<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Biannual Journal Monadi for Cyberspace Security (AFTA)</title>
<title_fa>امنیت فضای تولید و تبادل اطلاعات (منادی)</title_fa>
<short_title>منادی</short_title>
<subject>Engineering &amp; Technology</subject>
<web_url>http://monadi.isc.org.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2476-3047</journal_id_issn>
<journal_id_issn_online>2476-3047</journal_id_issn_online>
<journal_id_pii>8</journal_id_pii>
<journal_id_doi>7</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>14</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science>13</journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1404</year>
	<month>12</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2026</year>
	<month>3</month>
	<day>1</day>
</pubdate>
<volume>14</volume>
<number>2</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>روشی نوین در پنهان‌نگاری دی‌ان‌ای با استفاده از تولید جدول تصادفی و قطعه‌بندی</title_fa>
	<title>A novel DNA based steganography algorithm using random table generation with segmentation</title>
	<subject_fa>رمز و امنیت اطلاعات</subject_fa>
	<subject>Cryptology and Information Security</subject>
	<content_type_fa>پژوهشی</content_type_fa>
	<content_type> Research Article</content_type>
	<abstract_fa>&lt;div style=&quot;text-align: justify;&quot;&gt;به &#8204;دلیل محدودیت&#8204;های رسانه&#8204;هایی مانند تصویر، ویدئو و صوت در پنهان&#8204;سازی اطلاعات، پژوهشگران به استفاده از رسانه&#8204;های جایگزین روی آورده&#8204;اند. &amp;nbsp;امروزه دی&#8204;ان&#8204;ای به&#8204;عنوان یکی از رسانه&#8204;های پوششی جهت پنهان&amp;shy;سازی اطلاعات مورد استفاده قرار می&#8204;گیرد. ویژگی&#8204;هایی همچون ظرفیت بالای پنهان&#8204;سازی، ساختارهای غیرقابل پیش&#8204;بینی و نیاز کمتر به توان محاسباتی، آن را از سایر رسانه&#8204;ها متمایز می&#8204;کند. پژوهش&#8204;های متعددی در زمینه استفاده از دی&amp;shy;ان&amp;shy;ای جهت پنهان&#8204;سازی اطلاعات انجام شده&#8204; است؛ برخی از این روش&#8204;ها از خواص بیولوژیکی دی&#8204;ان&#8204;ای جهت پنهان&#8204;سازی استفاده می&amp;shy;کنند. با این حال، بسیاری از روش&#8204;های موجود با چالش&#8204;هایی مانند ظرفیت پایین، بی&#8204;توجهی به ساختار ژنتیکی و استفاده از الگوهای پنهان&#8204;سازی تکراری روبه&#8204;رو هستند؛ مواردی که می&#8204;توانند احتمال شناسایی پیام پنهان را افزایش دهند. در این پژوهش، روشی ارائه شده است که با استفاده از جدول&#8204;های رمزگذاری تصادفی و الگوهای پنهان&#8204;سازی غیرقابل پیش&#8204;بینی، عملکرد بهتری نسبت به روش&#8204;های قبلی فراهم می&amp;shy;کند. این روش ویژگی&#8204;هایی نظیر بار اضافی صفر و استخراج کور (بدون نیاز به داده اصلی) را فراهم می&#8204;کند. همچنین این روش نسبت به روش&#8204;های قبلی عملکرد بیولوژیکی هر دو دنباله را حفظ می&#8204;کند. این روش نسبت به روش&#8204;های ارائه شده، ظرفیت پنهان&amp;shy;سازی بسیار بالا، نرخ تغییر پایین و احتمال شناسایی بسیار پایین را فراهم می&#8204;کند.&lt;/div&gt;</abstract_fa>
	<abstract>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;With the rapid expansion of the Internet and digital communication networks, information security has become a critical concern. Conventional cryptographic techniques, while effective in protecting message content, do not conceal the existence of communication itself. This limitation can expose sensitive exchanges to suspicion, surveillance, or targeted attacks, particularly in political, military, and strategic domains. As a result, steganography&amp;mdash;defined as the science of hiding information within a host medium such that the presence of the hidden message is imperceptible&amp;mdash;has emerged as an important complementary security mechanism. Traditional steganographic media such as images, audio, video, and text, however, suffer from inherent constraints including limited hiding capacity, detectable statistical distortions, and relatively high modification rates.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;In recent years, deoxyribonucleic acid (DNA) has been introduced as a promising alternative steganographic medium. DNA possesses unique properties that make it particularly suitable for information hiding, including extremely high data density, structural complexity, randomness in nucleotide distribution, chemical stability, and minimal computational requirements for encoding and decoding operations. A single gram of DNA can theoretically store hundreds of petabytes of information, far exceeding the capacity of conventional digital media. Moreover, the biological characteristics of DNA allow data hiding techniques that preserve functional integrity, making detection significantly more difficult.