Browse > Article
http://dx.doi.org/10.9717/kmms.2013.16.3.318

DNA Watermarking Method based on Random Codon Circular Code  

Lee, Suk-Hwan (동명대학교 정보보호학과)
Kwon, Seong-Geun (경일대학교 전자공학과)
Kwon, Ki-Ryong (부경대학교 IT융합응용공학과)
Publication Information
Abstract
This paper proposes a DNA watermarking method for the privacy protection and the prevention of illegal copy. The proposed method allocates codons to random circular angles by using random mapping table and selects triplet codons for embedding target with the help of the Lipschitz regularity value of local modulus maxima of codon circular angles. Then the watermark is embedded into circular angles of triplet codons without changing the codes of amino acids in a DNA. The length and location of target triplet codons depend on the random mapping table for 64 codons that includes start and stop codons. This table is used as the watermark key and can be applied on any codon sequence regardless of the length of sequence. If this table is unknown, it is very difficult to detect the length and location of them for extracting the watermark. We evaluated our method and DNA-crypt watermarking of Heider method on the condition of similar capacity. From evaluation results, we verified that our method has lower base changing rate than DNA-crypt and has lower bit error rate on point mutation and insertions/deletions than DNA-crypt. Furthermore, we verified that the entropy of random mapping table and the locaton of triplet codons is high, meaning that the watermark security has high level.
Keywords
DNA watermarking; Codon random mapping table; Amino acid code preservation; Mutation resistance; Watermark security;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 T. Kazuo, O. Akimitsu, and S. Isao, "Public- Key Systems using DNA as a One-Way Function for Key Distribution," BioSystems, Vol. 81, No. 1, pp. 25-29, 2005.   DOI   ScienceOn
2 A. Gehani, T. LaBean, and J. Reif, "DNAbased Cryptography," Aspects of Molecular Computing, Lecture Notes in Computer Science , Vol. 2950, pp. 34-50, 2004.
3 C.T. Clelland, V. Risca, and C. Bancroft, "Hiding Messages in DNA Microdots," Nature, Vol. 399, No. 6736, pp. 533-534, June 1999.   DOI   ScienceOn
4 A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, "Cryptography with DNA Binary Strands," Biosystems, Vol. 57, Issue 1, pp. 13-22, 2000.   DOI   ScienceOn
5 B. Shimanovsky, J. Feng, and M. Potkonjak, "Hiding Data in DNA," Proc. of the 5th Intl. Workshop in Information Hiding, pp. 373-386, 2002.
6 M. Arita, "Writing Information into DNA," Molecular Computing, Lecture Notes in Computer Science, Vol. 2950, pp. 23-35, 2004.
7 N. Yachie, K. Sekiyama, J. Sugahara, Y. Ohashi, and M. Tomita, "Alignment-based Approach for Durable Data Storage Into Living Organisms," Biotechnol. Prog. Vol. 23, No. 2, pp. 501-505, 2007.   DOI   ScienceOn
8 D. Heider and A. Barnekow, "DNA Watermarks in Non-Coding Regulatory Sequences," BMC Bioinformatics, Vol. 2, No. 125, doi:10.1186/1756-0500-2-125, 2009.   DOI   ScienceOn
9 D. Heider and A. Barnekow, "DNA-Based Watermarks using the DNA-Crypt Algorithm," BMC Bioinformatics, Vol. 8, No. 176, doi:10.1186/1471-2105-8-176, 2007.   DOI
10 D. Heider and A. Barnekow, "DNA Watermarks - A Proof of Concept," BMC Bioinformatics, Vol. 9, No. 40, doi:10.1186/1471-2199-9-40, 2008.   DOI   ScienceOn
11 J. Shuhong and R. Goutte, "Code for Encryption Hiding Data Into Genomic DNA of Living Organisms," International Conference on Signal Processing (ICSP) , pp. 2166-2169, 2008.
12 S.H. Lee and K.R. Kwon, "Robust DNA Watermarking Based on Coding DNA Sequence," The Institute of Electronics Engineers of Korea, Vol. 49-CI, No. 2, pp. 123-133, 2012.   과학기술학회마을
13 S.H. Lee, S.G. Kwon, and K.R. Kwon, "A Robust DNA Watermarking in Lifting Based 1D DWT Domain," The Institute of Electronics Engineers of Korea, , Vol. 49, No. 10, pp. 91-101, 2012.   과학기술학회마을   DOI   ScienceOn
14 F Balado, "On the Embedding Capacity of DNA Strands Under Insertion, Deletion and Substitution Mutations," SPIE Media Forensics and Security XII , Vol. 7541, 2010.
15 S. Mallat and S. Zhong, "Characterization of Signals from Multiscale Edges," IEEE Trans. Pattern Anal. Machine Intell., Vol. 14, Issue 7, pp. 710-732, 1992.   DOI   ScienceOn
16 W.J. Kim, T.Y. Seung, S.H. Lee, and K.R. Kwon, "An Information Security Scheme Based on Video Watermarking and Encryption for H.264 Scalable," Journal of Korea Multimedia Society, Vol. 15, No. 3, pp. 299-311, 2012.   과학기술학회마을   DOI   ScienceOn
17 B.J. Jang, S.H. Lee, and K.R. Kwon, "Active Video Watermarking Technique for Infectious Information Hiding System," Journal of Korea Multimedia Society, Vol. 15, No. 8, pp. 1017-1030, 2012.   과학기술학회마을   DOI   ScienceOn