期刊文献+

一种基于DNA序列的数据隐藏方案

A Data Hiding Scheme Based on DNA Sequence
在线阅读 下载PDF
导出
摘要 现有利用DNA序列特殊性质进行数据隐藏的方案,多数存在载体DNA序列长度被改变及修改率较高的缺点。为此,提出一种新的数据隐藏方案。使用核苷酸互补规则及建立在互补规则和秘密比特位数之间的单射关系,利用2个改变的核苷酸间距离比特的位数来表示隐藏的秘密数据。该方案的容量与所隐藏的秘密数据相关,平均容量较高。安全性分析及实验结果表明,该方案未增加载体DNA长度并且具有较低的修改率,可保证接收者所获得DNA序列的质量。与替代法和插入法相比,安全性较高。 The existing data-hiding schemes utilizing the properties of DNA sequences have the disadvantages of expanding the length of the reference DNA and the high modification rate.Aiming at the these roblems,this paper proposes a new DNA hiding scheme based on DNA sequence.It utilizes the complementary rule of nucleotide and designates an injective mapping between the complementary rule and the number of secret bits,and uses the interval of the two changed nucleotides to hide the secret data.The capacity of the proposed scheme is related to the secret data,but the average of the capacity is higher.In the same time,this scheme does not expand the length of the reference DNA sequence,and the modification rate of it is very low.So the proposed scheme allows the receiver to obtain a better quality fake DNA uence.Analysis and experiment result shows that this scheme has higher security compared with substitution method and interpdation method.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第8期110-114,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61401060 61272173) 中央高校基本科研业务费专项基金资助项目(DUT12ZD104 DUT13L K38 DUT12RC(3)80)
关键词 数据隐藏 单射 数据恢复 安全分析 修改率 data hiding injective mapping data recovery security analysis modification rate
作者简介 冯斌(1979-),男,工程师、博士研究生,主研方向:信息安全,信息隐藏 袁琼琼,硕士研究生 郭成,副教授、博士 李明楚,教授、博士 底亚峰,硕士研究生。
  • 相关文献

参考文献11

  • 1Chiang Y L, Chang L P, Hsieh W T, et al. Natural Language Watermarking Using Semantic Substitution for Chinese Text [ C ]//Proceedings of IWDW ' 03. Berlin, Germ any : Springer-Verlag, 2003 : 129-140.
  • 2Wang Zhihui, Chang C C, Lin C C, et al. Reversible Information Hiding Scheme Using Left-right and Up- down Chinese Character Representation [J ].Journal ofSystems and Software ,2009,82 ( 8 ) : 1362-1369.
  • 3黄志强,王美清.基于邻域预测差值直方图平移的可逆信息隐藏[J].计算机工程,2014,40(4):116-119. 被引量:10
  • 4李晓博,周诠.基于图像块像素差的大容量无损信息隐藏算法[J].计算机工程,2012,38(17):102-105. 被引量:4
  • 5Wu Min, Liu B. Data Hiding in Image and Video: Part I Fundamental Issues and Solutions [ J ]. IEEE Transactions on Image Processing, 2003, 12 ( 6 ) : 685- 695.
  • 6Wu Min,Yu Heather,Liu B. Data Hiding in Image and Video: Part II Designs and Applications [ J ]. IEEE Transactions on Image Processing, 2003, 12 ( 6 ) : 696- 705.
  • 7Alberts B. Molecular Biology of the Cell [ J ]. Molecular Biology of the Ce11,1994,156(2) :112-115.
  • 8Peterson I. Hiding in DNA[ J]. Muse,2001,22-32.
  • 9Shimanovsky B, Feng J, Potkonjak M. Hiding Data in DNA[ C ]//Proceedings of the 5th International Work- shop on Information Hiding. Berlin, Germany:Springer- Verlag ,2002:373-386.
  • 10Shiu H J,Ng K L,Fang J F,et al. Data Hiding Methods Based Upon DNA Sequences[J]. Information Sciences, 2010,180(11) :2196-2208.

二级参考文献24

  • 1Barton J M. Method and Apparatus for Embedding Authentication Information within Digital Data[P]. U.S. Patent 5646997, 1997.
  • 2Fridrieh M, Goljan M, Du Rui. lnvertible Authentication Watermark for JPEG lmages[C]//Proc, of International Conference on lnbrmation Technology: Coding and Computing. Las Vegas, USA: [s. n.], 2001:223-227.
  • 3Tian Jun. Reversible Data Embedding Using a Difference Expansion[J]. IEEE Transactions on Circuits Systems for Video Technology, 2003, 13(8): 890-896.
  • 4Alattar A M. Reversible Watermark Using the Difference Expansion of Triplets[C]//Proc. of International Conference on Image Processing. Catalonia, Spain: [s. n.], 2003: 501-504.
  • 5Alattar A M. Reversible Watermarking Using the Difference Expansion of a Generalized lnterger Transform[J]. IEEE Transactions on Image Processing, 2004, 13(8): 1147-1156.
  • 6Ni Zhicheng, Shi Yunqing, Nirwan A, et al. Reversible Data Hiding[J]. IEEE Transactions on Circuits Systems for Video Technology, 2006, 16(3): 354-362.
  • 7Chang Chin-Chen, Tai Wei-Liang, Chen Kuo-Nan. Lossless Data Hiding Based on Histogram Modification for Image Authenti- cation[C]//Proc, of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. [S. 1.]: IEEE Press, 2008: 506-510.
  • 8Lin Chia-Chen, Tai Wei-Liang, Chang Chin-Chen. Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images[J]. Pattern Recognition, 2008, 41(12): 3582- 3591.
  • 9Yang Cheng-Hsing, Tsai Meng-Hsuan, Wu Min-Hao, et al. Side- match Approach for Improving Histogram-based Reversible Data Hiding[C]//Proc. of National Computer Symposium. Taipei, China: Is. n.], 2009.
  • 10Yoo Hyang-Mi, Lee Sang-Kwang, Suh Jae-Won. High Capacity Reversible Data Hiding Using the Histogram Modification of Block Image[C]//Proc. of IEEE International Symposium on Circuits and Systems. IS. 1.]: IEEE Press, 2010: i 137-1140.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部