An Innovative DNA Cryptography Technique
An Innovative DNA Cryptography Technique
3, 2016
Reference to this paper should be made as follows: Paul, S., Anwar, T. and
Kumar, A. (2016) ‘An innovative DNA cryptography technique for secure data
transmission’, Int. J. Bioinformatics Research and Applications, Vol. 12, No. 3,
pp.238–262.
Biographical notes: Sanchita Paul is an Assistant Professor in the Department of
Computer Science & Engineering, Birla Institute of Technology, Mesra, Ranchi
(India). She holds the BE, ME and PhD degrees in Computer Science and
Engineering. Her area of interest is artificial intelligence, cloud computing,
bioinformatics, NLP, automata theory, design and analysis of algorithms and
big data.
Tausif Anwar is currently working as a Software Developer in CapitalVia
Global Research Limited, since August 2015. He obtained his ME degree
1 Introduction
and guanine ‘G’ (Cui, 2008). A combination of these nucleotides stores information
present in all living organisms. The cipher text is completely different from plain text and
is not easily detectable by intruders.
In this paper, a new DNA cryptography technique is proposed using Symmetric Key
Exchange, OTP scheme and DNA hybridisation to minimise time complexity. XOR
operation with OTP DNA sequence is used as the encryption technique. Symmetric Key
Exchange presents a secure key generation scheme. This method is very efficient in
encrypting, transmitting and preventing powerful attacks. The proposed algorithm is
simulated in Java 8.1, NetBeans 8.1, Apache Tomcat, GlashFish Server 4.1 and Struts
MVC architecture framework. This has been developed in a web-based environment and
mobile application platform using struts MVC architecture. It is quite interesting to
simulate the proposed algorithm in order to analyse the results. The analysis of the result
becomes even more interesting when the proposed algorithm is compared with other
existing algorithm like those presented in Pramanik and Setua (2004) and Kaundal
(2014). The proposed algorithm gives better results with respect to providing different
input sizes and delay times as compared to other algorithms.
2 Literature review
In 2003, Chen proposed DNA cryptographic algorithm on carbon nano-tube and DNA-
based systems. DNA-based cryptosystems are used to convert messages into segments.
OTP is used as a code book to convert plain text into cipher text. Code book should be
random and unique. Jie Chen presented DNA encryption and decryption images of
biomolecular methods based on the proposed algorithm.
Pramanik and Setua (2004) presented cryptography methodologies using DNA
hybridisation and DNA digital coding using OTP, which minimises time complexity.
DNA technologies require huge computing time, high computational complexity and are
extensively laboratory dependent. The researchers used a parallel technique to decrypt
the message in less time.
Tanaka et al. (2005) presented a cryptographic algorithm based on public key. This
is helpful for encryption and decryption techniques. After generating a public key,
messages are encoded in DNA sequence. They used the immobilisation process and PCR
amplification to decode the conceded DNA sequence.
Amin et al. (2006) used the symmetric key algorithm in DNA cryptographic approach,
where keys estimated in DNA sequences are obtained from genomes and stored as large
DNA sequences in a compact space. The DNA cryptographic approach has great storing
capabilities compared to other conventional cryptography algorithms. In this paper, the
author has described a symmetric DNA-based cipher approach and effective scalability
for large digital information products.
Cui et al. (2008) proposed the encryption scheme using DNA coding, PCR
amplification and DNA synthesis. The PCR amplification having two primers pair was
used as key and this is not designed by the sender or receiver. This encryption algorithm
is used for increased security purpose. Using this method, we can get different cipher text
as PCR primers, which can prevent attacks from intruders. This encryption scheme
shows high confidentiality strength.
Lai and Zhang (2008) explained a novel key generation scheme based on DNA
cryptographic approach. It uses matrix operations to increase computational speed.
They generated a key expansion matrix M and generated an encryption between two keys
An innovative DNA cryptography technique for secure data transmission 241
using XOR operations. In this paper, the DNA sequence was used as a randomised
database, thereby reducing the computation time and influence of matrix operation on the
computed speed.
Wang and Zhang (2009) applied cryptography approach in many fields and solved
many hard problems. The authors applied a new technique to work cryptography with
DNA computing and connect the RSA algorithm with DNA computing to encrypt message
efficiently. DNA computing is a method to solve some hard problems and compute faster
as compared to an electronic computer. This paper introduced a new encryption
algorithm combined with the RSA algorithm. DNA computing and model cannot be used
in laboratory, but this method of parallel computing is a new method of computation.
