SlideShare une entreprise Scribd logo
1  sur  10
DNA SECRET WRITING
INTRODUCTION
 Secret writing
 Cryptography
 Steganography
 DNA for data security
CRYPTOGRAPHY
 Cryptography is the practice and study of
techniques for secure communication in the
presence of third parties.
 The conversion of information from a readable
state to apparent nonsense.
 The originator of an encrypted message shared
the decoding technique needed to recover the
original information only with intended
recipients, thereby precluding unwanted persons
to do the same.
STEGANOGRAPHY
 Steganography is the technique of hiding
confidential information within any
media.
 Eg: image, audio etc.
 Steganography is often confused with
cryptography because the two are similar
in the way that
 they both are used to protect confidential
information.
DNA FOR ENCRYPTION
 Deoxyribonucleic acid (DNA) is a long
linear polymer found in the nucleus of a
cell and formed from nucleotides and
shaped likes a double helix, associated
with the transmission of genetic
information.
 DNA can be used in cryptography for
storing and transmitting the information,
as well as for computation
 The message is encoded into DNA sequence, and
is sent along with other DNA sequences.
 The principle of DNA steganography is conceal
the information which needs encryption in the
large numbers of irrelevant DNA sequence
chains.
 DNA sequences can be made by using DNA
synthesiser.
DNA SECRET WRITING TECHNIQUE
ENCRYPTION
Plain text
input
Converted to
ascii
Random DNA
sequence
generated as
OTP
Message
encoded
according to
algorithm
generate a list
of 1500 bases
Find all good
forward and
reverse
primers
Hide the
encrypted
message in
between the
sequence of
primers
Cipher text
DECRYPTION
Cipher text
Extract
the
message
sequence
Identify the
index of
message
Decode the
sequence
message

Contenu connexe

Tendances

To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
AnkitSharma1903
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Ishwar Dayal
 
Physics investigatory project
Physics investigatory projectPhysics investigatory project
Physics investigatory project
Mihika Mahandwan
 

Tendances (20)

Physics Investigatory - Electromagnetic Induction. CLASS XII
Physics Investigatory - Electromagnetic Induction.    CLASS XIIPhysics Investigatory - Electromagnetic Induction.    CLASS XII
Physics Investigatory - Electromagnetic Induction. CLASS XII
 
Transformer(Class 12 Investigatory Project)
Transformer(Class 12 Investigatory Project)Transformer(Class 12 Investigatory Project)
Transformer(Class 12 Investigatory Project)
 
Formation of soap & foaming capacity of soap
Formation of soap & foaming capacity of soapFormation of soap & foaming capacity of soap
Formation of soap & foaming capacity of soap
 
Foaming Capacity of Soap
Foaming Capacity of SoapFoaming Capacity of Soap
Foaming Capacity of Soap
 
Extraction of Essential Oils-INVESTIGATORY PROJECT.pptx
Extraction of Essential Oils-INVESTIGATORY PROJECT.pptxExtraction of Essential Oils-INVESTIGATORY PROJECT.pptx
Extraction of Essential Oils-INVESTIGATORY PROJECT.pptx
 
Step-down transformer Physics project Class 12 CBSE Final
Step-down transformer Physics project Class 12 CBSE FinalStep-down transformer Physics project Class 12 CBSE Final
Step-down transformer Physics project Class 12 CBSE Final
 
Ink Preparation by Rajalakshmi
Ink Preparation by Rajalakshmi Ink Preparation by Rajalakshmi
Ink Preparation by Rajalakshmi
 
Chemistry project Class 12th ( Rate of evaporation of different liquids )
Chemistry project Class 12th ( Rate of evaporation of different liquids )Chemistry project Class 12th ( Rate of evaporation of different liquids )
Chemistry project Class 12th ( Rate of evaporation of different liquids )
 
