Skip to main content

A Hybrid Approach for Protecting Clinical and Genomic Data Using Lossless Stego-DNA Compression

  • Conference paper
  • First Online:
Software Engineering Application in Informatics (CoMeSySo 2021)

Abstract

Clinical data is the most valuable and sensitive asset about humans. While there are a variety of effective policies, processes, and regulations in place to secure patient information, privacy and security vulnerabilities in electronic health record (EHR) systems remain major concerns. In the domain of communication and digital security, cryptography and steganography techniques are the most commonly used to secure confidential data from unauthorized access. New domains for DNA-based cryptography and steganography are developed to enable data protection using DNA as a cover medium by utilizing its bio-molecular computational features and capacity. In this paper, many DNA-based steganography related studies have been discussed with the basic DNA-based steganography methodologies according to crucial security factors. Furthermore; an approach (Lossless Stego-DNA Compression for Securing Clinical Data), LSDC has been proposed that can improve most of the previous security vulnerabilities and achieving a greater level of security. The approach consists of three stages: DNA steganography, DNA compression, and image or video hiding. It could hide the sensitive clinical data in the DNA sequence without any modification on it. It could achieve a higher level of accuracy and performance on both directions (cipher and decipher). The experimental results showed that LSDC could successfully achieve an acceptable security and compression ratio (from 53.3 to 62%).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fernández-Alemán, J.L., Señor, I.C., Lozoya, P.Á.O., Toval, A.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inform. 46(3), 541–562 (2013)

    Article  Google Scholar 

  2. Gunter, C.A.: Building a smarter health and wellness future: privacy and security challenges. ICTs and the Health Sector: Towards Smarter Health and Wellness Models, pp. 141–157 (2013)

    Google Scholar 

  3. Mellado, D., Fernández-Medina, E., Piattini, M.: Security requirements engineering framework for software product lines. Inform. Softw. Technol. 52(10), 1094–1117 (2010)

    Google Scholar 

  4. Darshni, P., Ghanekar, U.: A hybrid data hiding scheme to enhance the capacity of one-third probability embedding method. In: Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, pp. 269–272, 13–14 February 2015

    Google Scholar 

  5. Hamed, G., Marey, M., El-Sayed, S.A., Tolba, M.F.: Comparative study for various DNA based steganography techniques with the essential conclusions about the future research. In: 2016 11th International Conference on Computer Engineering & Systems (ICCES), Cairo, 2016, pp. 220–225 (2016)

    Google Scholar 

  6. Shi, X., Xintao, W.: An overview of human genetic privacy. Ann. N. Y. Acad. Sci. 1387(1), 61–72 (2017)

    Article  Google Scholar 

  7. Wang, Z., Zhao, X., Wang, H., Cui, G.: Information hiding based on DNA steganography. In: 2013 IEEE 4th International Conference on Software Engineering and Service Science, Beijing, 2013, pp. 946–949 (2013)

    Google Scholar 

  8. Das, P., Deb, S., Kar, N., Bhattacharya, B.: An improved DNA based dual cover steganography. Procedia Comput. Sci. 46, 604–611 (2015)

    Article  Google Scholar 

  9. Marwan, S., Shawish, A., Nagaty, K.: DNA-based cryptographic methods for data hiding in DNA media. Biosystems 150, 110–118 (2016)

    Article  Google Scholar 

  10. Sajisha, K.S., Mathew, S.: An encryption based on DNA cryptography and steganography. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2017, pp. 162–167 (2017)

    Google Scholar 

  11. Vinodhini, R.E., Malathi, P., Kumar, T.G.: A survey on DNA and image steganography. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, 2017, pp. 1–7 (2017)

    Google Scholar 

  12. Mohammed, M.H., Taloba, A.I., Ali, B.H.: DNA-based steganography using neural networks. In: 2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC), Alexandria, Egypt, 2018, pp. 79–82 (2018)

    Google Scholar 

  13. Vijayakumar, P., Vijayalakshmi, V., Rajashree, R.: Increased level of security using DNA steganography. Int. J. Adv. Intell. Paradigms 10, 74–82 (2018)

    Article  Google Scholar 

  14. Biswas, M.R., Alam, K.M.R., Tamura, S., Morimoto, Y.: A technique for DNA cryptography based on dynamic mechanisms. J. ISA 48 (2019)

    Google Scholar 

  15. Yadav, P., Mishra, N., Sharma, S.: A secure video steganography with encryption based on LSB technique. In: Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on, pp.1–5, 26–28 December 2013

    Google Scholar 

  16. Paul, R., Acharya, A.K., Yadav, V.K., Batham, S.: Hiding large amount of data using a new approach of video steganography. In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp.337–343, 26–27 September 2013

    Google Scholar 

  17. Abbas, S.A., et al.: Optimized video steganography using Cuckoo Search algorithm. In: Intelligent Computing and Information Systems (ICICIS), 2015 IEEE Seventh International Conference on IEEE (2015)

    Google Scholar 

  18. Hanna, W.: Improving image steganography using a proposed mutated levy-flight firefly algorithm. Int. J. Comput. Appl. 182, 23–29 (2018)

    Google Scholar 

  19. Hazra, A., Ghosh, S., Jash, S.: A review on DNA based cryptographic techniques. Int. J. Netw. Secur. 20, 1093–1104 (2018)

    Google Scholar 

  20. Vantigaru, S., Basavaraj, R.: Two-layer encryption schemes for symmetric algorithms using DNA sequences. Int. J. Math. Comput. Sci. 14(4), 953–964 (2019)

    Google Scholar 

  21. Khalifa, A.: A blind DNA-steganography approach using ciphering and random sequence splicing. In: 2020 10th International Conference on Information Science and Technology (ICIST), Bath, London, and Plymouth, United Kingdom, 2020, pp. 86–90 (2020)

    Google Scholar 

  22. Dasgupta, K., Mondalb, J.K., Duttac, P.: Optimized video steganography using genetic algorithm (GA). In: International Conference on Computational Intelligence: Modeling, Techniques and Applications (CIMTA), 2013 by Elsevier Ltd., Procedia Technology, pp.131–137 (2013)

    Google Scholar 

  23. Eltahir, M.E., Kiah, L.M., Zaidan, B.B.: High rate video streaming steganography. In: Information Management and Engineering, 2009. ICIME 2009. International Conference on 2009, pp. 550–553 (2009)

    Google Scholar 

  24. Pan African Bioinformatics Network for the Human Heredity and Health in Africa (H3Africa) consortium. https://www.h3abionet.org/

  25. ASCII Code - The extended ASCII table. https://www.ascii-code.com/

  26. National Center of Biotechnology Information. https://www.ncbi.nlm.nih.gov/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Farahat, M.A., Abdo, A., Kassim, S.K. (2021). A Hybrid Approach for Protecting Clinical and Genomic Data Using Lossless Stego-DNA Compression. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Software Engineering Application in Informatics. CoMeSySo 2021. Lecture Notes in Networks and Systems, vol 232. Springer, Cham. https://doi.org/10.1007/978-3-030-90318-3_48

Download citation

Publish with us

Policies and ethics