Skip to main content

A Watermarking Scheme for Coding DNA Sequences Using Codon Circular Code

  • Conference paper
  • First Online:
  • 650 Accesses

Abstract

This paper discusses DNA watermarking for authentication, privacy protection, and the prevention of illegal copying and mutation of DNA sequences. We propose a DNA watermarking scheme that provides mutation robustness and amino acid preservation. The proposed scheme selects a number of codons as the embedding target at the regular singularity in coding regions. The scheme then embeds the watermark in the watermarked codons such that the original codons are still transcribed as the same amino acids. From in silico experiments using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme, while it also preserves the amino acids of the watermarked codons.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sankar, P.: Genetic privacy. Annu. Rev. Med. 54, 393–407 (2003)

    Article  Google Scholar 

  2. Springer, J.A., Beever, J., Morar, N., Sprague, J.E., Kane, M.D.: Ethics, Privacy, and the Future of Genetic Information in Healthcare Information Assurance and Security. Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives, 1st edn, pp. 186-205. IGI Global, Hershey (2010)

    Google Scholar 

  3. National Conference of State Legislatures: Genetic Privacy Laws, Genetic Information: Legal Issues Relating to Discrimination and Privacy (2008). http://www.ncsl.org

  4. Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399, 533–534 (1999)

    Article  Google Scholar 

  5. Leier, A., Richter, C., Banzhaf, W., Rauhe, H.: Cryptography with DNA binary strands. Biosystems 57, 13–22 (2000)

    Article  Google Scholar 

  6. Anam, B., Sakib, K., Hossain, M.A., Dahal, K.: Review on the advancements of DNA cryptography. In: 4th International Conference on Software, Knowledge, Information Management and Applications (2010)

    Google Scholar 

  7. Yachie, N., Sekiyama, K., Sugahara, J., Ohashi, Y., Tomita, M.: Alignment-based approach for durable data storage into living organisms. Biotechnol. Prog. 23, 501–505 (2007)

    Article  Google Scholar 

  8. Heider, D., Barnekow, A.: DNA watermarks in non-coding regulatory sequences. BMC Bioinform. 2 (2009)

    Google Scholar 

  9. Heider, D., Barnekow, A.: DNA-based watermarks using the DNA-Crypt algorithm. BMC Bioinform. 8 (2007)

    Google Scholar 

  10. Shimanovsky, B., Feng, J., Potkonjak, M.: Hiding data in DNA. In: Proceedings of the 5th International Workshop in Information Hiding, pp. 373–386 (2002)

    Google Scholar 

  11. Arita, M., Ohashi, Y.: Secret signatures inside genomic DNA. Biotechnol. Prog. 20, 1605–1607 (2004)

    Article  Google Scholar 

  12. Heider, D., Barnekow, A.: DNA watermarks - a proof of concept. BMC Bioinform. 9 (2008)

    Google Scholar 

  13. Shuhong, J., Goutte, R.: Code for encryption hiding data into genomic DNA of living organisms. In: 9th International Conference on Signal Processing (ICSP), pp. 2166–2169 (2008)

    Google Scholar 

  14. Balado, F.: On the Shannon capacity Of DNA data embedding. In: IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), pp. 1766–1769 (2010)

    Google Scholar 

  15. Haughton, D., Balado, F.: Performance of DNA data embedding algorithms under substitution mutations. In: IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW), pp. 201–206 (2010)

    Google Scholar 

  16. Balado, F.: On the embedding capacity of DNA strands under insertion, deletion and substitution mutations. In: Proceedings of SPIE 7541, Media Forensics and Security XII, San José, USA (2010)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MEST)(KRF-2011- 0023118 and KRF-2011-0010902) and Tongmyong University Research Grants 2012 (2012-A001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suk-Hwan Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Lee, SH., Lee, EJ., Hwang, WJ., Kwon, KR. (2014). A Watermarking Scheme for Coding DNA Sequences Using Codon Circular Code. In: Di Caro, G., Theraulaz, G. (eds) Bio-Inspired Models of Network, Information, and Computing Systems. BIONETICS 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 134. Springer, Cham. https://doi.org/10.1007/978-3-319-06944-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06944-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06943-2

  • Online ISBN: 978-3-319-06944-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics