FPGA Based Data Hiding Methods using DNA Cryptography Techniques

Author(s):  
B. Murali Krishna ◽  
CH. Surendra ◽  
K. Mani Varma ◽  
K. Mani Kanta ◽  
S.K. Shabbeer ◽  
...  

<p>To convey the information safely DNA grouping mechanisms are used. There are many methods used by DNA sequences. The proposed method is of both encryption and information concealing utilizing a few properties of Deoxyribonucleic Acid (DNA) groupings. This technique is highlighted that DNA groupings have many more intriguing properties which are used for concealing the information. There are three strategies in this encryption strategy: the Insertion Technique, the Complimentary Pair Technique and the Substitution Strategy .For every single strategy, a specific reference DNA grouping P is chosen and then the taken sequence is changed over with the mystery message M and is consolidated, so that P0 is acquired. P0 is then sent to the collector and the beneficiary can recognize and separate the message M covered up in P. This technique is proposed to utilize INSERTION Strategy. Subsequently, the proposed plan comprises for the most part of two stages. In the principal stage, the mystery information is encoded utilizing a DNA Sequence. In the second stage the encoded information is steganographically covered up into some reference DNA grouping utilizing an insertion strategy. The effectiveness of this security algorithm is seen with many merits and limitations. A, C, G, and T are the 4 nucleotides which are taken for this project.</p>

An enhanced technique to generate unique code using DNA sequences that encrypt and decrypt plaintext of characters, text file(.txt,.doc,.docx),image (jpg, jpeg), audio(.mp3) and video(.mp4) using a dynamic DNA key-based cryptography. Cryptography is always considered as secured way for transferring information over insecure channel by achieving confidentiality, privacy and integrity. Since last 10 years traditional cryptography approaches are been replaced with more efficient and effective cryptographic systems like DNA Cryptography. This system takes the DNA sequence as the input and generates a key randomly and is used to decrypt the data without non-integrity of data. This system provides two stages of data security using DNA sequences.


Author(s):  
Satya Ranjan Dash ◽  
Satchidananda Dehuri ◽  
Uma Kant Sahoo

Olfactory receptors (ORs) are responsible for recognition of odor molecules. The deoxyribonucleic acid (DNA) sequences of these receptors are severely affected by local mutations. Therefore, to study the changes among affected and non-affected ORs, the authors attempted to use unsupervised learning (clustering) algorithm. In this paper, they have used a scaled fuzzy graph model for clustering to study the changes before and after the local mutation on DNA sequences of ORs. Their simulation study at the fractional dimensional level confirms its accuracy.


1981 ◽  
Vol 1 (7) ◽  
pp. 600-608 ◽  
Author(s):  
K Pratt ◽  
S Hattman

Deoxyribonucleic acid (DNA) of the transcriptionally active macronucleus of Tetrahymena thermophila is methylated at the N6 position of adenine to produce methyladenine (MeAde); approximately 1 in every 125 adenine residues (0.8 mol%) is methylated. Transcriptionally inert micronuclear DNA is not methylated (< or = 0.01 mol% MeAde; M. A. Gorovsky, S. Hattman, and G. L. Pleger, J. Cell Biol. 56:697-701, 1973). There is no detectable cytosine methylation in macronuclei in Tetrahymena DNA (< or = 0.01 mol% 5-methylcytosine). MeAde-containing DNA sequences in macronuclei are preferentially digested by both staphylococcal nuclease and pancreatic deoxyribonuclease I. In contrast, there is no preferential release of MeAde during digestion of purified DNA. These results indicate that MeAde residues are predominantly located in "linker DNA" and perhaps have a function in transcription. Pulse-chase studies showed that labeled MeAde remains preferentially in linker DNA during subsequent rounds of DNA replication; i.e., there is little, if any, movement of nucleosomes during chromatin replication. This implies that nucleosomes may be phased with respect to DNA sequence.


2019 ◽  
Vol 2019 ◽  
pp. 1-13
Author(s):  
Haidar Raad Shakir

This paper proposes a method of encrypting images with password protection for secure sharing based on deoxyribonucleic acid (DNA) sequence operations and the tangent-delay ellipse reflecting the cavity-map system (TD-ERCS). The initial values of the TD-ERCS system are generated from a user’s password, and the TD-ERCS system is used to scramble the pixel locations of the R, G, and B matrices of the original image. Next, three DNA-sequence matrices are generated by encoding the permuted color image such that it can be transformed into three matrices. Then, the TD-ERCS system is employed to generate three chaotic sequences before encoding the DNA into the three matrices. Thereafter, a DNA exclusive OR (XOR) operation is executed between the DNA sequences of the permuted image and the DNA sequences generated by the TD-ERCS system to produce three encrypted scrambled matrices. Finally, the matrices of the DNA sequences are decoded, and the R, G, and B channels are recombined to form an encrypted color image. The results of simulation and security tests reveal that the proposed algorithm offers robust encryption and demonstrates the ability to resist exhaustive, statistical, and differential attacks.


