Enhancing Internet Data Security: A Fusion of Cryptography, Steganography, and Machine Learning Techniques
DOI:
https://doi.org/10.21123/bsj.2024.10371Keywords:
DNA Cryptography, Decryption, Machine Learning, Steganography, Security, Encryption, DNA Cryptography, Decryption, Machine Learning, Steganography, Security, EncryptionAbstract
Cryptography and steganography play critical roles in ensuring the security of network communications. Combining these methods holds great potential for safeguarding information transmitted over the internet. DNA Cryptography, a modern and robust technique, leverages the unique properties of DNA for secure data handling. The increasing of cyber threats has made it necessary to propose a new secure communication method to block unauthorized access to the sending information. This paper introduces an innovative system that integrates cryptography, steganography, and machine learning techniques to enhance data transfer security over the Internet. The system unfolds in six steps to encrypt and hide text. The initial step involves using the Caesar cipher to encode the original text. This is followed by the conversion of the text into DNA bases. Subsequent steps include the conversion of DNA bases to ASCII format and further transformation into binary numbers. The fifth step introduces a dynamic element by shifting binary numbers using a random key. The final step involves covertly embedding these binary numbers (ciphertext) within an image. Beyond traditional metrics, machine learning elements have been incorporated to elevate the system's performance. Performance evaluation was conducted across three standard images with varying data sizes, demonstrating the system's effectiveness. The proposed system showcased rapid cryptography times, with encryption and decryption times of 2.802 ms and 3.388 ms, respectively. The integration of machine learning techniques enriches the system's capabilities, presenting a compelling solution for secure and efficient data transfer over the Internet.
Received 04/12/2023
Revised 30/04/2024
Accepted 02/05/2024
Published Online First 20/09/2024
References
Kaundal AK, Verma AK. DNA Based Cryptography: A Review. IJICT. 2014; 4(7): 693-698.
Bhimani P. A Review on Cryptography Techniques using DNA Computing. IJCERT. 2018; 5(6): 187-191. https://doi.org/10.22362/ijcert/2018/v5/i6/v5i604
Vikram A, Kalaivani S, Gopinath G. A Novel Encryption Algorithm based on DNA Cryptography. International Conference on Communication and Electronics Systems (ICCES). 2019. https://doi.org/10.1109/ICCES45898.2019.9002399
Beggas F, Lounici A. Generation of random sequences using DNA cryptography for OTP encryption. Biosyst. 2023; 234. https://doi.org/10.1016/j.biosystems.2023.105064
Pavithran P, Mathew S, Namasudra S, Lorenz P. A novel cryptosystem based on DNA cryptography and randomly generated mealy machine. Comput Secur. 2021; 104. https://doi.org/10.1016/j.cose.2020.102160
Akiwate B, Parthiban L. A Dynamic DNA for Key-based Cryptography. International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS). 2018; 223-227. https://doi.org/10.1109/CTEMS.2018.8769267
Rashid OF, Othman ZA, Zainudin S, Samsudin NA. DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems. IEEE Access. 2021; 31892 – 31907. https://doi.org/10.1109/ACCESS.2021.3055431
Rashid OF. DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set. Iraqi J Sci. 2020; 61(12): 3408-3416. https://doi.org/10.24996/ijs.2020.61.12.29
Mohammed MH, Taloba AI, Ali BH. DNA-Based Steganography Using Neural Networks. 2018 International Japan-Africa Electronics, Communications, and Computations (JAC-ECC). 2018; 79-82. https://doi.org/10.1109/JEC-ECC.2018.8679564
Qi B, Yang C, Tan L, Luo X, Liu F. A Novel Haze Image Steganography Method via Cover-Source Switching. J Vis Commun. Image Represent. 2020; 70: 1-11. https://doi.org/10.1016/j.jvcir.2020.102814
Sharafi L, Khedmati Y, Shabani MM. Image steganography based on a new hybrid chaos map and discrete transforms. Optik. 2021; 226. https://doi.org/10.1016/j.ijleo.2020.165492
Sushma RB, Namitha MV, Manjula GR, Johar S, Hiriyanna GS. DNA based Steganography Using 2-3-3 Technique. Data Science and Communication. 2019; 1-6. https://doi.org/10.1109/IconDSC.2019.8816945
Zha H, Zhang W, Yu N, Fan Z. Enhancing image steganography via adversarial optimization of the stego distribution. Signal Process. 2023; 212. https://doi.org/10.1016/j.sigpro.2023.109155
Hsieh K, Wang C. Constructive image steganography using example-based weighted color transfer. J Inf Secur Appl . 2022; 65. https://doi.org/10.1016/j.jisa.2022.103126
Naser MA, Al-alak SMK, Hussein AM, Jawad MJ. Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel. Baghdad Sci J. 2022; 19(6): 1362-1368. https://dx.doi.org/10.21123/bsj.2022.6142
Rabie T, Baziyad M, Kamel I. Secure high payload steganography: A model-based approach. J Inf Secur Appl . 2021; 63. https://doi.org/10.1016/j.jisa.2021.103043
Al-Hassani MD. A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation. Baghdad Sci. J. 2022; 19(4): 905-913. http://dx.doi.org/10.21123/bsj.2022.19.4.0905
Xian G. Parallel machine learning algorithm using fine-grained-mode spark on a mesos big data cloud computing software framework for mobile robotic intelligent fault recognition. IEEE Access. 2020; 8: 131885-131900. https://doi.org/10.1109/ACCESS.2020.3007499
Salman SA, Dheyab SA, Salih QM, Hammood WA. Parallel Machine Learning Algorithms. Mesopotamian J Big Data. 2023; 12–15. https://doi.org/10.58496/MJBD/2023/002
Almomani A, Nahar K, Alauthman M, Al-Betar MA, Yaseen Q, Gupta BB. Image cyberbullying detection and recognition using transfer deep machine learning. Int J Cogn Comput. Eng. 2024; 5: 14-26. https://doi.org/10.1016/j.ijcce.2023.11.002
Kaduwela NA, Horner S, Dadar P, Manworren RCB. Application of a human-centered design for embedded machine learning model to develop data labeling software with nurses: Human-to-Artificial Intelligence (H2AI). Int J Med Inform. 2024; 183. https://doi.org/10.1016/j.ijmedinf
Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A. Image Steganography: A Review of the Recent Advances. IEEE Access. 2021; 9: 23409-23423. https://doi.org/10.1109/ACCESS.2021.3053998
Kataria S, Singh K, Kumar T, Nehra MS. ECR (Encryption with Cover Text and Reordering) based Text Steganography. IEEE Second International Conference on Image Information Processing (ICIIP-2013). 2013; 612-616. https://doi.org/10.1109/ICIIP.2013.6707666
Akiwate B, Parthiban L. A Dynamic DNA for Key-based Cryptography. International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS). 2018; 223-227. https://doi.org/10.1109/CTEMS.2018.8769267
Pradhan D, Som S, Rana A. Cryptography Encryption Technique Using Circular Bit Rotation in Binary Field. 8th International Conference on Reliability, Infocom Technologies and Optimization Amity University. 2020. https://doi.org/10.1109/ICRITO48877.2020.9197845
Downloads
Issue
Section
License
Copyright (c) 2024 Omar Fitian Rashid , Mohammed Ahmed Subhi, Marwa Khudhur Hussein, Mohammed Najah Mahdi
This work is licensed under a Creative Commons Attribution 4.0 International License.