Abstract
This paper discusses DNA watermarking for authentication, privacy protection, and the prevention of illegal copying and mutation of DNA sequences. We propose a DNA watermarking scheme that provides mutation robustness and amino acid preservation. The proposed scheme selects a number of codons as the embedding target at the regular singularity in coding regions. The scheme then embeds the watermark in the watermarked codons such that the original codons are still transcribed as the same amino acids. From in silico experiments using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme, while it also preserves the amino acids of the watermarked codons.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sankar, P.: Genetic privacy. Annu. Rev. Med. 54, 393–407 (2003)
Springer, J.A., Beever, J., Morar, N., Sprague, J.E., Kane, M.D.: Ethics, Privacy, and the Future of Genetic Information in Healthcare Information Assurance and Security. Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives, 1st edn, pp. 186-205. IGI Global, Hershey (2010)
National Conference of State Legislatures: Genetic Privacy Laws, Genetic Information: Legal Issues Relating to Discrimination and Privacy (2008). http://www.ncsl.org
Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399, 533–534 (1999)
Leier, A., Richter, C., Banzhaf, W., Rauhe, H.: Cryptography with DNA binary strands. Biosystems 57, 13–22 (2000)
Anam, B., Sakib, K., Hossain, M.A., Dahal, K.: Review on the advancements of DNA cryptography. In: 4th International Conference on Software, Knowledge, Information Management and Applications (2010)
Yachie, N., Sekiyama, K., Sugahara, J., Ohashi, Y., Tomita, M.: Alignment-based approach for durable data storage into living organisms. Biotechnol. Prog. 23, 501–505 (2007)
Heider, D., Barnekow, A.: DNA watermarks in non-coding regulatory sequences. BMC Bioinform. 2 (2009)
Heider, D., Barnekow, A.: DNA-based watermarks using the DNA-Crypt algorithm. BMC Bioinform. 8 (2007)
Shimanovsky, B., Feng, J., Potkonjak, M.: Hiding data in DNA. In: Proceedings of the 5th International Workshop in Information Hiding, pp. 373–386 (2002)
Arita, M., Ohashi, Y.: Secret signatures inside genomic DNA. Biotechnol. Prog. 20, 1605–1607 (2004)
Heider, D., Barnekow, A.: DNA watermarks - a proof of concept. BMC Bioinform. 9 (2008)
Shuhong, J., Goutte, R.: Code for encryption hiding data into genomic DNA of living organisms. In: 9th International Conference on Signal Processing (ICSP), pp. 2166–2169 (2008)
Balado, F.: On the Shannon capacity Of DNA data embedding. In: IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), pp. 1766–1769 (2010)
Haughton, D., Balado, F.: Performance of DNA data embedding algorithms under substitution mutations. In: IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW), pp. 201–206 (2010)
Balado, F.: On the embedding capacity of DNA strands under insertion, deletion and substitution mutations. In: Proceedings of SPIE 7541, Media Forensics and Security XII, San José, USA (2010)
Acknowledgement
This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MEST)(KRF-2011- 0023118 and KRF-2011-0010902) and Tongmyong University Research Grants 2012 (2012-A001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Lee, SH., Lee, EJ., Hwang, WJ., Kwon, KR. (2014). A Watermarking Scheme for Coding DNA Sequences Using Codon Circular Code. In: Di Caro, G., Theraulaz, G. (eds) Bio-Inspired Models of Network, Information, and Computing Systems. BIONETICS 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 134. Springer, Cham. https://doi.org/10.1007/978-3-319-06944-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-06944-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06943-2
Online ISBN: 978-3-319-06944-9
eBook Packages: Computer ScienceComputer Science (R0)