Skip to main content

An Improved Substitution Method for Data Encryption Using DNA Sequence and CDMB

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

Abstract

Cryptography provides the solution in fields such as banking services, digital certificate, digital signature, message and image encryption etc. In this paper, we propose an improved data encryption approach based on the Deoxyribonucleic acid that exploits two different techniques: Substitution technique and Central Dogma of Molecular Biology. It transforms the message into protein (cipher text) using various complementary rules. Deoxyribonucleic acid provides robust DNA sequence for the substitution technique from approximately 163 million huge DNA database, where Central Dogma of Molecular Biology support the encrypted output of substitution method using transcription and translation technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C.T., Huang, C.H.: Data hiding methods based upon DNA sequences. Inf. Sci. 180, 2196–2208 (2010)

    Article  MathSciNet  Google Scholar 

  2. Liu, H., Lin, D., Kadir, A.: A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39, 1164–1173 (2013)

    Article  Google Scholar 

  3. Taur, J.S., Lin, H.Y., Lee, H.L., Tao, C.W.: Data hiding in DNA sequences based on table lookup substitution. Int. J. Innovative Comput. Inf. Control 8(10), 6585–6598 (2012)

    Google Scholar 

  4. Gehani, A., LaBean, T., Reif, J.: DNA-based cryptography. Dismacs Ser. Discrete Math. Theor. Comput. Sci. 54, 233–349 (2000)

    MathSciNet  Google Scholar 

  5. Kar, N., Majumder, A., Saha, A., Jamatia, A., Chakma, K., Pal, M.C.: An improved data security using DNA sequencing. In: Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare, pp. 13–18 (2013)

    Google Scholar 

  6. Mandge, T., Choudhary, V.: A DNA encryption technique based on matrix manipulation and secure key generation scheme. In: IEEE International conference on Information Communication and Embedded Systems (ICICES), pp. 47–52 (2013)

    Google Scholar 

  7. Abbasy, M.R., Nikfard, P., Ordi, A., Torkaman, M.R.N.: DNA base data hiding algorithm. Int. J. New Comput. Architect. Appl. (IJNCAA) 2(1), 183–192 (2012)

    Google Scholar 

  8. Huang, Y.H., Chang, C.C., Wu, C.Y.: A DNA-based data hiding technique with low modification rates. Multimedia Tools Appl. 70, 1–13 (2012)

    Google Scholar 

  9. Hussain, U.N., Chithralekha, T., Raj, A.N., Sathish, G., Dharani, A.: A hybrid DNA algorithm for DES using Central Dogma of Molecular Biology (CDMB). Int. J. Comput. Appl. 42(20), 1–4 (2012)

    Google Scholar 

  10. RNA codon table. http://en.wikibooks.org/wiki/Proteomics/Protein_Primary_Structure/Genetic_Code

  11. DNA structure. http://ghr.nlm.nih.gov/handbook/basics/DNA

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Gupta, R., Singh, R.K. (2015). An Improved Substitution Method for Data Encryption Using DNA Sequence and CDMB . In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics