SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3193
Enhanced Security using DNA Cryptography
Aishwarya R U1, Dr. M N Sreerangaraju2
1Student, Electronics and Communication Department
2Professor, Electronics and Communication Department, Bangalore Institute of Technology, V.V Puram,
Bengaluru-560004, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - This paper proposes a secure and
lightweight compressive sensing of stream cipher based
on DNA encoding and decoding method. This method
encrypts text and data generated by image sensors. The
proposed method combines the compressive sensing
technique with DNA encoding and decodin g based
stream cipher to implement the secure compressive
sensing. To have the security objective, the overhead
should be minimal which is achieved by using of stream
cipher for generating the measurement matrix. The
proposed system is implemented using Verilog HDL and
simulated using Modelsim 6.4 c and synthesized using
Xilinx tool.
Key Words: DNA encoding and decoding, compressive
sensing, stream cipher.
1. INTRODUCTION
The continuous rapid progress in the innovation of the
electronicsandtelecommunicationindustryhasspread
throughout leading to sensor-infested smart
infrastructures.Duetothegrowthinsmartsensorsand
other devices the bandwidth for communication and
storage is becoming a scarce resource and moreover
communication of secured and private information
over the channels can raise the possibility of the
security. Therefore security of sensory data is a
challenging concern.
To combat these problems, Cryptographic systems are
being used where theprocessofcryptographyinvolves
processing of plain textinformationusingakeytoform
a cipher text and decrypting the cipher text to get back
the original plain text where third party will not be
having any knowledge of the key being used for
cryptography process.
Compressive Sensing(CS)isanemergingtechnologyin
the signal processing technology for efficiently
acquiring and reconstructing a signal, by finding
solutions to underdetermined linear systems. The
principle on which it is based is through the
optimization of the signal [1]. It is the method of
compressing the signals with the help of fewer
resources.
The compressive sensing uses a measurement matrix
called φ-matrix [3] which is used for compressing the
original signal. This matrix is considered to be the
secret key as it is known only known to the sender and
recipientwhichisusedforencryptingandcompressing
the signals or images.
Stream cipher is a type of symmetric encryption and
decryption algorithm. Stream ciphers are much faster
than any block cipher. The encryption and decryption
of plaintext with a stream cipher willresultinthesame
when the same key is used.
In this paper, we propose a new technique for secure
encryption and decryption by combining both stream
cipher and compressive sensing. Firstly, the paper
discuss about the measurement matrix used for
compressive sensing. Secondly, LFSR method[2]along
with stream cipher is being used to generate the above
matrix. Third, the same stream cipher is used for
performing the encryption process.
2. STREAM CIPHER
Stream ciphers are symmetric-key ciphers. In this
cipher, the plain text is encrypted along with the
corresponding key-stream digit, oneatatimetoobtain
the corresponding one digit cipher text stream. As the
each digitobtainedfromtheencryptiondependsonthe
current state of the cipher, this cipher is also known as
state cipher. The cipher textisobtainedbyXOR-ingthe
individual bit of thekey-streamwiththeinputmessage
bits.
Stream ciphers executes at a faster rate when
compared to block ciphers. These ciphers have lower
hardware complexity. As these ciphers have lower
resource requirements and due to the faster
operations,streamciphersarepreferredaslightweight
cryptographic primitive over block ciphers. The block
diagram of stream cipher encryptionis as showninFig
1.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3194
Fig 1: Stream Cipher Encryption and Decryption
3. COMPRESSIVE SENSING ARCHITECTURE
Compressive Sensing (CS) is a signal processing
technique for effectively acquiring and reconstruction
of signals using fewer resources. The secure
compressive sensing is done by implementation of CS
encoder using the stream cipherbasedφ-matrixwhich
is referred to as CS using Stream Cipher (CSSC).
The proposed architecture of CSSC based on φ-matrix
is as shown in Fig 2. The numbers of adders/
subtractors used are based on accumulators used in
the system. The is subtracted from the previous
accumulator value if (i) =1 otherwise is
added to the previous value. The accumulator is
implemented using only added with input carry and
XOR gates as defined by the Eq. (1).
= + (i) ⊕ + (i) (1)
Firstly, the stream cipher generates the one column of
φ- matrix. Then to the accumulator each input signal
is taken at a time and it subtracts or adds from the
previousaccumulatorvaluedependingontheφ-matrix
elements. This process continues till the completion of
the whole block of the input data being processed.
Fig 2. Proposed Architecture of Compressive Sensing
with Stream Cipher based φ-matrix
To generate a random sequence, stream cipher
requires a secret key. Without the use of same secret
key, the reconstructed data generated from the φ-
matrix will not be same as that of the original data.
Therefore,forthesynchronousstreamciphersamekey
should be used for both encryption and decryption.
4. DNA ENCODING AND DECODING
DNA (Deoxy ribo Nucleic Acid) cryptography is the
process of hiding data in terms of DNA sequence. DNA
has a great cryptographic strength and its binding
properties between its nucleotide bases offer the
possibility of create a self-assembly structures which
are the effective means of executing parallel molecular
computations.
DNA has many properties like vast parallelism,
exceptional energy storage capability. There are four
classes of nucleotides, Adenine, Guanine, andCytosine,
Thymine (A, C, G, and T). These nucleotides are
stranded into polymer chains (DNA strands). DNA is
basically used to store genetic information. This
information cannot be duplicated or copied. The
advantages of DNA computing are: it has faster speed
of computation, minimal storage requirements and
minimal power requirements.
In the proposed system, the usergivesthekeyinputfor
the generation of key to encrypt and decrypt the
information. And then the key is represented using the
DNA bases format using lookup table (Table 1). These
bases representation will become the cipher text. To
decode this cipher text, the eavesdropper must have
access to lookup table and the key which is stored in
the DNA bases, which is more or less impossible. The
cipher text is now secured and can securely transmit
over any channel. At the receiver side, key which is
known to the receiver and along with the lookup table,
the cipher text is decrypted to its original text. The
block diagram for the DNA cryptography process is
shown in Fig 3.
Fig 3: DNA Encoding and Decoding
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3195
5. PROPOSED SYSTEM
The proposed method for secure encryption using the
combinationofstreamcipherandcompressivesensing.
Firstly, the properties of measurement matrix used in
the CS are being studied. Secondly, LFSR-based stream
cipher is used to generate measurement matrix. Third,
we reuse the stream cipher for performing encryption.
Lastly the system is extendedfortheencryptionofdata
using DNA cryptography. The DNA encryption starts
with the message that contains alphabets, numerals
and some special characters. The key which is used for
encryption is being changed to DNA base triplets and
this triplet key is XOR-ed with the input bit to get the
cipher text and is send to the receiver over a public
channel. This cipher text will be the input to the
decryption process which is simply the reverse of
encryption. For the decryption, the same key is used
and with the lookup table, the cipher is decoded and
original data is obtained.
Table 1: Triplet code table for DNA encryption and
Decryption
6. RESULTS AND DISCUSSIONS
The output for the CSSC based φ-matrix is as shown in
the Fig 4. The waveform of input which is used for the
encryption and the corresponding output is shown in
the Fig 4.
Fig 4. Output for CSSC Encryption and Decryption
A specific waveform for the DNA encrypted key will be
generated due to a user DNA key and the following
figure (Fig 5) illustrates the same.
Fig 5. Output for DNA key generation
The output waveform for the DNA Cryptography is as
shown in the Fig 6. Here in this output, the DNA triplet
for each character is shown as per the encoding table
and also the encrypted and decrypted data is also
shown.
Fig 6. Output for DNA Encoding and Decoding
7. CONCLUSION
In this paper, theideaofcompressivesensingofstream
cipher using DNA cryptography for 128-bit text is
proposed. As the LFSR method used for the generation
of stream cipher does not provideconfidentialityofthe
data. Therefore the proposed method of DNA
cryptography provides data security and faster speed
of operation. The applications of our proposedmethod
includes, among others, real-time monitoringsystems,
secure transmission of medical data (like ECG signals,
MR images), traffic videos, environmental monitoring,
Unmanned Arial Vehicles (UAVs) and IoT sensors.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3196
REFERENCES
[1] N. Zhou, A. Zhang, F. Zheng, and L. Gong, “Novel
imagecompression–encryptionhybridalgorithmbased
on key-controlledmeasurementmatrixincompressive
sensing,” Opt. Laser Technol., vol. 62, pp. 152–160, Oct.
2014.
[2] R. Dautov and G. R. Tsouri, “Establishing secure
measurement matrix for compressed sensing using
wireless physical layer security,” in Proc.Int. Conf.