Lai (2010) proposed DNA sequence as an asymmetric encryption and signature method
wherein DNA technology matrix is obtained for encoding the image. In this DNA sequence,
matrix is divided into blocks and addition operation is performed between blocks. In this
paper, the original image was scrambled by addition and complement operation, which
provided a large secret key space, and this secret key of encryption algorithm is highly
sensitive. This algorithm can resist exhaustive attack, statistical attack and differential attack.
Borda and Tornea (2010) presented DNA secret writing technique wherein the principles
of bio molecular computation and several algorithms for DNA steganography and
cryptography such as One-Time-Pad and DNA chromosomes indexing have been discussed.
Kumar and Singh (2011) presented a technique of secret data writing using DNA
sequence. They focused on DNA computing, DNA sequence, which have large storage
capacity and extraordinary information density. The authors presented encryption and
decryption algorithms based on the OTP technique through which one can secure data in
DNA sequence. Steganography was used in this paper to hide messages in double-strand
DNA sequence microdots. The authors designed a data-hiding algorithm by using DNA
sequence and traditional cryptography. This algorithm is easy to use and efficient.
Wang and Yu (2011) proposed an Index-based DNA encryption algorithm. They used
Block cipher and Index of strings for encrypting messages into DNA sequences, which
are sent to the receiver by a secure communication medium. First, the message is converted
into the ASCII code and then into a binary code, which is further converted into DNA
sequence. DNA sequence searches in the key sequence and writes in the index number.
Zhang et al. (2012) proposed a DNA cryptography based on DNA fragment assembly.
They mentioned features of DNA molecular, key biotechnologies, DNA digital coding
and related software. Using the DNA digital coding and DNA fragmentation, the authors
designed a symmetric system algorithm, which converted plain text into a binary ASCII
code and then into DNA sequences.
Tornea and Borda (2013) proposed message encryption using DNA sequences. They
described data hiding based on DNA sequences. A DNA sequence-based data encryption
algorithm fulfils the current information security needs. In this paper, an algorithm using
DNA sequences for data hiding is proposed and discussed for secure data transmission
and reception.
Mandge and Choudhary (2013) presented a new field of cryptography based on
DNA computing due to high storage capacity, vast parallelism and exceptional energy
efficiency of biological DNA. Here, a DNA encryption technique based on matrix
manipulation and secure key generation scheme has been discussed.
Kaundal (2014) proposed a Feistel-inspired structure for DNA cryptography. They
conclude with a Feistel-inspired structure for DNA cryptography using OTP for key
generation, which achieves a better encryption (confidentiality) although at the cost of
increased encryption and decryption time (Table 1).
242 S. Paul, T. Anwar and A. Kumar
Types of DNA
Explanation
technologies
DNA biomolecular stores genetic instruction as DNA sequence.
1. DNA DNA biomolecular structure has three-dimensional shapes which are
biomolecular formed by protein, DNA and RNA.
Bio molecular structure decomposed into primary structure, secondary
structure, tertiary structure, quaternary structure.
OTP is randomly generated key which is used only one time for
encryption and it changes every time.
2. One Time
Size of key is greater than or equal to plaintext message. Key should be
Pad (OTP)
defined uniquely and kept secret.
OTP technique makes it difficult to guess the right key.
DNA chip technology is defined independently in biological sample.
DNA chip technology support by the method of micro-printing using
3. DNA chip large number of DNA probes and then hybridization with labelled
technology sample and obtained genetic information.
DNA chip is also known as Gene chips, DNA array and oligonucleotide
array.
DNA fragmentation is essential to library construction for DNA
4. DNA sequence.
fragmentations
DNA fragmentation is used to split DNA sequence into small pieces.
PCR is defined as enzymatic replication and DNA fragment.
5. Polymerase
PCR is a molecular biology technique to amplify several copies of DNA
Chain Reaction
up to order of magnitude of particular DNA.
(PCR)
PCR is used to amplify a specific region of DNA strand.
The DNA coding method is a procedure for conversion of plain text into the ASCII code
and subsequent conversion of the ASCII code into a DNA sequence (Tables 2 and 3).
