You are on page 1of 8

By Miss. Kavita Dhoot I Semester M.Tech. Under Guidance Of S.

Ardhapukar

Smt. Bhagwati Chaturvedi College of Engineering, Nagpur. Department of Computer Science & Engineering 2012-2013

Introduction
Steganography-Art or Science of information hiding by embedding message within other.

Motivation for DNA Steganography !!


As modern encryption keys are broken, the world of information security looks in new directions to protect the data it transmits. Safety of encryption methods disappear as computing power and knowledge increases.

DNA Helix-Code Of Life..


Famous double-helix structure discovered by Watson

and Crick . DNA or deoxyribonucleic acid(DNA), is the hereditary material in humans and almost all other organisms.

Four bases Guanine (G), Cytosine (C), Adenine (A) and Thymine (T) form the genetic alphabet of the DNA

What is DNA Steganography??


Carter Bancroft developed DNA based steganography. It comprises of concealing a DNA encoded message within a normal piece of Human DNA followed by further concealment of the DNA sample to a microdot.

DNA Steganography
Complex DNA
(Fragmented Human DNA)

+ Secret message DNA

DNA Based Steganography

Apply to microdot
(contain billions of DNA strand)

How this method works


Experiments in DNA Steganography have been conducted by Carter Bancroft and his team to encrypt hidden messages within microdots.

A piece of DNA spelling out the message to be hidden is synthetically created which contains the secret encrypted message. The encoded piece of DNA is then placed into a normal piece of human DNA This microdot difficult to detect on the plain message medium but only one strand of those billions within the microdot contains the message. The recipient recovered the dot, performed the analysis, and successfully decoded the secret message.

Conclusion
Breaking DNA-based steganography represents an intractable biochemical problem, and that this technique is thus highly resistant to either computer or any other attacks.

DNA Steganography Application


Authenticate documents (e.g., currency,

immigration documents). Solid objects (e.g., apparel, industrial parts). liquids (e.g., signatures, perfume, petroleum).

References:

References:
- Journals And Articles
Guangzhao Cui, Cuiling Li, Haobin Li, Xiaoguang Li. DNA Computing and its application to Information Security Field. Henan Key Lab of Information-based Electrical Appliances, Zhengzhou. ( 2009 ). Gehani, Ashish. La Bean, Thomas H. Reif, John H. DNA-Based Cryptography. Departmentof Computer Science, Duke University. June 1999, [Online]. Available: http://www.cs.duke.edu/~reif/paper/DNAcrypt/crypt.pdf J. Chen. A DNA-based, biomolecular steganography design. Circuits and Systems ISCAS apos, (2010).

You might also like