Comput. Netw. Commun. (ICNC), San Diego, CA, USA,
2013, pp. 354–358.
[3] G. Zhang, S. Jiao, X. Xu, and L. Wang, “Compressed
sensing andreconstructionwithBernoullimatrices,”in
Proc. IEEE Int. Conf. Inf. Autom. (ICIA), Harbin, China,
2010, pp. 455–460.

More Related Content

PDF
New Technique Using Multiple Symmetric keys for Multilevel Encryption
PDF
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
PPT
network security
PDF
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
PDF
Co35503507
PPTX
Unit 2
PPTX
Unit 3
PDF
SIMULATION OF THE COMBINED METHOD
New Technique Using Multiple Symmetric keys for Multilevel Encryption
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
network security
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
Co35503507
Unit 2
Unit 3
SIMULATION OF THE COMBINED METHOD

What's hot (19)

PDF
Elgamal signature for content distribution with network coding
PDF
B0210714
PDF
Network coding
PDF
A Location Dependent Cryptographic Approach Based on Target Coordinate & Dist...
PDF
Wireshark tcp - 2110165028
PDF
Wireshark tcp
PDF
Design of arq and hybrid arq protocols for wireless channels using bch codes
PDF
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
PPT
internetworking operation
PDF
Physical layer network coding
PDF
encrption.PDF
PDF
Paper id 2720144
PDF
Wireshark udp solution
DOCX
Source coding systems
PDF
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
PDF
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
PDF
Design and Implementation of an Embedded System for Software Defined Radio
PPT
Client server computing in mobile environments part 2
PDF
Osi model
Elgamal signature for content distribution with network coding
B0210714
Network coding
A Location Dependent Cryptographic Approach Based on Target Coordinate & Dist...
Wireshark tcp - 2110165028
Wireshark tcp
Design of arq and hybrid arq protocols for wireless channels using bch codes
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
internetworking operation
Physical layer network coding
encrption.PDF
Paper id 2720144
Wireshark udp solution
Source coding systems
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
Design and Implementation of an Embedded System for Software Defined Radio
Client server computing in mobile environments part 2
Osi model
Ad

Similar to IRJET- Enhanced Security using DNA Cryptography (20)

PDF
A new DNA Encryption Technique
PDF
Survey of Different DNA Cryptography based Algorithms
PDF
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
PPTX
Data Encryption Technique Based on DNA Cryptography
PDF
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
PDF
Report dna
PDF
A novel image encryption scheme based on DCT transform and DNA sequence
PDF
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
PDF
C010521418
PDF
Hn2513581359
PDF
Hn2513581359
PDF
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
PDF
IRJET- DNA Cryptography
PDF
Dna cryptography
PDF
Secure data transmission using dna encryption
PDF
Double layered dna based cryptography
PDF
Innovative field of cryptography: DNA cryptography
PPT
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
PPTX
DNA based Cryptography_Final_Review
PPTX
Liquid Steganography presentation.pptx
A new DNA Encryption Technique
Survey of Different DNA Cryptography based Algorithms
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
Data Encryption Technique Based on DNA Cryptography
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
Report dna
A novel image encryption scheme based on DCT transform and DNA sequence
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
C010521418
Hn2513581359
Hn2513581359
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
IRJET- DNA Cryptography
Dna cryptography
Secure data transmission using dna encryption
Double layered dna based cryptography
Innovative field of cryptography: DNA cryptography
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
DNA based Cryptography_Final_Review
Liquid Steganography presentation.pptx
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
UNIT 4 Total Quality Management .pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Project quality management in manufacturing
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
CH1 Production IntroductoryConcepts.pptx
DOCX
573137875-Attendance-Management-System-original
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Current and future trends in Computer Vision.pptx
PDF
Well-logging-methods_new................
PPTX
Sustainable Sites - Green Building Construction
PDF
737-MAX_SRG.pdf student reference guides
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
Mechanical Engineering MATERIALS Selection
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
UNIT 4 Total Quality Management .pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Project quality management in manufacturing
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
III.4.1.2_The_Space_Environment.p pdffdf
CH1 Production IntroductoryConcepts.pptx
573137875-Attendance-Management-System-original
Operating System & Kernel Study Guide-1 - converted.pdf
Foundation to blockchain - A guide to Blockchain Tech
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Current and future trends in Computer Vision.pptx
Well-logging-methods_new................
