The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Coverless Data Hiding in VoIP based on DNA Steganography with Authentication

Data hiding in Voice over Internet Protocol (VoIP) using coverless approach improves the undetectability by preserving the cover bits from modification. This paper focuses on hiding the secret message in VoIP streams using Deoxyribonucleic Acid (DNA) steganography approach. DNA steganography is known for its low cracking probability. The embedding process is done in two steps. The first step converts the VoIP sample, secret message and a user generated key (for Authentication) into m-RNA pattern during transcription and the second step converts the m-RNA to form a triplet during translation process to create a protein array, where the secret message is embedded. The secret message is extracted from the protein array by applying reverse translation and Transcription. The proposed approach improves the undetectability by leaving the cover bits unmodified with Perceptual Evaluation of Signal Quality (PESQ) values 84% comparatively greater than the state of art techniques.

[1] Abbasy M., Nikfard P., Ordi A., and Torkaman M., “DNA Base Data Hiding Algorithm,” International Journal on New Computer Architectures and Their Applications, vol. 2, no. 1, pp. 183-192, 2012.

[2] Agrawal R., Srivastava M., and Sharma A., “Data Hiding Using Dictionary Based Substitution Method in DNA Sequences,” in Proceedings of 9th International Conference on Industrial and Information Systems, Gwalior, pp. 1-6, 2014.

[3] Al-Harbi O., Alahmadi W., and Aljahdali A., “Security Analysis of DNA Based Steganography Techniques,” SN Applied Sciences, vol. 2, no. 2, pp. 1-10, 2020.

[4] Anees A., Siddiqui A., Ahmed J., and Hussain I., “A Technique for Digital Steganography Using Chaotic Maps,” Nonlinear Dynamics, vol. 75, no. 4, pp. 807-816, 2014.

[5] Bąk P., Bieniasz J., Krzemiński M., and Szczypiorski K., “Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication,” in Proceedings of 4th International Conference on Frontiers of Signal Processing, Poitiers, pp. 34- 38, 2018.

[6] Balado F., “Capacity of DNA Data Embedding Under Substitution Mutations,” IEEE Transactions on Information Theory, vol. 59, no. 2, pp. 928-941, 2012.

[7] Bhowal K., Sarkar D., Biswas S., and Sarkar P., “An Efficient Steganographic Approach to Hide Information in Digital Audio Using Modulus Operation,” The International Arab Journal of Information Technology, vol. 16, no. 4, pp. 703- 711, 2019.

[8] Clancy S. and Brown W., “Translation: DNA to mRNA to Protein,” Nature Education, vol. 1, no. 1, pp. 101, 2008. 0 0.5 1 1.5 Comparitive Analysis of Covered and coverless methods BCR = r/nER = n/m Coverless Data Hiding in VoIP based on DNA Steganography with Authentication 197

[9] Deepikaa S. and Saravanan R., “VoIP Steganography Methods, a Survey,” Cybernetics and Information Technologies, vol. 19, no. 1, pp. 73-87, 2019.

[10] Deepikaa S. and Saravanan R., “Coverless VoIP Steganography Using Hash and Hash,” Cybernetics and Information Technologies, vol. 20, no. 3, pp. 102-115, 2020.

[11] Djebbar F., Ayad B., Meraim K., and Hamam H., “Comparative Study of Digital Audio Steganography Techniques,” EURASIP Journal on Audio, Speech, and Music Processing, vol. 2012, no. 1, pp 1-16, 2012.

[12] Farhan A., Ali R., Yassein H., Al-Saidi N., and Abdul-Majeed G., “A New Approach to Generate Multi S-Boxes Based on RNA Computing,” International journal of innovative computing, information and control: IJICIC, vol. 16, no. 1, pp. 331-348, 2020.

[13] Hamed G., Marey M., El-Sayed S., and Tolba F., Applications of Intelligent Optimization in Biology and Medicine, Springer, 2016.

[14] Jayaram P., Ranganatha H., and Anupama H., “Information Hiding Using Audio Steganography-A Survey,” The International Journal of Multimedia and its Applications, vol. 3, no. 3, pp. 86-96, 2011.

[15] Jenifer J., Ratna S., Loret J., and Gethsy D., “A Survey on Different Video Steganography Techniques,” in Proceedings of 2nd International Conference on Trends in Electronics and Informatics, Tirunelveli, pp. 627-632, 2018.

[16] Kadhim I., Premaratne P., Vial P., and Halloran B., “Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research,” Neurocomputing, vol. 335, pp. 299- 326, 2019.

[17] Lubacz J., Mazurczyk W., and Szczypiorski K., “Principles and Overview of Network Steganography,” IEEE Communications Magazine, vol. 52, no. 5, pp. 225-229, 2014.

[18] Malathi P., Manoaj M., Manoj R., Raghavan V., and Vinodhini R., “Highly Improved DNA Based Steganography,” Procedia Computer Science, vol. 115, pp. 651-659, 2017.

[19] Marwan S., Shawish A., and Nagaty K., “An Enhanced DNA-based Steganography Technique with a Higher Hiding Capacity,” Bioinformatics, pp. 150-157, 2015.

