JOURNAL OF LIGHT INDUSTRY

CN 41-1437/TS  ISSN 2096-1553

Volume 29 Issue 1
January 2014
Article Contents
ZHANG Xun-cai, HAN Qin-qin, WANG Yan, et al. A data hiding scheme based on RNA secondary structure[J]. Journal of Light Industry, 2014, 29(1): 1-6. doi: 10.3969/j.issn.2095-476X.2014.01.001
Citation: ZHANG Xun-cai, HAN Qin-qin, WANG Yan, et al. A data hiding scheme based on RNA secondary structure[J]. Journal of Light Industry, 2014, 29(1): 1-6. doi: 10.3969/j.issn.2095-476X.2014.01.001 shu

A data hiding scheme based on RNA secondary structure

  • Received Date: 2013-11-15
    Available Online: 2014-01-15
  • Using nucleotide as medium,a new method for data hiding in secondary structure of RNA was proposed to protect the security of secret messages.Firstly the secret message was encoded into a RNA sequence,which was then embedded in reference RNA sequence.With the free energy as constraint condition,the position information could be got by prediction software RNA structure.After receiving the reference sequence and position information,the intended recipient recovered the secret information through prediction software and constraint restoration.The simulation results showed that the data hiding scheme had high stability and security.It could be used in secret communication.
  • 加载中
    1. [1]

      Tseng H W,Hsieh C P.Prediction-based reversible data hiding[J].Information Sciences,2009,179 (14):2460.

    2. [2]

      Chang C C,Wu W C,Chen Y H.Joint coding and embedding techniques for multimedia images[J].Information Sciences,2008,178(18):3543.

    3. [3]

      Huang C H,Wu J L.Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes[J].Information Sciences,2009,179(6):791.

    4. [4]

      Rama K,Thilagam K,Jeevarathinam A,et al.Survey and analysis of 3D steganography[J].International Journal of Engineering Science and Technology (IJEST),201l,3(1):638.

    5. [5]

      Gehani A,LaBean T,Reif J.DNA-based cyrptography [C]//5th DIMACS Workshop on DNA Based Computers,MIT:American Mathematical Society,1999.

    6. [6]

      Clelland C T,Risca V,Bancroft C.Hiding messages in DNA microdots[J].Nature,1999,399(6736):533.

    7. [7]

      卢明欣,傅晓彤,秦磊,等.DNA信息隐藏方法的安全性分析和保密增强方法[J].西安电子科技大学学报:自然科学版,2006,33(3):448.

    8. [8]

      Leier A,Richter C,Banzhaf W,et al.Cryptography with DNA binary strands[J].Biosystems,2000,57(1):13.

    9. [9]

      饶妮妮.一种基于重组DNA技术的密码方案[J].电子学报,2004,32(7):1216.

    10. [10]

      Saeb M,El-Abd E,El-Zanaty M E.On covert data communication channels employing DNA recombinant and mutagenesis-based steganographic techniques[C]//Proceedings of the 2007 Annual International Conference on Computer Engineering and Applications,Wisconsin:World Scientific and Engineering Academy and Society (WSEAS),2007:200-206.

    11. [11]

      Shimanovsky B,Feng J,Potkonjak M.Hiding data in DNA[J].Lecture Notes in Computer Science,2003,2578:373.

    12. [12]

      郑国清,刘九芬,黄达人,等.DNA序列作为信息隐藏载体的研究[J].中山大学学报:自然科学版,2005,44(1):13.

    13. [13]

      Shiu H J,Ng K L,Fang J F,et al.Data hiding methods based upon DNA sequences[J].Information of Science,2010,180(11):2196.

    14. [14]

      Mousa H,Moustafa K,Abdel-Wahed W,et al.Data hiding based on contrast mapping using DNA medium[J].The International Arab Journal of Information Technology,201l,8(2):147.

    15. [15]

      Guo C,Chang C C,Wang Z H.A new hiding scheme based on DNA sequence[J].International Journal of Innovative Computing,2012,8(1):139.

    16. [16]

      Taur J S,Lin H Y,Lee H L,et al.Data hiding in DNA sequences based on table lookup substitution[J].International Journal of Innovative Computing,2012,8(10):6585.

    17. [17]

      高世乐.含假结RNA二级结构图的语法及拓扑分类[D].大连:大连理工大学,2008.

Article Metrics

Article views(861) PDF downloads(30) Cited by()

Ralated
    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return