Amal Khalifa
Princess Nora University, Saudi Arabia
Posters-Accepted Abstracts: J Appl Computat Math
People are always looking for secure methods to protect valuable information against unauthorized access or use. That�s why disciplines like cryptography and steganography are gaining a great interest among researchers. Although the origin of steganography goes back to the ancient Greeks, recent Information Hiding techniques embed data into various digital media such as sound, images, and videos. However, in this research we took a step further to utilize DNA sequences as a carrier of secret information. Two techniques will be presented. The first method hides the secret message into some reference DNA sequence using a generic substitution technique that is followed by a self-embedding phase such that the extraction process can be done blindly using only the secret key. The second technique is called the Least Significant Base Substitution or LSBase for short. This method exploits a remarkable property of codon redundancy to introduce silent mutations into DNA sequences in such a way that the carrier DNA sequence can be altered without affecting neither the type nor the structure of protein it produces.
Email: ASkhalifa@pnu.edu.sa
Journal of Applied & Computational Mathematics received 1282 citations as per Google Scholar report