Enhancing Internet Data Security: A Fusion of Cryptography, Steganography, and Machine Learning Techniques

Authors

  • Omar Fitian Rashid Department of Geology, College of Science, University of Baghdad, Baghdad, Iraq. https://orcid.org/0000-0002-8186-0795
  • Mohammed Ahmed Subhi Department of Planning, Directorate of Private University Education, Ministry of Higher Education and Scientific Research, Baghdad, Iraq & Balad Technical Institute, Medical Technical University, Baghdad, Iraq.
  • Marwa Khudhur Hussein Department Construction and Projects, University of Baghdad, Baghdad, Iraq.
  • Mohammed Najah Mahdi ADAPT Centre, School of Computing, Dublin City University, Dublin, Ireland.

DOI:

https://doi.org/10.21123/bsj.2024.10371

Keywords:

DNA Cryptography, Decryption, Machine Learning, Steganography, Security, Encryption, DNA Cryptography, Decryption, Machine Learning, Steganography, Security, Encryption

Abstract

Cryptography and steganography play critical roles in ensuring the security of network communications. Combining these methods holds great potential for safeguarding information transmitted over the internet. DNA Cryptography, a modern and robust technique, leverages the unique properties of DNA for secure data handling. The increasing of cyber threats has made it necessary to propose a new secure communication method to block unauthorized access to the sending information. This paper introduces an innovative system that integrates cryptography, steganography, and machine learning techniques to enhance data transfer security over the Internet. The system unfolds in six steps to encrypt and hide text. The initial step involves using the Caesar cipher to encode the original text. This is followed by the conversion of the text into DNA bases. Subsequent steps include the conversion of DNA bases to ASCII format and further transformation into binary numbers. The fifth step introduces a dynamic element by shifting binary numbers using a random key. The final step involves covertly embedding these binary numbers (ciphertext) within an image. Beyond traditional metrics, machine learning elements have been incorporated to elevate the system's performance. Performance evaluation was conducted across three standard images with varying data sizes, demonstrating the system's effectiveness. The proposed system showcased rapid cryptography times, with encryption and decryption times of 2.802 ms and 3.388 ms, respectively. The integration of machine learning techniques enriches the system's capabilities, presenting a compelling solution for secure and efficient data transfer over the Internet.

References

Kaundal AK, Verma AK. DNA Based Cryptography: A Review. IJICT. 2014; 4(7): 693-698.

Bhimani P. A Review on Cryptography Techniques using DNA Computing. IJCERT. 2018; 5(6): 187-191. https://doi.org/10.22362/ijcert/2018/v5/i6/v5i604

Vikram A, Kalaivani S, Gopinath G. A Novel Encryption Algorithm based on DNA Cryptography. International Conference on Communication and Electronics Systems (ICCES). 2019. https://doi.org/10.1109/ICCES45898.2019.9002399

Beggas F, Lounici A. Generation of random sequences using DNA cryptography for OTP encryption. Biosyst. 2023; 234. https://doi.org/10.1016/j.biosystems.2023.105064

Pavithran P, Mathew S, Namasudra S, Lorenz P. A novel cryptosystem based on DNA cryptography and randomly generated mealy machine. Comput Secur. 2021; 104. https://doi.org/10.1016/j.cose.2020.102160

Akiwate B, Parthiban L. A Dynamic DNA for Key-based Cryptography. International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS). 2018; 223-227. https://doi.org/10.1109/CTEMS.2018.8769267

Rashid OF, Othman ZA, Zainudin S, Samsudin NA. DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems. IEEE Access. 2021; 31892 – 31907. https://doi.org/10.1109/ACCESS.2021.3055431

Rashid OF. DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set. Iraqi J Sci. 2020; 61(12): 3408-3416. https://doi.org/10.24996/ijs.2020.61.12.29

Mohammed MH, Taloba AI, Ali BH. DNA-Based Steganography Using Neural Networks. 2018 International Japan-Africa Electronics, Communications, and Computations (JAC-ECC). 2018; 79-82. https://doi.org/10.1109/JEC-ECC.2018.8679564

