Abstract
Clinical data is the most valuable and sensitive asset about humans. While there are a variety of effective policies, processes, and regulations in place to secure patient information, privacy and security vulnerabilities in electronic health record (EHR) systems remain major concerns. In the domain of communication and digital security, cryptography and steganography techniques are the most commonly used to secure confidential data from unauthorized access. New domains for DNA-based cryptography and steganography are developed to enable data protection using DNA as a cover medium by utilizing its bio-molecular computational features and capacity. In this paper, many DNA-based steganography related studies have been discussed with the basic DNA-based steganography methodologies according to crucial security factors. Furthermore; an approach (Lossless Stego-DNA Compression for Securing Clinical Data), LSDC has been proposed that can improve most of the previous security vulnerabilities and achieving a greater level of security. The approach consists of three stages: DNA steganography, DNA compression, and image or video hiding. It could hide the sensitive clinical data in the DNA sequence without any modification on it. It could achieve a higher level of accuracy and performance on both directions (cipher and decipher). The experimental results showed that LSDC could successfully achieve an acceptable security and compression ratio (from 53.3 to 62%).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fernández-Alemán, J.L., Señor, I.C., Lozoya, P.Á.O., Toval, A.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inform. 46(3), 541–562 (2013)
Gunter, C.A.: Building a smarter health and wellness future: privacy and security challenges. ICTs and the Health Sector: Towards Smarter Health and Wellness Models, pp. 141–157 (2013)
Mellado, D., Fernández-Medina, E., Piattini, M.: Security requirements engineering framework for software product lines. Inform. Softw. Technol. 52(10), 1094–1117 (2010)
Darshni, P., Ghanekar, U.: A hybrid data hiding scheme to enhance the capacity of one-third probability embedding method. In: Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, pp. 269–272, 13–14 February 2015
Hamed, G., Marey, M., El-Sayed, S.A., Tolba, M.F.: Comparative study for various DNA based steganography techniques with the essential conclusions about the future research. In: 2016 11th International Conference on Computer Engineering & Systems (ICCES), Cairo, 2016, pp. 220–225 (2016)
Shi, X., Xintao, W.: An overview of human genetic privacy. Ann. N. Y. Acad. Sci. 1387(1), 61–72 (2017)
Wang, Z., Zhao, X., Wang, H., Cui, G.: Information hiding based on DNA steganography. In: 2013 IEEE 4th International Conference on Software Engineering and Service Science, Beijing, 2013, pp. 946–949 (2013)
Das, P., Deb, S., Kar, N., Bhattacharya, B.: An improved DNA based dual cover steganography. Procedia Comput. Sci. 46, 604–611 (2015)
Marwan, S., Shawish, A., Nagaty, K.: DNA-based cryptographic methods for data hiding in DNA media. Biosystems 150, 110–118 (2016)
Sajisha, K.S., Mathew, S.: An encryption based on DNA cryptography and steganography. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2017, pp. 162–167 (2017)
Vinodhini, R.E., Malathi, P., Kumar, T.G.: A survey on DNA and image steganography. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, 2017, pp. 1–7 (2017)
Mohammed, M.H., Taloba, A.I., Ali, B.H.: DNA-based steganography using neural networks. In: 2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC), Alexandria, Egypt, 2018, pp. 79–82 (2018)
Vijayakumar, P., Vijayalakshmi, V., Rajashree, R.: Increased level of security using DNA steganography. Int. J. Adv. Intell. Paradigms 10, 74–82 (2018)
Biswas, M.R., Alam, K.M.R., Tamura, S., Morimoto, Y.: A technique for DNA cryptography based on dynamic mechanisms. J. ISA 48 (2019)
Yadav, P., Mishra, N., Sharma, S.: A secure video steganography with encryption based on LSB technique. In: Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on, pp.1–5, 26–28 December 2013
Paul, R., Acharya, A.K., Yadav, V.K., Batham, S.: Hiding large amount of data using a new approach of video steganography. In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp.337–343, 26–27 September 2013
Abbas, S.A., et al.: Optimized video steganography using Cuckoo Search algorithm. In: Intelligent Computing and Information Systems (ICICIS), 2015 IEEE Seventh International Conference on IEEE (2015)
Hanna, W.: Improving image steganography using a proposed mutated levy-flight firefly algorithm. Int. J. Comput. Appl. 182, 23–29 (2018)
Hazra, A., Ghosh, S., Jash, S.: A review on DNA based cryptographic techniques. Int. J. Netw. Secur. 20, 1093–1104 (2018)
Vantigaru, S., Basavaraj, R.: Two-layer encryption schemes for symmetric algorithms using DNA sequences. Int. J. Math. Comput. Sci. 14(4), 953–964 (2019)
Khalifa, A.: A blind DNA-steganography approach using ciphering and random sequence splicing. In: 2020 10th International Conference on Information Science and Technology (ICIST), Bath, London, and Plymouth, United Kingdom, 2020, pp. 86–90 (2020)
Dasgupta, K., Mondalb, J.K., Duttac, P.: Optimized video steganography using genetic algorithm (GA). In: International Conference on Computational Intelligence: Modeling, Techniques and Applications (CIMTA), 2013 by Elsevier Ltd., Procedia Technology, pp.131–137 (2013)
Eltahir, M.E., Kiah, L.M., Zaidan, B.B.: High rate video streaming steganography. In: Information Management and Engineering, 2009. ICIME 2009. International Conference on 2009, pp. 550–553 (2009)
Pan African Bioinformatics Network for the Human Heredity and Health in Africa (H3Africa) consortium. https://www.h3abionet.org/
ASCII Code - The extended ASCII table. https://www.ascii-code.com/
National Center of Biotechnology Information. https://www.ncbi.nlm.nih.gov/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Farahat, M.A., Abdo, A., Kassim, S.K. (2021). A Hybrid Approach for Protecting Clinical and Genomic Data Using Lossless Stego-DNA Compression. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Software Engineering Application in Informatics. CoMeSySo 2021. Lecture Notes in Networks and Systems, vol 232. Springer, Cham. https://doi.org/10.1007/978-3-030-90318-3_48
Download citation
DOI: https://doi.org/10.1007/978-3-030-90318-3_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90317-6
Online ISBN: 978-3-030-90318-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)