Table 2 DNA sequence to binary conversion
Receiver decrypts the cipher text into plain text using DNA key sequence:
Receiver D Cdna , K dna P
START
K = K1 = K2
STOP
246 S. Paul, T. Anwar and A. Kumar
Start
Take
Binaryany
form
random
of DNA
DNA sequence
sequence= length
which of
is
Form the
Right shiftmirror
columns
matrix
of matrix
of the to
above
form mirror equal to the length of binary plain text,
plain text.
image matrix.
generated matrix. converts into binary form and arranges it in a
m*n matrix
Cipher text
Stop
An innovative DNA cryptography technique for secure data transmission 247
Start
Cipher text
Find complement
Complement it. of k bits
Find theDNA sequence
corresponding
sequence
and attach from
last bitOTP DNArepeat
position, sequence and
the same
attach the last position bit.
for subsequent k bits DNA sequence.
Convert
Take OTP
same DNA DNA
random sequence to its binary
sequence, used
Arrange the obtained binary sequences
form
previously in encryption algorithm, covert
column wise in 4*4
m*nmatrixes
matrixesAB.
AB.
it to binary form and arrange in m*n matrix
i i
Formshift
Left a mirror
column
image
of matrix
of A’ is
A’matrix
to from
A.
matrix A.
Stop
248 S. Paul, T. Anwar and A. Kumar
4 Illustration 1
S E
Now, the length of plain text ‘SE’ is 16 bits. Suppose we take prime numbers g = 5,
n = 11 and sender takes any value, i.e. x = 3 and receiver takes y = 4.
a Calculate R = (g*x) mod n and S = (g*y) mod n.
R = (5*3) mod 11 = 4 and
S = (5*4) mod 11 = 9
Sender sends the value of R to receiver and receiver sends the value of S to sender.
b Sender computes secret key K1 = (S*x) mod n = (9*3) mod 11 = 5.
c Receiver computes secret key K2 = (R*y) mod n = (4*4) mod 11 = 5.
d Finally, we get the value of K, K = K1 = K2 = 5 [Symmetric key].
Now the length of DNA sequences become (16*5) = 80.
Generate randomly length of 80 DNA sequences:
CGTAC TAAGG GCGTA CCTTT AAAGC ATCGG AACCC GTACG GGCGT AATTG
GGATT CGGTA CGCCA AATTC GACCG TAGGC. (There are 16 nucleotides and
each is of length 5)
Generate OTP DNA sequence:
1 Reversely placed nucleotide. Ex: TAGGC. GACCG AATTC CGCCA CGGTA
GGATT AATTG GGCGT GTACG AACCC ATCGG AAAGC CCTTT GCGTA
TAAGG CGTAC.
2 Take complement of above nucleotides. Ex: ATCCG CTGGC TTAAG GCGGT
GCCAT CCTAA TTAAC GCGCA CATGC TTGGG TAGCC TTTCG GGAAA
CGCAT ATTCC GCATG.
3 Consider it at positions 0, 1, 2, 3, 4, …, 15 and add A with the first nucleotide, C
with the second, G with the third, T with the fourth, again A with the fifth and so
on. Ex: ATCCGA CTGGCC TTAAGG GCGGTT GCCATA CCTAAC TTAACG
GCGCAT CATGCA TTGGGC TAGCCG TTTCGT GGAAAA CGCATC ATTCCG
GCATGT.
Step 1: Arrange binary plain text bit-wise and column-wise from left to right in
4*4 (m = 4 and n = 4) matrix say Z.
0 0 0 0
1 0 1 1
0 1 0 0
1 1 0 1
0 0 0 0
1 1 0 1
0 0 1 0
1 0 1 1
Step 3: Take randomly any DNA sequence which is equal to the length of
binary plain text and arrange it column-wise in a 4*4 (m = 4 and n = 4) matrix,
say N. Ex: DNA sequences are CGATTAAG and its binary numbers are
0110001111000010.
0 0 1 0
1 0 1 0
1 1 0 1
0 1 0 0
Step 4: Apply XOR operation between matrices M and N to get new matrix say
MN.
0 0 1 0
0 1 1 1
1 1 1 1
1 1 1 1
b Arrange elements of matrix column-wise from left to right in a row; the result will be
(0011011111110111). Start scanning the binary sequence from left to right to find
the occurrences of 1s. Once a ‘1’ is found, get its position (0, 1, 2, 3, …, 15) from
the OTP DNA key sequence and get the corresponding DNA sequence from the
generated OTP DNA sequence. The result will be given below.