Sustainable Sites - Green Building Construction
737-MAX_SRG.pdf student reference guides
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mechanical Engineering MATERIALS Selection

IRJET- Enhanced Security using DNA Cryptography

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3193 Enhanced Security using DNA Cryptography Aishwarya R U1, Dr. M N Sreerangaraju2 1Student, Electronics and Communication Department 2Professor, Electronics and Communication Department, Bangalore Institute of Technology, V.V Puram, Bengaluru-560004, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - This paper proposes a secure and lightweight compressive sensing of stream cipher based on DNA encoding and decoding method. This method encrypts text and data generated by image sensors. The proposed method combines the compressive sensing technique with DNA encoding and decodin g based stream cipher to implement the secure compressive sensing. To have the security objective, the overhead should be minimal which is achieved by using of stream cipher for generating the measurement matrix. The proposed system is implemented using Verilog HDL and simulated using Modelsim 6.4 c and synthesized using Xilinx tool. Key Words: DNA encoding and decoding, compressive sensing, stream cipher. 1. INTRODUCTION The continuous rapid progress in the innovation of the electronicsandtelecommunicationindustryhasspread throughout leading to sensor-infested smart infrastructures.Duetothegrowthinsmartsensorsand other devices the bandwidth for communication and storage is becoming a scarce resource and moreover communication of secured and private information over the channels can raise the possibility of the security. Therefore security of sensory data is a challenging concern. To combat these problems, Cryptographic systems are being used where theprocessofcryptographyinvolves processing of plain textinformationusingakeytoform a cipher text and decrypting the cipher text to get back the original plain text where third party will not be having any knowledge of the key being used for cryptography process. Compressive Sensing(CS)isanemergingtechnologyin the signal processing technology for efficiently acquiring and reconstructing a signal, by finding solutions to underdetermined linear systems. The principle on which it is based is through the optimization of the signal [1]. It is the method of compressing the signals with the help of fewer resources. The compressive sensing uses a measurement matrix called φ-matrix [3] which is used for compressing the original signal. This matrix is considered to be the secret key as it is known only known to the sender and recipientwhichisusedforencryptingandcompressing the signals or images. Stream cipher is a type of symmetric encryption and decryption algorithm. Stream ciphers are much faster than any block cipher. The encryption and decryption of plaintext with a stream cipher willresultinthesame when the same key is used. In this paper, we propose a new technique for secure encryption and decryption by combining both stream cipher and compressive sensing. Firstly, the paper discuss about the measurement matrix used for compressive sensing. Secondly, LFSR method[2]along with stream cipher is being used to generate the above matrix. Third, the same stream cipher is used for performing the encryption process. 2. STREAM CIPHER Stream ciphers are symmetric-key ciphers. In this cipher, the plain text is encrypted along with the corresponding key-stream digit, oneatatimetoobtain the corresponding one digit cipher text stream. As the each digitobtainedfromtheencryptiondependsonthe current state of the cipher, this cipher is also known as state cipher. The cipher textisobtainedbyXOR-ingthe individual bit of thekey-streamwiththeinputmessage bits. Stream ciphers executes at a faster rate when compared to block ciphers. These ciphers have lower hardware complexity. As these ciphers have lower resource requirements and due to the faster operations,streamciphersarepreferredaslightweight cryptographic primitive over block ciphers. The block diagram of stream cipher encryptionis as showninFig 1.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3194 Fig 1: Stream Cipher Encryption and Decryption 3. COMPRESSIVE SENSING ARCHITECTURE Compressive Sensing (CS) is a signal processing technique for effectively acquiring and reconstruction of signals using fewer resources. The secure compressive sensing is done by implementation of CS encoder using the stream cipherbasedφ-matrixwhich is referred to as CS using Stream Cipher (CSSC). The proposed architecture of CSSC based on φ-matrix is as shown in Fig 2. The numbers of adders/ subtractors used are based on accumulators used in the system. The is subtracted from the previous accumulator value if (i) =1 otherwise is added to the previous value. The accumulator is implemented using only added with input carry and XOR gates as defined by the Eq. (1). = + (i) ⊕ + (i) (1) Firstly, the stream cipher generates the one column of φ- matrix. Then to the accumulator each input signal is taken at a time and it subtracts or adds from the previousaccumulatorvaluedependingontheφ-matrix elements. This process continues till the completion of the whole block of the input data being processed. Fig 2. Proposed Architecture of Compressive Sensing with Stream Cipher based φ-matrix To generate a random sequence, stream cipher requires a secret key. Without the use of same secret key, the reconstructed data generated from the φ- matrix will not be same as that of the original data. Therefore,forthesynchronousstreamciphersamekey should be used for both encryption and decryption. 