DNA-based watermarks using the DNA-crypt algorithm

被引:86
作者
Heider, Dominik [1 ]
Barnekow, Angelika [1 ]
机构
[1] Univ Munster, Dept Expt Tumorbiol, D-48149 Munster, Germany
关键词
D O I
10.1186/1471-2105-8-176
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
Background: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) protected by patents. Predicted mutations in the genome can be corrected by the DNA-Crypt program leaving the encrypted information intact. Existing DNA cryptographic and steganographic algorithms use synthetic DNA sequences to store binary information however, although these sequences can be used for authentication, they may change the target DNA sequence when introduced into living organisms. Results: The DNA-Crypt algorithm and image steganography are based on the same watermark-hiding principle, namely using the least significant base in case of DNA-Crypt and the least significant bit in case of the image steganography. It can be combined with binary encryption algorithms like AES, RSA or Blowfish. DNA-Crypt is able to correct mutations in the target DNA with several mutation correction codes such as the Hamming-code or the WDH-code. Mutations which can occur infrequently may destroy the encrypted information, however an integrated fuzzy controller decides on a set of heuristics based on three input dimensions, and recommends whether or not to use a correction code. These three input dimensions are the length of the sequence, the individual mutation rate and the stability over time, which is represented by the number of generations. In silico experiments using the Ypt7 in Saccharomyces cerevisiae shows that the DNA watermarks produced by DNA-Crypt do not alter the translation of mRNA into protein. Conclusion: The program is able to store watermarks in living organisms and can maintain the original information by correcting mutations itself. Pairwise or multiple sequence alignments show that DNA-Crypt produces few mismatches between the sequences similar to all steganographic algorithms.
引用
收藏
页数:10
相关论文
共 23 条
[1]  
[Anonymous], 2000, DIMACS SERIES DISCRE
[2]   Secret signatures inside genomic DNA [J].
Arita, M ;
Ohashi, Y .
BIOTECHNOLOGY PROGRESS, 2004, 20 (05) :1605-1607
[3]   Hiding messages in DNA microdots [J].
Clelland, CT ;
Risca, V ;
Bancroft, C .
NATURE, 1999, 399 (6736) :533-534
[4]  
Gotte M, 2000, Subcell Biochem, V34, P133
[5]   FUZZY-LOGIC IN CONTROL-SYSTEMS - FUZZY-LOGIC CONTROLLER .1. [J].
LEE, CC .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1990, 20 (02) :404-418
[6]   Cryptography with DNA binary strands [J].
Leier, A ;
Richter, C ;
Banzhaf, W ;
Rauhe, H .
BIOSYSTEMS, 2000, 57 (01) :13-22
[7]   EXPERIMENT IN LINGUISTIC SYNTHESIS WITH A FUZZY LOGIC CONTROLLER [J].
MAMDANI, EH ;
ASSILIAN, S .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1975, 7 (01) :1-13
[8]  
RIVEST RL, 1977, COMMUNICATIONS ACM, V82
[9]  
SCHIMMOLLER F, 1993, J CELL SCI, V106, P823
[10]  
SCHNEIER B, 1996, APPL CRPTOGRAPHY