[20] Mazurczyk W. and Lubacz J., “LACK—A Voip Steganographic Method,” Telecommunication Systems, vol. 45, no. 2-3, pp. 153-163, 2010.

[21] Mazurczyk W., Smolarczyk M., and Szczypiorski K., “Retransmission Steganography and its Detection.,” Soft Computing, vol. 15, no. 3, pp. 505-515, 2011.

[22] Mazurczyk W., “Voip Steganography and Its Detection-A Survey,” ACM Computing Surveys, vol. 46, no. 2, pp. 1-21, 2013.

[23] Mitras B. and Aboo A., “Proposed Steganography Approach Using DNA Properties,” International Journal of Information Technology and Business Management, vol. 14, no. 1, pp. 96-102, 2013.

[24] Mohammed M., Taloba A., and Ali B., “DNA- Based Steganography Using Neural Networks,” in Proceedings of International Japan-Africa Conference on Electronics, Communications and Computations, Alexandria, pp. 79-82, 2018.

[25] Na D., “DNA Steganography: Hiding Undetectable Secret Messages within the Single Nucleotide Polymorphisms of A Genome and Detecting Mutation-Induced Errors,” Microbial Cell Factories, vol. 19, no. 1, pp. 1-9, 2020.

[26] Nisperos Z., Gerardo B., and Hernandez A., “A Coverless Approach to Data Hiding Using DNA Sequences,” in Proceedings of 2nd World Symposium on Communication Engineering, Nagoya, pp. 21-25, 2019.

[27] Qin J, Tian H., Huang Y., Liu J., Chen Y., Wang T., Cai Y., and Wang X., “An Efficient Voip Steganography based on Random Binary Matrix,” in Proceedings of 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Krakow, pp. 462-465, 2015.

[28] Salomon D., Data Compression: The Complete Reference, Springer, 2012.

[29] Shiu H., Ng K., Fang J., Lee R., and Huang C., “Data Hiding Methods Based Upon DNA Sequences,” Information Sciences, vol. 180, no. 11, pp. 2196-2208, 2011.

[30] Sushma R., Namitha M., Manjula G., Johar S., and Hiriyanna G., “DNA based Steganography Using 2-3-3 Technique,” in Proceedings of International Conference on Data Science and Communication, Bangalore, pp. 1-6, 2019.

[31] Tian H., Jiang H., Zhou K., and Feng D., “Adaptive Partial-Matching Steganography For Voice Over IP Using Triple M Sequences,” Computer Communications, vol. 34, no. 18, pp. 2236-2247, 2011.

[32] Tian H., Qin J., Guo S., Huang Y., Liu J., Wang T., ChenY., and Cai Y., “Improved Adaptive Partial-Matching Steganography for Voice Over IP,” Computer Communications, vol. 70, pp. 95- 108, 2015.

[33] Tian H., Liu J., and Li S., “Improving Security of Quantization-Index-Modulation Steganography in Low Bit-Rate Speech Streams,” Multimedia Systems, vol. 20, no. 2, pp. 143-154, 2014.

[34] Tian H., Qin J., Huang Y., Chen Y., Wang T., Liu J., and Cai Y., “Optimal Matrix Embedding for Voice-Over-IP Steganography,” Signal Processing, vol. 117, pp. 33-43, 2017. 198 The International Arab Journal of Information Technology, Vol. 20, No. 2, March 2023

[35] Wang Z., Zhao X., Wang H., and Cui G., “Information Hiding Based on DNA Steganography,” in Proceedings of IEEE 4th International Conference on Software Engineering and Service Science, Beijing, pp. 946-949, 2013.

[36] Wu K. and Wang C., “Steganography Using Reversible Texture Synthesis,” IEEE Transactions on Image Processing, vol. 24, no. 1, pp. 130-139, 2015.

[37] Xu J., Mao X., Jin X., Jaffer A., Lu S., Li L., and Toyoura M., “Hidden Message In A Deformation-Based Texture,” The Visual Computer, vol. 31, no. 12, pp. 1653-1669, 2015.

[38] Zhang X., Peng F., and Long M., “Robust Coverless Image Steganography Based on DCT and LDA Topic Classification,” IEEE Transactions on Multimedia, vol. 20, no. 12, pp. 3223-3238, 2018.

[39] Zheng S., Wang L., Ling B., and Hu D., “Coverless Information Hiding Based on Robust Image Hashing,” in Proceedings of International Conference on Intelligent Computing, pp. 536- 547, 2017.

[40] Zhou Z., Sun H., Harit R., Chen X., and Sun X., “Coverless Image Steganography without Embedding,” in Proceedings of International Conference on Cloud Computing and Security, Nanjing, pp. 123-132, 2015.

[41] Zhou Z., Mu Y., and Wu Q., “Coverless Image Steganography Using Partial-Duplicate Image Retrieval,” Soft Computing, vol. 23, no. 13, pp. 4927-4938, 2019.

[42] Zou L., Sun J., Gao M., Wan W., and Gupta B., “A Novel Coverless Information Hiding Method Based on the Average Pixel Value of the Sub- Images,” Multimedia Tools and Applications, vol. 78, no. 7, pp. 7965-7980, 2019.