Cargando…

DNA-based watermarks using the DNA-Crypt algorithm

BACKGROUND: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) protected by patents. Predicted mutations in the genome can be corrected by the DNA-Crypt program leaving the encrypted i...

Descripción completa

Detalles Bibliográficos
Autores principales: Heider, Dominik, Barnekow, Angelika
Formato: Texto
Lenguaje:English
Publicado: BioMed Central 2007
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1904243/
https://www.ncbi.nlm.nih.gov/pubmed/17535434
http://dx.doi.org/10.1186/1471-2105-8-176
_version_ 1782133979082653696
author Heider, Dominik
Barnekow, Angelika
author_facet Heider, Dominik
Barnekow, Angelika
author_sort Heider, Dominik
collection PubMed
description BACKGROUND: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) protected by patents. Predicted mutations in the genome can be corrected by the DNA-Crypt program leaving the encrypted information intact. Existing DNA cryptographic and steganographic algorithms use synthetic DNA sequences to store binary information however, although these sequences can be used for authentication, they may change the target DNA sequence when introduced into living organisms. RESULTS: The DNA-Crypt algorithm and image steganography are based on the same watermark-hiding principle, namely using the least significant base in case of DNA-Crypt and the least significant bit in case of the image steganography. It can be combined with binary encryption algorithms like AES, RSA or Blowfish. DNA-Crypt is able to correct mutations in the target DNA with several mutation correction codes such as the Hamming-code or the WDH-code. Mutations which can occur infrequently may destroy the encrypted information, however an integrated fuzzy controller decides on a set of heuristics based on three input dimensions, and recommends whether or not to use a correction code. These three input dimensions are the length of the sequence, the individual mutation rate and the stability over time, which is represented by the number of generations. In silico experiments using the Ypt7 in Saccharomyces cerevisiae shows that the DNA watermarks produced by DNA-Crypt do not alter the translation of mRNA into protein. CONCLUSION: The program is able to store watermarks in living organisms and can maintain the original information by correcting mutations itself. Pairwise or multiple sequence alignments show that DNA-Crypt produces few mismatches between the sequences similar to all steganographic algorithms.
format Text
id pubmed-1904243
institution National Center for Biotechnology Information
language English
publishDate 2007
publisher BioMed Central
record_format MEDLINE/PubMed
spelling pubmed-19042432007-06-29 DNA-based watermarks using the DNA-Crypt algorithm Heider, Dominik Barnekow, Angelika BMC Bioinformatics Research Article BACKGROUND: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) protected by patents. Predicted mutations in the genome can be corrected by the DNA-Crypt program leaving the encrypted information intact. Existing DNA cryptographic and steganographic algorithms use synthetic DNA sequences to store binary information however, although these sequences can be used for authentication, they may change the target DNA sequence when introduced into living organisms. RESULTS: The DNA-Crypt algorithm and image steganography are based on the same watermark-hiding principle, namely using the least significant base in case of DNA-Crypt and the least significant bit in case of the image steganography. It can be combined with binary encryption algorithms like AES, RSA or Blowfish. DNA-Crypt is able to correct mutations in the target DNA with several mutation correction codes such as the Hamming-code or the WDH-code. Mutations which can occur infrequently may destroy the encrypted information, however an integrated fuzzy controller decides on a set of heuristics based on three input dimensions, and recommends whether or not to use a correction code. These three input dimensions are the length of the sequence, the individual mutation rate and the stability over time, which is represented by the number of generations. In silico experiments using the Ypt7 in Saccharomyces cerevisiae shows that the DNA watermarks produced by DNA-Crypt do not alter the translation of mRNA into protein. CONCLUSION: The program is able to store watermarks in living organisms and can maintain the original information by correcting mutations itself. Pairwise or multiple sequence alignments show that DNA-Crypt produces few mismatches between the sequences similar to all steganographic algorithms. BioMed Central 2007-05-29 /pmc/articles/PMC1904243/ /pubmed/17535434 http://dx.doi.org/10.1186/1471-2105-8-176 Text en Copyright © 2007 Heider and Barnekow; licensee BioMed Central Ltd. http://creativecommons.org/licenses/by/2.0 This is an Open Access article distributed under the terms of the Creative Commons Attribution License ( (http://creativecommons.org/licenses/by/2.0) ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Heider, Dominik
Barnekow, Angelika
DNA-based watermarks using the DNA-Crypt algorithm
title DNA-based watermarks using the DNA-Crypt algorithm
title_full DNA-based watermarks using the DNA-Crypt algorithm
title_fullStr DNA-based watermarks using the DNA-Crypt algorithm
title_full_unstemmed DNA-based watermarks using the DNA-Crypt algorithm
title_short DNA-based watermarks using the DNA-Crypt algorithm
title_sort dna-based watermarks using the dna-crypt algorithm
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1904243/
https://www.ncbi.nlm.nih.gov/pubmed/17535434
http://dx.doi.org/10.1186/1471-2105-8-176
work_keys_str_mv AT heiderdominik dnabasedwatermarksusingthednacryptalgorithm
AT barnekowangelika dnabasedwatermarksusingthednacryptalgorithm