DNA sequences: TTAAGG GCGGTT CCTAAC TTAACG GCGCAT CATGCA
TTGGGC TAGCCG TTTCGT CGCATC ATTCCG GCATGT.
c Replace the last attached DNA sequence and find the complement of the remaining
DNA sequences. The final result will be: AATTC CGCCA GGATT AATTG
CGCGT GTACG AACCC ATCGG AAAGC GCGTA TAAGG CGTAC. This is
our cipher text.
250 S. Paul, T. Anwar and A. Kumar
0 0 1 0
0 1 1 1
1 1 1 1
1 1 1 1
Step 2: Take the same DNA sequences CGATTAAG to its binary form, i.e.
0110001111000010, and arrange column-wise in a 4*4 matrix, say N.
0 0 1 0
1 0 1 0
1 1 0 1
0 1 0 0
0 0 0 0
1 1 0 1
0 0 1 0
1 0 1 1
0 0 0 0
1 0 1 1
0 1 0 0
1 1 0 1
5 Illustration 2
S E A
Now the length of the DNA key sequences becomes (24*5) = 120.
Generate key DNA sequences of length 120: CGTAC TAAGG GCGTA CCTTT AAAGC
ATCGG AACCC GTACG GGCGT AATTG GGATT CGGTA CGCCA AATTC GACCG
TAGGC AAAAA AAAAA AAAAA AAAAA AAAAA AAAA AAAAA AAAAA.
OTP DNA sequences.
1 Ex: AAAAA AAAAA AAAAA AAAAA AAAAA AAAA AAAAA AAAAA
TAGGC. GACCG AATTC CGCCA CGGTA GGATT AATTG GGCGT GTACG
AACCC ATCGG AAAGC CCTTT GCGTA TAAGG CGTAC.
2 Take a complement of the above nucleotides from the OTP DNA sequences. Ex:
TTTTT TTTTT TTTTT TTTTT TTTTT TTTTT TTTTT TTTTTT TTTTT ATCCG
CTGGC TTAAG GCGGT GCCAT CCTAA TTAAC GCGCA CATGC TTGGG
TAGCC TTTCG GGAAA CGCAT ATTCC GCATG.
3 Consider it at positions 0, 1, 2, 3, 4, …, 23 and substitute them with A, C, G and T
correspondingly up to the end of the DNA sequences. Ex: TTTTTA TTTTTC
TTTTTG TTTTTT TTTTTA TTTTTC TTTTTG TTTTTT ATCCGA CTGGCC
TTAAGG GCGGTT GCCATA CCTAAC TTAACG GCGCAT CATGCA TTGGGC
TAGCCG TTTCGT GGAAAA CGCATC ATTCCG GCATGT.
0 0 0 0 0 0
1 0 1 1 1 0
0 1 0 0 0 0
1 1 0 1 0 1
252 S. Paul, T. Anwar and A. Kumar
0 0 0 0 0 0
0 1 1 1 0 1
0 0 0 0 1 0
1 0 1 0 1 1
Step 3: Take randomly any DNA sequences which are equal to the length
of the binary plain text and arrange it column-wise in a 4*6 matrix, say N. Ex:
OTP DNA sequences are CGATTAAGGGGG and the binary numbers are
011000111100001010101010.
0 0 1 0 1 1
1 0 1 0 0 0
1 1 0 1 1 1
0 1 0 0 0 0
Step 4: Apply XOR operation between matrices M and N to get a new matrix,
say MN.
0 0 1 0 1 1
1 1 0 1 0 1
1 1 0 1 0 1
1 1 1 0 1 1
b Arrange elements of matrix column-wise from left to right in a row. The result
will be (0111, 0111, 1001, 0110, 1001, 1111). Start scanning the binary sequence
from left to right to find the occurrences of 1s. Once a ‘1’ is found, get its position
(0, 1, 2, 3,…, 23) in the OTP DNA key sequence and get the corresponding DNA
sequence from the generated OTP DNA key sequence. The result will be given
below.
