Article Preview
TopIntroduction
Information security has become an essential aspect of technological advancements, fast internet speeds, and the increasing need for multimedia networks and information technologies. Concealment and encryption are the two most common encryption methods used today (Thanikaiselvan et al., 2017). Because of technological advancements, fast internet speeds, and an increasing need for multimedia networking and information technologies, information security has become vital. Thus, private information on PCs, for example, Visa numbers, email addresses, family photos, clinical records, and monetary data, should be shielded. Many ways to safeguard systems from unauthenticated device threats (outside device attacks) have investigated by Information Technology (IT) companies and researchers (Sohal et al., 2018). Steganography is the study of disguising a basic message inside cover media (like a picture, sound, video, or DNA) so the perpetrator is uninformed of its essence (Saha et al., 2017). On the other hand, cryptography is the art of translating an encoded letter into a nonsensical format that can only be decrypted by the sender and the receiver (Chauhan et al., 2017). Cryptography is not the same as steganography. Everyone can see the message encoded in the encryption, but no one can interpret it except the intended recipient.
Cryptographic approaches typically work on fragile text characters that must be repositioned or replaced with new characters according to a complex scheme organized by a hidden key that both the sender and the receiver known. On the other hand, subtle steganography is hiding the information, but no one will recognize it or even know its existence. However, it can be read (Al-Otaibi & Gutub, 2014) until noticed. The imperceptibility, hiding capacity, and robustness of any steganography technique decide its ultimate effectiveness. The key purpose of concealment is to deter hackers from being accused of transmitting secret messages while still providing authentication and anonymity to legal parties (Mstafa & Elleithy, 2017). Due to the advantages of biotechnology, such as parallel computing, self-assembled DNA (Deoxyribonucleic Acid) standards, and extensive data storage capabilities, biotechnology has been used in many aspects of human life (Liu et al., 2014; Hossain et al., 2016).
DNA Computing is a revolutionary method for protecting data that uses the biological structure of DNA. In 1994, Adleman created it to solve complex issues like the directed Hamilton route problem and NP-complete problems like the Travelling Salesman Problem (TSP). Adleman is also known as the “A” in the RSA method, which has become the de facto standard for industrial-strength encryption of data transferred over the Internet in some circles. For example, in real-time applications like telemedicine, the medical IoT network collects physiological data and then sent to a healthcare big data centre for storage and illness detection (Yang et al., 2019). Various researchers further developed the technology to encrypt data and reduce its storage capacity, making data transfer across the network quicker and more secure. Data can be stored and transmitted via DNA. The idea of employing DNA computing in cryptography and steganography has been recognized as a potential technology that might give unbreakable algorithms a new lease of life. Merits of DNA computing are followed as: 1) Speed- Millions of Instruction per Second (MIPS) measure how much work a computer can do in a second. Adleman (1994) proved that combining DNA strands resulted in comparable to or better computations, possibly over 100 times quicker than the fastest computer. 2) Storage- Whereas traditional storage medium takes cubic nanometers to store 1 bit, DNA stores memory at a density of roughly 1 bit per cubic nanometer. 3) Power- While the calculation is in progress, no power is required for DNA computing. Chemical bonds, which are the building blocks of DNA, are formed without any external energy. The power needs of traditional computers pale in contrast.