Skip to main content

2024 | OriginalPaper | Buchkapitel

DNA Steganalysis Based on Multi-dimensional Feature Extraction and Fusion

verfasst von : Zhuang Wang, Jinyi Xia, Kaibo Huang, Shengnan Guo, Chenwei Huang, Zhongliang Yang, Linna Zhou

Erschienen in: Digital Forensics and Watermarking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Steganalysis, as an adversarial technique to steganography, aims to uncover potential concealed information transmission, holding significant research implications and value in maintaining societal peace and stability. With the rapid development and application of DNA synthesis technology, an increasing number of information hiding technologies based on DNA synthesis have emerged in recent years. DNA, as a natural information carrier, boasts advantages such as high information density, robustness, and strong imperceptibility, making it a challenging target for existing steganalysis technologies to efficiently detect. This paper proposes a DNA steganalysis technique that integrates multi-dimensional features. It extracts short-distance and long-distance related features from the DNA long chain separately and then employs ensemble learning for feature fusion and discrimination. Experiments have shown that this method can effectively enhance the detection capability against the latest DNA steganography technologies. We hope that this work will contribute to inspiring more research on DNA-oriented steganography and steganalysis technologies in the future.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arita, M.: Comma-free design for DNA words. Commun. ACM 47(5), 99–100 (2004)CrossRef Arita, M.: Comma-free design for DNA words. Commun. ACM 47(5), 99–100 (2004)CrossRef
2.
Zurück zum Zitat Bae, H., Min, S., Choi, H.S., Yoon, S.: DNA privacy: analyzing malicious DNA sequences using deep neural networks. IEEE/ACM Trans. Comput. Biol. Bioinf. 19(2), 888–898 (2020) Bae, H., Min, S., Choi, H.S., Yoon, S.: DNA privacy: analyzing malicious DNA sequences using deep neural networks. IEEE/ACM Trans. Comput. Biol. Bioinf. 19(2), 888–898 (2020)
3.
Zurück zum Zitat Beck, M.B., Desoky, A.H., Rouchka, E.C., Yampolskiy, R.V.: Decoding methods for DNA steganalysis. In: 6th International Conference on Bioinformatics and Computational Biology (BICoB) (2014) Beck, M.B., Desoky, A.H., Rouchka, E.C., Yampolskiy, R.V.: Decoding methods for DNA steganalysis. In: 6th International Conference on Bioinformatics and Computational Biology (BICoB) (2014)
4.
Zurück zum Zitat Beck, M.B.: A forensics software toolkit for DNA steganalysis (2015) Beck, M.B.: A forensics software toolkit for DNA steganalysis (2015)
6.
Zurück zum Zitat Bornholt, J., Lopez, R., Carmean, D.M., Ceze, L., Seelig, G., Strauss, K.: A DNA-based archival storage system. In: Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 637–649 (2016) Bornholt, J., Lopez, R., Carmean, D.M., Ceze, L., Seelig, G., Strauss, K.: A DNA-based archival storage system. In: Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 637–649 (2016)
7.
Zurück zum Zitat Chun, J.Y., Lee, H.L., Yoon, J.W.: Passing go with DNA sequencing: delivering messages in a covert transgenic channel. In: 2015 IEEE Security and Privacy Workshops, pp. 17–26. IEEE (2015) Chun, J.Y., Lee, H.L., Yoon, J.W.: Passing go with DNA sequencing: delivering messages in a covert transgenic channel. In: 2015 IEEE Security and Privacy Workshops, pp. 17–26. IEEE (2015)
8.
Zurück zum Zitat Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399(6736), 533–534 (1999)CrossRef Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399(6736), 533–534 (1999)CrossRef
10.
