2007
DOI: 10.1186/1471-2105-8-176
|View full text |Cite
|
Sign up to set email alerts
|

DNA-based watermarks using the DNA-Crypt algorithm

Abstract: Background: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) protected by patents. Predicted mutations in the genome can be corrected by the DNA-Crypt program leaving the encrypted information intact. Existing DNA cryptographic and steganographic algorithms use synthetic DNA sequences to store binary information however, although these sequences can be used for authentication, they may change t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
164
0
1

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 133 publications
(168 citation statements)
references
References 21 publications
0
164
0
1
Order By: Relevance
“…The most important constraint is that the full biological functionality of the gene must always be preserved, so that the tagged gene may be reintroduced in a living being by means of recombinant DNA techniques and still remain fully operative. This has actually been achieved with living organisms by Arita and Ohashi [2] and by Heider and Barnekow [3].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The most important constraint is that the full biological functionality of the gene must always be preserved, so that the tagged gene may be reintroduced in a living being by means of recombinant DNA techniques and still remain fully operative. This has actually been achieved with living organisms by Arita and Ohashi [2] and by Heider and Barnekow [3].…”
Section: Introductionmentioning
confidence: 99%
“…Tagging a gene with the preservation of its primary structure as the sole constraint -as we have done in the previous section, and as assumed in and [1], [2] and [3]-is risky from a biological point of view. Despite the fact that m tagged genes have the exact same protein translation as the original gene x, many of those possible y sequences may have codon counts very different to that of x.…”
Section: B) Codon Count Preservation Casementioning
confidence: 99%
See 1 more Smart Citation
“…If certain constraints are observed, DNA can also be used to convey additional arbitrary data [1,2,4,5,6,7]. It is a key fact that information embedded within DNA will travel alongside each replication, whether it takes place in vivo or in vitro, that is, whether it happens inside or outside living organisms.…”
Section: Dna Data Embedding and Applicationsmentioning
confidence: 99%
“…A number of methods have been proposed over the last ten years for mathematically embedding information within DNA, the molecule that constitutes the building block of life [1,2,3,4,5,6,7]. However, important issues related to DNA data embedding are not elucidated yet.…”
Section: Introductionmentioning
confidence: 99%