DNA sequences: TTTTTC TTTTTG TTTTTT TTTTTC TTTTTG TTTTTT ATCCGA
GCGGTT CCTAAC TTAACG CATGCA TTTCGT GGAAAA CGCATC ATTCCG
GCATGT.
c Replace the last attached DNA sequence and find the complement of the remaining
DNA sequences. The final result will be AAAAA AAAAA AAAAA AAAAA
AAAAA AAAAA TAGGC CGCCA GGATT AATTG GTACG AAAGC CCTTT
GCGTA TAAGG CGTAC. This is our cipher text.
sequence from the OTP DNA sequence and attach the last position bit. The result
will be TTTTTC TTTTTG TTTTTT TTTTTC TTTTTG TTTTTT ATCCGA GCGGTT
CCTAAC TTAACG CATGCA TTTCGT GGAAAA CGCATC ATTCCG GCATGT.
b Find the position of the DNA sequences obtained in step 1 from the OTP DNA
sequence and form a binary sequence by putting 1s for all such occurrences; other
positions in the binary sequence should be 0.
The result will be (0111, 0111, 1001, 0110, 1001, 1111).
Step 1: Arrange the obtained binary sequence column-wise in a 4*6 matrix, say
MN.
0 0 1 0 1 1
1 1 0 1 0 1
1 1 0 1 0 1
1 1 1 0 1 1
The proposed algorithms were implemented in Java 8.0 and NetBeans 8.1, and the results
were documented. Screenshots that show how the simulation runs and how the results are
generated after the end of the simulation of a particular scenario are shown in the
following sections. The proposed algorithm is simulated using the Java 8.0 framework
using an Intel core i5 processor with a 4GB RAM (Figure 1).
A DNA key generation using a cryptosystem accessed in the mobile device using struts
and MVC structure is shown in Figure 3.
Figure 4 Encryption
256 S. Paul, T. Anwar and A. Kumar
Figure 6 Decryption
An innovative DNA cryptography technique for secure data transmission 257
Test Plaintext size Cipher text size Key size Encryption time of proposed algo. (ms)
Test 1 8 103 320 16
Test 2 10 135 400 18
Test 3 20 360 800 28
Test 4 40 642 1600 42
Test 5 80 1289 3200 84
Test 6 100 1560 4000 112
Test 7 500 8016 20,000 486
Test Plaintext size Cipher text size Key size Decryption time of proposed algo. (ms)
Test 1 8 103 320 41
Test 2 10 135 400 42
Test 3 20 360 800 57
Test 4 40 642 1600 123
Test 5 80 1289 3200 310
Test 6 100 1560 4000 415
Test 7 500 8016 20,000 1896
7 Comparison study
We have compared our algorithm with those in Pramanik and Setua (2004) and Kaundal
(2014) (Figures 9–11) and the results are given in Table 6.
Test size
An innovative DNA cryptography technique for secure data transmission 259
260
S. Paul, T. Anwar and A. Kumar
Comparison study of proposed algorithm and existing algorithms
Decryption time Decryption time Decryption time Encryption time Encryption time Encryption time
Plaintext Cipher Key
Test of existing of existing Algo. of proposed of existing of existing Algo. of proposed
size text size size
Algo.1 (ms)* 2 (ms)** Algo. (ms) Algo.1 (ms)* 2 (ms)** Algo.(ms)
Test 1 10 135 400 37 49 42 15 20 18
Test 2 20 360 800 44 68 57 27 35 28
Test 3 40 642 1600 110 159 123 38 49 42
Test 4 80 1289 3200 270 414 310 70 96 84
Sources: *Pramanik and Setua (2004)
**Kaundal (2014)
An innovative DNA cryptography technique for secure data transmission 261
In this paper, we have implemented a new DNA encryption and decryption algorithm
based on symmetric key exchange, matrix operation and XOR technique. Large messages
can be encrypted using OTP DNA sequence in lesser time with no issues with respect to
storage of the messages. We use DNA sequence for encryption and decryption to avoid
storage problem. Random DNA key sequence in DNA symmetric key cryptography
makes it secure from attacks. Matrix operation technique makes encryption algorithm
more powerful and less time-consuming. DNA cryptography makes it different from
traditional cryptography. XOR operation between mirror image of the matrix and DNA
sequence gives unbroken result, which makes this encryption algorithm unique.