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Despite these advantages, many existing DNA-based steganographic approaches suffer from notable limitations. Common shortcomings include low hiding capacity, neglect of biological functionality, reliance on predictable or sequential embedding patterns, and vulnerability to statistical or exhaustive search attacks. Some methods introduce artificial or biologically invalid DNA sequences, increasing the likelihood of detection when multiple transmissions occur. Others rely on simple substitution or fixed encoding tables, which may be exploited by attackers through pattern analysis.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;To address these challenges, this research proposes a novel DNA-based steganographic framework that employs randomly generated encoding tables, unpredictable embedding patterns, and biologically meaningful sequence preservation. The proposed method is designed to achieve several key objectives simultaneously: zero payload, blind extraction, preservation of biological functionality for both DNA sequences involved, high hiding capacity, low modification rate, and an extremely low cracking probability.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;The proposed scheme utilizes two authentic DNA sequences selected from publicly available databases, such as the National Center for Biotechnology Information (NCBI), which hosts more than 163 million real DNA sequences. The first DNA sequence serves as the primary cover medium for embedding the secret message, while the second DNA sequence is used to generate cryptographic keys and convey auxiliary information required for message extraction. Unlike prior work, the second DNA sequence in this method also preserves its biological structure and statistical characteristics, preventing it from appearing as a suspicious or artificial construct.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;At the core of the proposed method are four dynamically shuffled tables: a randomized ASCII table, an 8-bit binary encoding table, a two-layer lookup table, and an intermediate mapping table. Before communication, both sender and receiver securely agree on the initial versions of these tables, as well as the segmentation strategy for both DNA sequences. For each transmission session, the tables are independently and unpredictably shuffled using keys derived directly from segments of the second DNA sequence. This dependency on biological data ensures that the keys are both highly random and sequence-specific.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Key generation is performed by extracting fixed-length DNA segments and computing nucleotide distributions, CpG island locations, and multiple cryptographic hash functions (including SHA-256, SHA-512, SHA3-512, BLAKE2b, and SHAKE-256). These values are combined and further processed to produce a robust, unpredictable seed. The final key material is encoded using Base91 to expand the character set, enabling more complex table permutations. The deterministic nature of the key generation process ensures that the same DNA input will reproduce identical tables at the receiver side, enabling blind extraction.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;The secret message is first converted into binary form using the shuffled ASCII table and then mapped into DNA format via the shuffled 8-bit encoding table. The resulting DNA message is processed in fixed-size blocks and further compressed using the intermediate mapping table, reducing four nucleotides into three while preserving reversibility. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Embedding is performed using a two-layer lookup table that exploits the biological concept of silent mutations. Each three-nucleotide block of the encoded message is mapped to a codon in the cover DNA sequence, which is then replaced with an alternative synonymous codon encoding the same amino acid. This guarantees that the biological functionality of the cover DNA remains unchanged. The cover sequence is divided into four equal segments, and for every embedding round, the placement of message codons across these segments is determined randomly. This randomized distribution significantly reduces the risk of pattern detection.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;In rare cases where a suitable embedding location cannot be found within a segment, that segment is replaced with another authentic DNA fragment from the database, ensuring successful embedding without compromising security. Throughout the embedding process, a list of embedding positions is generated. This list, along with auxiliary mapping information, is encoded into DNA format and appended to the second DNA sequence.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;On the receiver side, the extraction process reverses all steps performed by the sender. The second DNA sequence is first parsed to recover the shuffled tables by regenerating the same keys from the corresponding DNA segments. The embedding position list and intermediate mapping data are then decoded. Using this information, the receiver extracts the modified codons from the first DNA sequence, applies inverse lookup transformations, reconstructs the original DNA-encoded message, converts it back to binary form, and finally retrieves the original plaintext message using the restored ASCII table.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Performance evaluation demonstrates that the proposed method achieves a maximum embedding capacity of up to 8 bits per nucleotide (BPN), which significantly outperforms existing DNA-based steganographic techniques. The modification rate is kept below 3%, substantially lower than the approximately 10% reported in comparable methods. The scheme introduces no payload in the primary DNA sequence, and the minor additions to the second sequence do not meaningfully affect its biological or statistical properties.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Security analysis shows that the brute-force attacks is astronomically low due to the combined effects of massive DNA sequence selection space, large key size, multiple independent shuffled tables, and randomized embedding patterns. The failure probability decreases further as message length increases, making the method particularly robust for larger payloads.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;In conclusion, this research presents a comprehensive and biologically aware DNA steganography framework that overcomes the limitations of prior approaches. By integrating cryptographic randomness with biological principles such as silent mutations and authentic sequence preservation, the proposed method achieves superior capacity, security, and imperceptibility. These characteristics make it a strong candidate for next-generation secure communication systems where stealth and resilience against detection are paramount.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</abstract>
	<keyword_fa>پنهان‌گاری, دی‌ان‌ای, امنیت, الگوهای پنهان‌سازی, تصادفی بودن</keyword_fa>
	<keyword>Steganography, DNA, Security, Hiding patterns, Randomness</keyword>
	<start_page>36</start_page>
	<end_page>51</end_page>
	<web_url>http://monadi.isc.org.ir/browse.php?a_code=A-10-407-18&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name></first_name>
	<middle_name></middle_name>
	<last_name></last_name>
	<suffix></suffix>
	<first_name_fa>محمدعلی</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>طائی‌زاده</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>m.taeizadeh@ec.iut.ac.ir</email>
	<code>10031947532846002164</code>
	<orcid>10031947532846002164</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Software Group, Electrical and Computer Engineering Department, Isfahan University of Technology, Isfahan, Iran</affiliation>
	<affiliation_fa>گروه نرم‌افزار، دانشکده برق و کامپیوتر، دانشگاه صنعتی اصفهان، اصفهان، ایران</affiliation_fa>
	 </author>


	<author>
	<first_name>Masood</first_name>
	<middle_name></middle_name>
	<last_name>Omoomi</last_name>
	<suffix></suffix>
	<first_name_fa>مسعود</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>عمومی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>omoomi@iut.ac.ir</email>
	<code>10031947532846002165</code>
	<orcid>10031947532846002165</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Telecommunications Group, Electrical and Computer Engineering Department, Isfahan University of Technology, Isfahan, Iran</affiliation>
	<affiliation_fa>گروه مخابرات، دانشکده برق و کامپیوتر، دانشگاه صنعتی اصفهان، اصفهان، ایران</affiliation_fa>
	 </author>


	<author>
	<first_name>Jalal</first_name>
	<middle_name></middle_name>
	<last_name>Zahabi</last_name>
	<suffix></suffix>
	<first_name_fa>جلال</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>ذهبی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>zahabi@iut.ac.ir</email>
	<code>10031947532846002166</code>
	<orcid>10031947532846002166</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Telecommunications Group, Electrical and Computer Engineering Department, Isfahan University of Technology, Isfahan, Iran</affiliation>
	<affiliation_fa>گروه مخابرات، دانشکده برق و کامپیوتر، دانشگاه صنعتی اصفهان، اصفهان، ایران</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