2015 ◽  
Vol 77 (1) ◽  
Author(s):  
Mohammad Hassan Mudaber ◽  
Yuhani Yusof ◽  
Mohd Sham Mohamad ◽  
Wen Li Lim

The notation of representing restriction enzymes in the form of double-triple in order to formulate Yusof-Goode (Y-G) splicing system was mathematically proposed by Yusof in 2012. The aim of introducing Y-G splicing system was to study the process of recombinant deoxyribonucleic acid or DNA strand in a translucent way. In real situation, when the recombination action occurs, the recombinant DNA strands which will arise often contain the patterns of the restriction enzymes. Persistency and permanency are two properties of splicing system, which show whether the recombinant DNA strands will be split by the existence of restrictions enzymes or not if the reaction goes to the second stage. In this research, the persistency and permanency of two stages splicing languages according to the number of cutting sites of initial strings as well as crossing sites and context factors of splicing rules are investigated. Therefore, a Y-G splicing system consisting of two initial strings (with two cutting sites) and two rules is used to present the above properties of two stages DNA splicing languages.


2019 ◽  
Vol 4 (1) ◽  
pp. 267-278 ◽  
Author(s):  
G. Durán-Meza ◽  
J. López-García ◽  
J.L. del Río-Correa

AbstractIn this work is presented a pedagogical point of view of multifractal analysis deoxyribonucleic acid (DNA) sequences is presented. The DNA sequences are formed by 4 nucleotides (adenine, cytosine, guanine, and tymine). Following Jeffrey’s paper we associated a simple contractive function to each nucleotide, and constructed the Hutchinson’s operator W, which was used to build covers of different sizes of the unitary square Q, thus Wk(Q) is a cover of Q, conformed by 4k squares Qk of size 2−k, as each Qk corresponds to a unique subsequence of nucleotides with length k : b1b2...bk. Besides, it is obtained the optimal cover Ck to the fractal F generated for each DNA sequence was obtained. We made a multifractal decomposition of Ck in terms of the sets Jα conformed by the Qk’s with the same value of the Holder exponent α, and determined f (α), the Hausdorff dimension of Jα, using the curdling theorem.


Author(s):  
Ravinder Paspula ◽  
K. Chiranjeevi ◽  
S. Laxman Kumar

A new-promising technology called DNA-Cryptography is emerged in the area of DNA- Computing field.DNA useful for store, sending the data and also to perform computation. Even it is under primal level, DNA-Based molecular Cryptography system is shows extremely efficient. This technique offers a unique cipher-text generation process and a new key generation practice. This method used to implement a procedure which includes two stages. First stage generates a session key and encryption key and it uses cipher block chaining mode-CBC, the secrete number(s) and incorporate plain-text M into level-1 cipher-text. The last stage converts the level-1 cipher-text into level-2 cipher-text (s). The level-2 cipher-text is again transformed into human made DNA-sequence (S’) and is given to the receiver along with many other DNA-sequence. By this process it will become a more complicated for un-authorized user to gain original information. The receiver will apply the process to identify the human made DNA sequence with M hidden in it and extract the original message M.


1981 ◽  
Vol 1 (7) ◽  
pp. 600-608
Author(s):  
K Pratt ◽  
S Hattman

Deoxyribonucleic acid (DNA) of the transcriptionally active macronucleus of Tetrahymena thermophila is methylated at the N6 position of adenine to produce methyladenine (MeAde); approximately 1 in every 125 adenine residues (0.8 mol%) is methylated. Transcriptionally inert micronuclear DNA is not methylated (< or = 0.01 mol% MeAde; M. A. Gorovsky, S. Hattman, and G. L. Pleger, J. Cell Biol. 56:697-701, 1973). There is no detectable cytosine methylation in macronuclei in Tetrahymena DNA (< or = 0.01 mol% 5-methylcytosine). MeAde-containing DNA sequences in macronuclei are preferentially digested by both staphylococcal nuclease and pancreatic deoxyribonuclease I. In contrast, there is no preferential release of MeAde during digestion of purified DNA. These results indicate that MeAde residues are predominantly located in "linker DNA" and perhaps have a function in transcription. Pulse-chase studies showed that labeled MeAde remains preferentially in linker DNA during subsequent rounds of DNA replication; i.e., there is little, if any, movement of nucleosomes during chromatin replication. This implies that nucleosomes may be phased with respect to DNA sequence.


Author(s):  
Dale E. Bockman ◽  
L. Y. Frank Wu ◽  
Alexander R. Lawton ◽  
Max D. Cooper

B-lymphocytes normally synthesize small amounts of immunoglobulin, some of which is incorporated into the cell membrane where it serves as receptor of antigen. These cells, on contact with specific antigen, proliferate and differentiate to plasma cells which synthesize and secrete large quantities of immunoglobulin. The two stages of differentiation of this cell line (generation of B-lymphocytes and antigen-driven maturation to plasma cells) are clearly separable during ontogeny and in some immune deficiency diseases. The present report describes morphologic aberrations of B-lymphocytes in two diseases in which second stage differentiation is defective.


Author(s):  
Barbara Trask ◽  
Susan Allen ◽  
Anne Bergmann ◽  
Mari Christensen ◽  
Anne Fertitta ◽  
...  

Using fluorescence in situ hybridization (FISH), the positions of DNA sequences can be discretely marked with a fluorescent spot. The efficiency of marking DNA sequences of the size cloned in cosmids is 90-95%, and the fluorescent spots produced after FISH are ≈0.3 μm in diameter. Sites of two sequences can be distinguished using two-color FISH. Different reporter molecules, such as biotin or digoxigenin, are incorporated into DNA sequence probes by nick translation. These reporter molecules are labeled after hybridization with different fluorochromes, e.g., FITC and Texas Red. The development of dual band pass filters (Chromatechnology) allows these fluorochromes to be photographed simultaneously without registration shift.


Sign in / Sign up

Export Citation Format

Share Document