Time complexity of the proposed encryption and decryption algorithm is O(n). Every
algorithm has limitations. We have not been able to test this algorithm for large text
messages because the secret key used here is small in size like an ATM pin code, login
password or any small text message. We will consider extrapolating it as our future work.
This algorithm is highly secure and protected. The authors have used the MVC
architecture framework GlassFish Server to develop encryption and decryption
algorithms. The system as a whole is a little difficult to set up for all configurations;
however, it is easy to use in different mobile devices. Communication of messages
through a mobile device is secure and difficult to break.
References
Adleman, L.M. (1994) “Molecular computation of solution to combinatorial problems’, Science,
Vol. 11, No. 266, pp.1021–1024.
Amin, S.T., Saeb, M. and Salah, E-G. (2006) ‘A DNA-based implementation of YAEA encryption
algorithm’, Proceedings of the International Conference on Computational Intelligence,
20–22 November, San Francisco, CA, pp.120–125.
Borda, M., and Tornea, O. (2010) ‘DNA secret writing techniques’, Proceedings of the 8th IEEE
International Conference on Communications, 10–12 June, Bucharest, pp.451–456.
Chen, J. (2003) ‘A DNA-based biomolecular cryptography design’, Proceedings of the IEEE
International Symposium on Circuits and Systems, Vol. 3, 25–28 May, Bangkok, Thailand,
pp.III-822–III-825.
Conrad, E. (2006) Explanation of three types of cryptosystem. Available online at: http://www.
giac.org/cissp-papers/52.pdf
Cox, J.P.L. (2001) ‘Long-term data storage in DNA’, Trends in Biotechnology, Vol. 19, No. 7,
pp.247–250.
Cui, G., Qin, L., Wang, Y. and Zhang, X. (2008) ‘An encryption scheme using DNA technology’,
Proceedings of the 3rd International Conference on Bio-Inspired Computing: Theories and
Applications, 28 September–1 October, Adelaide, SA, pp.37–42.
Kaundal, A.K. (2014) Feistel inspired structure for DNA cryptography. Available online at:
http://dspace.thapar.edu:8080/dspace/bitstream/10266/2843/1/801233002_Ashish.pdf.
Kumar, D. and Singh, S. (2011) ‘Secret data writing using DNA sequences’, Proceedings of the
IEEE International Conference on Emerging Trends in Networks and Computer
Communications, 22–24 April, Udaipur, pp.402–440.
Lai, X-S. and Zhang, L. (2008) ‘A novel generation key scheme based on DNA’, Proceedings of
the International Conference on Computational Intelligence and security, 13–17 December,
Suzhou, pp.264–266.
262 S. Paul, T. Anwar and A. Kumar
Lai, X.J. (2010) ‘Asymmetric encryption and signature method with DNA technology’, Science
China Information Sciences, Vol. 53, No. 3, pp.506–514.
Mandge, T. and Choudhary, V. (2013) ‘A DNA encryption technique based on matrix
manipulation and secure key generation scheme’, Proceedings of the International Conference
on Information Communication and Embedded Systems, 21–22 February, Chennai,
pp.47–52.
Pramanik, S. and Setua, S.K. (2004) ‘DNA cryptography’, Proceedings of the 7th IEEE
International Conference on Electrical & Computer Engineering, 20–22 December, Dhaka,
pp.551–554.
Tanaka, K., Okamoto, A. and Saito, I. (2005) ‘Public-key system using DNA as a one-way
function for distribution’, Biosystems, Vol. 81, No. 1, pp.25–29.
Tornea, O. and Borda, M.E. (2013) ‘Security and complexity of a DNA-based cipher’,
11th Roedunet International Conference, 17–19 January, Sinaia, pp.1–5.
Wang, X. and Zhang, Q. (2009) ‘DNA computing-based cryptography’, Proceedings of the
4th International Conference on Bio-Inspired Computing, 16–19 October, Beijing, pp.1–3.
Wang, Z. and Yu, Z. (2011) ‘Index-based symmetric DNA encryption algorithm’, Proceedings of
the 4th International Congress on Image and Signal Processing, 15–17 October, Shanghai,
pp.2290–2294.
Zhang, Y., Fu, B. and Zhang, X. (2012) ‘DNA cryptography based on DNA fragment assembly’,
Proceedings of the IEEE International Conference on Information Science and Digital
Content Technology, Vol. 1, 26–28 June, Jeju, pp.179–182.