Zurück zum Zitat Guo, C., Chang, C.C., Wang, Z.H.: A new data hiding scheme based on DNA sequence. Int. J. Innov. Comput. Inf. Control 8(1), 139–149 (2012) Guo, C., Chang, C.C., Wang, Z.H.: A new data hiding scheme based on DNA sequence. Int. J. Innov. Comput. Inf. Control 8(1), 139–149 (2012)
11.
Zurück zum Zitat Haughton, D., Balado, F.: BioCode: two biologically compatible algorithms for embedding data in non-coding and coding regions of DNA. BMC Bioinform. 14(1), 1–16 (2013)CrossRef Haughton, D., Balado, F.: BioCode: two biologically compatible algorithms for embedding data in non-coding and coding regions of DNA. BMC Bioinform. 14(1), 1–16 (2013)CrossRef
12.
Zurück zum Zitat Huang, C., et al.: DNA synthetic steganography based on conditional probability adaptive coding. IEEE Trans. Inf. Forensics Secur. 18, 4747–4759 (2023)CrossRef Huang, C., et al.: DNA synthetic steganography based on conditional probability adaptive coding. IEEE Trans. Inf. Forensics Secur. 18, 4747–4759 (2023)CrossRef
13.
Zurück zum Zitat Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef
14.
Zurück zum Zitat Ivanova, N.V., Kuzmina, M.L.: Protocols for dry DNA storage and shipment at room temperature. Mol. Ecol. Resour. 13(5), 890–898 (2013)CrossRef Ivanova, N.V., Kuzmina, M.L.: Protocols for dry DNA storage and shipment at room temperature. Mol. Ecol. Resour. 13(5), 890–898 (2013)CrossRef
15.
Zurück zum Zitat Khalifa, A., Atito, A.: High-capacity DNA-based steganography. In: 2012 8th International Conference on Informatics and Systems (INFOS), p. BIO-76. IEEE (2012) Khalifa, A., Atito, A.: High-capacity DNA-based steganography. In: 2012 8th International Conference on Informatics and Systems (INFOS), p. BIO-76. IEEE (2012)
16.
Zurück zum Zitat Khalifa, A., Elhadad, A., Hamad, S.: Secure blind data hiding into pseudo DNA sequences using playfair ciphering and generic complementary substitution. Appl. Math. 10(4), 1483–1492 (2016) Khalifa, A., Elhadad, A., Hamad, S.: Secure blind data hiding into pseudo DNA sequences using playfair ciphering and generic complementary substitution. Appl. Math. 10(4), 1483–1492 (2016)
18.
Zurück zum Zitat Sarkar, A., Madhow, U., Manjunath, B.: Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. IEEE Trans. Inf. Forensics Secur. 5(2), 225–239 (2010)CrossRef Sarkar, A., Madhow, U., Manjunath, B.: Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. IEEE Trans. Inf. Forensics Secur. 5(2), 225–239 (2010)CrossRef
19.
Zurück zum Zitat Tang, W., Li, B., Tan, S., Barni, M., Huang, J.: CNN-based adversarial embedding for image steganography. IEEE Trans. Inf. Forensics Secur. 14(8), 2074–2087 (2019)CrossRef Tang, W., Li, B., Tan, S., Barni, M., Huang, J.: CNN-based adversarial embedding for image steganography. IEEE Trans. Inf. Forensics Secur. 14(8), 2074–2087 (2019)CrossRef
20.
Zurück zum Zitat Taur, J.S., Lin, H.Y., Lee, H.L., Tao, C.W.: Data hiding in DNA sequences based on table lookup substitution. Int. J. Innov. Comput. Inf. Control 8(10), 6585–6598 (2012) Taur, J.S., Lin, H.Y., Lee, H.L., Tao, C.W.: Data hiding in DNA sequences based on table lookup substitution. Int. J. Innov. Comput. Inf. Control 8(10), 6585–6598 (2012)
21.
Zurück zum Zitat Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017) Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)
22.
Zurück zum Zitat Wiseman, S.: Stegware–using steganography for malicious purposes (2017) Wiseman, S.: Stegware–using steganography for malicious purposes (2017)
23.
Zurück zum Zitat Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880–895 (2020)CrossRef Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880–895 (2020)CrossRef
Metadaten
Titel
DNA Steganalysis Based on Multi-dimensional Feature Extraction and Fusion
verfasst von
Zhuang Wang
Jinyi Xia
Kaibo Huang
Shengnan Guo
Chenwei Huang
Zhongliang Yang
Linna Zhou
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2585-4_20

Premium Partner