You are on page 1of 8

By Miss. Kavita Dhoot I Semester M.Tech. Under Guidance Of S.

Ardhapukar

Smt. Bhagwati Chaturvedi College of Engineering, Nagpur. Department of Computer Science & Engineering 2012-2013

. Motivation for DNA Steganography !! • As modern encryption keys are broken. the world of information security looks in new directions to protect the data it transmits.Introduction • Steganography-Art or Science of information hiding by embedding message within other. • Safety of encryption methods disappear as computing power and knowledge increases.

DNA Helix-Code Of Life. • Four bases – Guanine (G).. • DNA or deoxyribonucleic acid(DNA). Cytosine (C). • Famous double-helix structure discovered by Watson and Crick . Adenine (A) and Thymine (T) form the genetic alphabet of the DNA . is the hereditary material in humans and almost all other organisms.

• It comprises of concealing a DNA encoded message within a normal piece of Human DNA followed by further concealment of the DNA sample to a microdot. .What is DNA Steganography?? • Carter Bancroft developed DNA based steganography.

DNA Steganography Complex DNA (Fragmented Human DNA) + Secret message DNA DNA Based Steganography Apply to microdot (contain billions of DNA strand) .

performed the analysis. and successfully decoded the secret message.How this method works • Experiments in DNA Steganography have been conducted by Carter Bancroft and his team to encrypt hidden messages within microdots. • The encoded piece of DNA is then placed into a normal piece of human DNA • This microdot difficult to detect on the plain message medium but only one strand of those billions within the microdot contains the message. • A piece of DNA spelling out the message to be hidden is synthetically created which contains the secret encrypted message. . • The recipient recovered the dot.

perfume.. DNA Steganography Application • Authenticate documents (e.g. currency. . • Solid objects (e.g. apparel. and that this technique is thus highly resistant to either computer or any other attacks.Conclusion • Breaking DNA-based steganography represents an “intractable” biochemical problem.. • liquids (e. petroleum).g.. immigration documents). signatures. industrial parts).

duke. “DNA-Based Cryptography”. • Gehani. . Xiaoguang Li.References: References: . Thomas H. Duke University.pdf • J. [Online].edu/~reif/paper/DNAcrypt/crypt. biomolecular steganography design”. Departmentof Computer Science. John H. “A DNA-based. ( 2009 ). Henan Key Lab of Information-based Electrical Appliances.cs. “DNA Computing and its application to Information Security Field”. June 1999. Cuiling Li. Zhengzhou. Available: http://www. Ashish.Journals And Articles • Guangzhao Cui. Haobin Li. (2010). Chen. La Bean. Reif. Circuits and Systems ISCAS apos.