp. 237–241 (2017)
Chakraborty, S., et al.: Dermatological effect of UV rays owing to ozone layer depletion. In: 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix), pp. 1–6 (2017)
Chakraborty, S., et al.: Bag-of-features based classification of dermoscopic images. In: 2017 4th International Conference on Opto-Electronics and Applied Optics. Optronix 2017, vol. 2018 (2018)
Chakraborty, S., et al.: An integrated method for automated biomedical image segmentation. In: 2017 4th International Conference on Opto-Electronics and Applied Optics, Optronix 2017, vol. 2018 (2018)
DNA vs RNA—Barca.fontanacountryinn.com: [Online]. Available: http://barca.fontanacountryinn.com/dna-vs-rna/. Accessed: 08 Feb 2019
Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266(5187), 1021–1024 (1994)
Lipton, R.J.: DNA solution of hard computational problems. Science 268(5210), 542–545 (1995)
Boneh, D., Dunworth, C., Lipton, R.J.: Breaking DES using a molecular computer. In: 1st DIMACS workshop on DNA based computers (1995)
Ouyang, Q., Kaplan, P.D., Liu, S., Libchaber, A.: DNA solution of the maximal clique problem. Science 278(5337), 446–449 (1997)
Chen, J.: A DNA-based, biomolecular cryptography design. In: Circuits System (2003)
Gehani, A., LaBean, T., Reif, J.: DNA-based cryptography, pp. 167–188. Springer, Berlin (2003)
Amin, S., Saeb, M., El-Gindi, S.: A DNA-based implementation of YAEA encryption algorithm. Comput. Intell. (2006)
Verma, A.K., Dave, M., Joshi, R.C.: DNA cryptography: a novel paradigm for secure routing in Mobile Ad hoc Networks (MANETs). J. Discret. Math. Sci. Cryptogr. 11(4), 393–404 (2008)
Khalifa, A., Atito, A.: High-capacity DNA-based steganography. In: 8th International Conference on Informatics (2012)
Wang, X., Zhang, Q.: DNA computing-based cryptography. In: 2009 Fourth International on Conference on Bio-Inspired Computing, pp. 1–3 (2009)
Roy, B., Majumder, A.: An Improved Concept of Cryptography Based on DNA Sequencing (2012)
Kaundal, A.K., Verma, A.K.: DNA Based Cryptography: A Review (2014)
Menaka, K.: Message encryption using DNA sequences. In: 2014 World Congress on Computing and Communication Technologies, pp. 182–184 (2014)
Ning, K.: A Pseudo DNA Cryptography Method. Mar 2009
Lai, X., Lu, M., Qin, L., Han, J., Fang, X.: Asymmetric encryption and signature method with DNA technology. Sci. China Inf. Sci. 53(3), 506–514 (2010)
Torkaman, M.R.N., Kazazi, N.S., Rouddini, A.: Innovative approach to improve hybrid cryptography by using DNA steganography. Int. J. New Comput. Archit. Appl. 2(1), 225–236 (2012)
Tornea, O., Borda, M.E.: Security and complexity of a DNA-based cipher. In: 2013 11th RoEduNet International Conference, pp. 1–5 (2013)
Chen, J: A DNA-based, biomolecular cryptography design. In: Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS’03, vol. 3, pp. III-822–III-825
Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In: 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications, pp. 37–42 (2008)
Pramanik, S., Setua, S.K.: DNA cryptography. In: 2012 7th International Conference on Electrical and Computer Engineering, pp. 551–554 (2012)
Amin, S.T., Saeb, M., El-Gindi, S.: A DNA-based implementation of YAEA encryption algorithm. Comput. Intell. (2006)
Zhang, Y.: A DNA-based encryption method based on DNA chip and PCR amplification techniques,-9. pdf, works.bepress.com
Chakraborty, S., Seal, A., Roy, M., Mali, K.: A novel lossless image encryption method using DNA substitution and chaotic logistic map. Int. J. Secur. Appl. 10(2), 205–216 (2016)
Suri, S., Vijay, R.: A bi-objective genetic algorithm optimization of Chaos-DNA based hybrid approach. J. Intell. Syst. 28(2), 333–346 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Roy, M. et al. (2020). Data Security Techniques Based on DNA Encryption. In: Chakraborty, M., Chakrabarti, S., Balas, V. (eds) Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, vol 1065. Springer, Singapore. https://doi.org/10.1007/978-981-15-0361-0_19
Download citation
DOI: https://doi.org/10.1007/978-981-15-0361-0_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0360-3
Online ISBN: 978-981-15-0361-0
eBook Packages: EngineeringEngineering (R0)