4. DNA ENCODING AND DECODING DNA (Deoxy ribo Nucleic Acid) cryptography is the process of hiding data in terms of DNA sequence. DNA has a great cryptographic strength and its binding properties between its nucleotide bases offer the possibility of create a self-assembly structures which are the effective means of executing parallel molecular computations. DNA has many properties like vast parallelism, exceptional energy storage capability. There are four classes of nucleotides, Adenine, Guanine, andCytosine, Thymine (A, C, G, and T). These nucleotides are stranded into polymer chains (DNA strands). DNA is basically used to store genetic information. This information cannot be duplicated or copied. The advantages of DNA computing are: it has faster speed of computation, minimal storage requirements and minimal power requirements. In the proposed system, the usergivesthekeyinputfor the generation of key to encrypt and decrypt the information. And then the key is represented using the DNA bases format using lookup table (Table 1). These bases representation will become the cipher text. To decode this cipher text, the eavesdropper must have access to lookup table and the key which is stored in the DNA bases, which is more or less impossible. The cipher text is now secured and can securely transmit over any channel. At the receiver side, key which is known to the receiver and along with the lookup table, the cipher text is decrypted to its original text. The block diagram for the DNA cryptography process is shown in Fig 3. Fig 3: DNA Encoding and Decoding
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3195 5. PROPOSED SYSTEM The proposed method for secure encryption using the combinationofstreamcipherandcompressivesensing. Firstly, the properties of measurement matrix used in the CS are being studied. Secondly, LFSR-based stream cipher is used to generate measurement matrix. Third, we reuse the stream cipher for performing encryption. Lastly the system is extendedfortheencryptionofdata using DNA cryptography. The DNA encryption starts with the message that contains alphabets, numerals and some special characters. The key which is used for encryption is being changed to DNA base triplets and this triplet key is XOR-ed with the input bit to get the cipher text and is send to the receiver over a public channel. This cipher text will be the input to the decryption process which is simply the reverse of encryption. For the decryption, the same key is used and with the lookup table, the cipher is decoded and original data is obtained. Table 1: Triplet code table for DNA encryption and Decryption 6. RESULTS AND DISCUSSIONS The output for the CSSC based φ-matrix is as shown in the Fig 4. The waveform of input which is used for the encryption and the corresponding output is shown in the Fig 4. Fig 4. Output for CSSC Encryption and Decryption A specific waveform for the DNA encrypted key will be generated due to a user DNA key and the following figure (Fig 5) illustrates the same. Fig 5. Output for DNA key generation The output waveform for the DNA Cryptography is as shown in the Fig 6. Here in this output, the DNA triplet for each character is shown as per the encoding table and also the encrypted and decrypted data is also shown. Fig 6. Output for DNA Encoding and Decoding 7. CONCLUSION In this paper, theideaofcompressivesensingofstream cipher using DNA cryptography for 128-bit text is proposed. As the LFSR method used for the generation of stream cipher does not provideconfidentialityofthe data. Therefore the proposed method of DNA cryptography provides data security and faster speed of operation. The applications of our proposedmethod includes, among others, real-time monitoringsystems, secure transmission of medical data (like ECG signals, MR images), traffic videos, environmental monitoring, Unmanned Arial Vehicles (UAVs) and IoT sensors.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3196 REFERENCES [1] N. Zhou, A. Zhang, F. Zheng, and L. Gong, “Novel imagecompression–encryptionhybridalgorithmbased on key-controlledmeasurementmatrixincompressive sensing,” Opt. Laser Technol., vol. 62, pp. 152–160, Oct. 2014. [2] R. Dautov and G. R. Tsouri, “Establishing secure measurement matrix for compressed sensing using wireless physical layer security,” in Proc.Int. Conf. Comput. Netw. Commun. (ICNC), San Diego, CA, USA, 2013, pp. 354–358. [3] G. Zhang, S. Jiao, X. Xu, and L. Wang, “Compressed sensing andreconstructionwithBernoullimatrices,”in Proc. IEEE Int. Conf. Inf. Autom. (ICIA), Harbin, China, 2010, pp. 455–460.