Wheatstone Bridge
Wheatstone BridgeWheatstone Bridge
Wheatstone Bridge
 
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
 
TO STUDY THE QUANTITY OF CASEIN PRESENT IN DIFFERENT SAMPLES OF MILK
TO STUDY THE QUANTITY OF CASEIN PRESENT IN DIFFERENT SAMPLES OF MILKTO STUDY THE QUANTITY OF CASEIN PRESENT IN DIFFERENT SAMPLES OF MILK
TO STUDY THE QUANTITY OF CASEIN PRESENT IN DIFFERENT SAMPLES OF MILK
 
Physics Investagatory Project
Physics Investagatory ProjectPhysics Investagatory Project
Physics Investagatory Project
 
Chemistry investigatory project for everyone
Chemistry investigatory project for everyoneChemistry investigatory project for everyone
Chemistry investigatory project for everyone
 
Chemistryprojectoncaseininmik 170207030628
Chemistryprojectoncaseininmik 170207030628Chemistryprojectoncaseininmik 170207030628
Chemistryprojectoncaseininmik 170207030628
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Physics investigatory project
Physics investigatory projectPhysics investigatory project
Physics investigatory project
 
CBSE Investigatory Project Of Subject Chemistry- Class 11
CBSE Investigatory Project Of Subject Chemistry- Class 11CBSE Investigatory Project Of Subject Chemistry- Class 11
CBSE Investigatory Project Of Subject Chemistry- Class 11
 
Factors on which the internal resistance/emf of a cell depends
Factors on which the internal resistance/emf of a cell dependsFactors on which the internal resistance/emf of a cell depends
Factors on which the internal resistance/emf of a cell depends
 
chemistry project on detection of caffeine in tea
chemistry project on detection of caffeine in teachemistry project on detection of caffeine in tea
chemistry project on detection of caffeine in tea
 
Biology investigatory project
Biology investigatory projectBiology investigatory project
Biology investigatory project
 

En vedette

DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
Rasheed Karuvally
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
lockyerj
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cards
Somanchi Aditya
 

En vedette (20)

DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...
 
Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 
UWB and applications
UWB and applicationsUWB and applications
UWB and applications
 
DNA Encoding Protocol
DNA Encoding ProtocolDNA Encoding Protocol
DNA Encoding Protocol
 
Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
 
Jonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ GenomeJonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ Genome
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
 
Socket programing
Socket programingSocket programing
Socket programing
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cards
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
 

Similaire à DNA secret writing project first review

Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Michael Belyea
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 

Similaire à DNA secret writing project first review (20)

A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
Literature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic TechniquesLiterature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic Techniques
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
 
319 325
319 325319 325
319 325
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
Steganography
SteganographySteganography
Steganography
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
 
C010521418
C010521418C010521418
C010521418
 

Dernier

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

DNA secret writing project first review

  • 2.
  • 3. INTRODUCTION  Secret writing  Cryptography  Steganography  DNA for data security
  • 4. CRYPTOGRAPHY  Cryptography is the practice and study of techniques for secure communication in the presence of third parties.  The conversion of information from a readable state to apparent nonsense.  The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons to do the same.
  • 5. STEGANOGRAPHY  Steganography is the technique of hiding confidential information within any media.  Eg: image, audio etc.  Steganography is often confused with cryptography because the two are similar in the way that  they both are used to protect confidential information.
  • 6. DNA FOR ENCRYPTION  Deoxyribonucleic acid (DNA) is a long linear polymer found in the nucleus of a cell and formed from nucleotides and shaped likes a double helix, associated with the transmission of genetic information.  DNA can be used in cryptography for storing and transmitting the information, as well as for computation
  • 7.  The message is encoded into DNA sequence, and is sent along with other DNA sequences.  The principle of DNA steganography is conceal the information which needs encryption in the large numbers of irrelevant DNA sequence chains.  DNA sequences can be made by using DNA synthesiser.
  • 8. DNA SECRET WRITING TECHNIQUE
  • 9. ENCRYPTION Plain text input Converted to ascii Random DNA sequence generated as OTP Message encoded according to algorithm generate a list of 1500 bases Find all good forward and reverse primers Hide the encrypted message in between the sequence of primers Cipher text