Qi B, Yang C, Tan L, Luo X, Liu F. A Novel Haze Image Steganography Method via Cover-Source Switching. J Vis Commun. Image Represent. 2020; 70: 1-11. https://doi.org/10.1016/j.jvcir.2020.102814

Sharafi L, Khedmati Y, Shabani MM. Image steganography based on a new hybrid chaos map and discrete transforms. Optik. 2021; 226. https://doi.org/10.1016/j.ijleo.2020.165492

Sushma RB, Namitha MV, Manjula GR, Johar S, Hiriyanna GS. DNA based Steganography Using 2-3-3 Technique. Data Science and Communication. 2019; 1-6. https://doi.org/10.1109/IconDSC.2019.8816945

Zha H, Zhang W, Yu N, Fan Z. Enhancing image steganography via adversarial optimization of the stego distribution. Signal Process. 2023; 212. https://doi.org/10.1016/j.sigpro.2023.109155

Hsieh K, Wang C. Constructive image steganography using example-based weighted color transfer. J Inf Secur Appl . 2022; 65. https://doi.org/10.1016/j.jisa.2022.103126

Naser MA, Al-alak SMK, Hussein AM, Jawad MJ. Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel. Baghdad Sci J. 2022; 19(6): 1362-1368. https://dx.doi.org/10.21123/bsj.2022.6142

Rabie T, Baziyad M, Kamel I. Secure high payload steganography: A model-based approach. J Inf Secur Appl . 2021; 63. https://doi.org/10.1016/j.jisa.2021.103043

Al-Hassani MD. A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation. Baghdad Sci. J. 2022; 19(4): 905-913. http://dx.doi.org/10.21123/bsj.2022.19.4.0905

Xian G. Parallel machine learning algorithm using fine-grained-mode spark on a mesos big data cloud computing software framework for mobile robotic intelligent fault recognition. IEEE Access. 2020; 8: 131885-131900. https://doi.org/10.1109/ACCESS.2020.3007499

Salman SA, Dheyab SA, Salih QM, Hammood WA. Parallel Machine Learning Algorithms. Mesopotamian J Big Data. 2023; 12–15. https://doi.org/10.58496/MJBD/2023/002

Almomani A, Nahar K, Alauthman M, Al-Betar MA, Yaseen Q, Gupta BB. Image cyberbullying detection and recognition using transfer deep machine learning. Int J Cogn Comput. Eng. 2024; 5: 14-26. https://doi.org/10.1016/j.ijcce.2023.11.002

Kaduwela NA, Horner S, Dadar P, Manworren RCB. Application of a human-centered design for embedded machine learning model to develop data labeling software with nurses: Human-to-Artificial Intelligence (H2AI). Int J Med Inform. 2024; 183. https://doi.org/10.1016/j.ijmedinf

Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A. Image Steganography: A Review of the Recent Advances. IEEE Access. 2021; 9: 23409-23423. https://doi.org/10.1109/ACCESS.2021.3053998

Kataria S, Singh K, Kumar T, Nehra MS. ECR (Encryption with Cover Text and Reordering) based Text Steganography. IEEE Second International Conference on Image Information Processing (ICIIP-2013). 2013; 612-616. https://doi.org/10.1109/ICIIP.2013.6707666

Akiwate B, Parthiban L. A Dynamic DNA for Key-based Cryptography. International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS). 2018; 223-227. https://doi.org/10.1109/CTEMS.2018.8769267

Pradhan D, Som S, Rana A. Cryptography Encryption Technique Using Circular Bit Rotation in Binary Field. 8th International Conference on Reliability, Infocom Technologies and Optimization Amity University. 2020. https://doi.org/10.1109/ICRITO48877.2020.9197845

Downloads

Issue

Section

article

How to Cite

1.
Enhancing Internet Data Security: A Fusion of Cryptography, Steganography, and Machine Learning Techniques. Baghdad Sci.J [Internet]. [cited 2024 Nov. 21];22(4). Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/10371