Volume 14 , Issue 2 , PP: 08-17, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Anfal Emad Lafta 1 * , Sahar Adil Kadhum 2
Doi: https://doi.org/10.54216/JCIM.140201
The health information data includes reports on the patient’s condition, including addresses, names, tests, treatments, diagnoses, and medical history. It is sensitive information for patients, and all means of protection must be provided to prevent third parties from manipulation or fraudulent use. It has been discovered that DNA is now a reliable and efficient biological media for securing data. Data encryption is made possible by DNA's bimolecular computing powers. In this paper proposed a new strategy of safeguard the transfer of sensitive data over an unsecured network using cryptography with non-liner function, and DNA lossless compression to enhance security. The work gains best results in compression processes, as percentages range 75%. for character compression, the different rate ranges between 91% to 94%, and the compression rate ranges from 35% to 37%. the retrieving data with an accuracy rate up to 100% without any data loss, as well as excellent percentages within the, Compression Ratio, Compression Factor, Error Rate, Accuracy measures.
NCBI , DNA , Cryptography , Clinical data privacy , DNA compression
[1] Priyanka, & Singh, A. K. (2023). A survey of image encryption for healthcare applications. Evolutionary Intelligence, 16(3), 801-818.
[2] Almeida, B. D. A., Doneda, D., Ichihara, M. Y., Barral-Netto, M., Matta, G. C., Rabello, E. T., ... & Barreto, M. (2020). Personal data usage and privacy considerations in the COVID-19 global pandemic. Ciencia & saude coletiva, 25, 2487-2492.
[3] Noor, N. S., Hammood, D. A., Al-Naji, A., & Chahl, J. (2022). A fast text-to-image encryption-decryption algorithm for secure network communication. Computers, 11(3), 39.
[4] Naji, M. A., Atee, H. A., Jebur, R. S., Hammood, D. A., Der, C. S., Abosinnee, A. S., ... & Ahmad, R. B. (2021, September). Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms. In 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) (pp. 47-53). IEEE.
[5] Dagadu, J. C., Li, J. P., & Aboagye, E. O. (2019). Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Personal Communications, 108, 591-612.
[6] Dey, S., & Ghosh, R. (2018). A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes. Cryptology ePrint Archive.
[7] Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., Eghan, J. M., & Quaynor, N. N. (2015). A cryptographic technique for security of medical images in health information systems. Procedia Computer Science, 58, 538-543.
[8] Nayak, Padmalaya, and G. Swapna. "Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview." Internet of Things 21 (2023): 100641.
[9] Shawkat, Shihab A., Najiba Tagougui, and Monji Kherallah. "Information Security: A Review on Steganography with Cryptography for Genetic Algorithm (GA) Transaction." In 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), pp. 1-7. IEEE, 2023.
[10] Zhang, Bowen, and Lingfeng Liu. "Chaos-based image encryption: Review, application, and challenges." Mathematics 11, no. 11 (2023): 2585.
[11] Nassra, Ihab, and Juan V. Capella. "Data compression techniques in IoT-enabled wireless body sensor networks: A systematic literature review and research trends for QoS improvement." Internet of Things (2023): 100806.
[12] Wang, Jiaqi, and Bo Ou. "Video reversible data hiding: A systematic review." Journal of Visual Communication and Image Representation (2023): 104029.
[13] Ghiasi, Mohammad, Taher Niknam, Zhanle Wang, Mehran Mehrandezh, Moslem Dehghani, and Noradin Ghadimi. "A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future." Electric Power Systems Research 215 (2023): 108975.
[14] Wu, X., Wang, K., Wang, X., & Kan, H. (2017). Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dynamics, 90, 855-875.
[15] Bartwal, M., & Bharti, R. (2017). Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography. In Rice (pp. 127-134).
[16] Lee, S. J., Cho, G. Y., Ikeno, F., & Lee, T. R. (2018). BAQALC: Blockchain applied lossless efficient transmission of DNA sequencing data for next-generation medical informatics. applied sciences, 8(9), 1471.
[17] Pratas, D., Hosseini, M., Silva, J. M., & Pinho, A. J. (2019). A reference-free lossless compression algorithm for DNA sequences using a competitive prediction of two classes of weighted models. Entropy, 21(11), 1074.
[18] Mansouri, D., Yuan, X., & Saidani, A. (2020). A new lossless DNA compression algorithm based on a single-block encoding scheme. Algorithms, 13(4), 99.
[19] Partee, J., Hazell, R., Solsi, A., & Santerre, J. (2020). Compressed DNA Representation for Efficient AMR Classification. SMU Data Science Review, 3(2), 5.
[20] Hossein, S. M. (2022). Substitution based DNA Sequences Compression-Encryption Method.
[21] Elnady, S., Sayed, S., & Salah, A. (2022). HADC: A Hybrid Compression Approach for DNA Sequences. IEEE Access, 10, 106841-106848.
[22] Niu, Y., Ma, M., Li, F., Liu, X., & Shi, G. (2022). ACO: lossless quality score compression based on adaptive coding order. BMC bioinformatics, 23(1), 219.
[23] Varshney, Ankit, K. Suneetha, and Dhananjay Kumar Yadav. "Analyzing the Performance of Different Compactor Techniques in Data Compression & Source Coding." In 2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC), pp. 1-6. IEEE, 2024.
[24] Sebai, Dorsaf, Manel Zouaoui, and Faouzi Ghorbel. "Seismic data compression: an overview." Multimedia Systems 30, no. 1 (2024): 38.
[25] Tang, Yehui, Yunhe Wang, Jianyuan Guo, Zhijun Tu, Kai Han, Hailin Hu, and Dacheng Tao. "A Survey on Transformer Compression." arXiv preprint arXiv:2402.05964 (2024).
[26] Horsman, Graeme. "Sources of error in digital forensics." Forensic Science International: Digital Investigation 48 (2024): 301693.
[27] Sheikh, Md Rasel, and Paulin Coulibaly. "Review of Recent Developments in Hydrologic Forecast Merging Techniques." Water 16, no. 2 (2024): 301.