DNA Watermarking: Challenging Perspectives for Biotechnological Applications

被引:18
作者
Heider, Dominik [2 ]
Barnekow, Angelika [1 ]
机构
[1] Univ Munster, Dept Expt Tumorbiol, D-48149 Munster, Germany
[2] Univ Duisburg Essen, Dept Bioinformat, Ctr Med Biotechnol, D-45141 Essen, Germany
关键词
Codon usage; cryptography; silent mutations; steganography; watermarks; CODON ADAPTATION INDEX; GC CONTENT; SACCHAROMYCES-CEREVISIAE; SUBSTITUTION RATE; ESCHERICHIA-COLI; DATA-STORAGE; USAGE; ISOCHORES; EVOLUTION; GENOME;
D O I
10.2174/157489311796904646
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
Today, cutting edge research is being conducted at the intersection of the fields of cryptography, steganography and molecular genetics. DNA has emerged as a promising new carrier medium for hidden information and DNA-based watermarks, as a special kind of DNA steganography. DNA-based watermarks are helpful tools to identify the unauthorized use of genetically modified organisms protected by patents. Furthermore, they have been recently applied to distinguish between wildtype and artificially designed genomes. However, these watermarks must not be integrated randomly into the genome of living organisms, due to the fact that they might affect cellular functions. Artificial DNA can, for instance, alter the primary sequence and thus the function of a protein when integrated into such coding regions. To counteract these problems, several groups have developed algorithms that hide information in living organisms without affecting them. These algorithms are mainly based on the degenerative genetic code. Mutations occurring infrequently can be detected and even be corrected by some of the published methods using parity bits or sophisticated mutation correction codes. Nevertheless, the underlying assumptions of the mutation scenarios in all existing DNA watermarking procedures are rather artificial. Mutations are treated as being uniformly distributed, and thus, these methods are not able to capture and reflect the de facto underlying biological principles of mutations, which are very specific and often accumulated. Thus, realistic mutation scenarios have to be developed for establishing practically applicable watermarking procedures for biotechnological applications.
引用
收藏
页码:375 / 382
页数:8
相关论文
共 53 条
[1]   Selection on codon usage for error minimization at the protein level [J].
Archetti, M .
JOURNAL OF MOLECULAR EVOLUTION, 2004, 59 (03) :400-415
[2]   Secret signatures inside genomic DNA [J].
Arita, M ;
Ohashi, Y .
BIOTECHNOLOGY PROGRESS, 2004, 20 (05) :1605-1607
[3]   Comma-free design for DNA words [J].
Arita, M .
COMMUNICATIONS OF THE ACM, 2004, 47 (05) :99-100
[4]  
Balado F, 2010, P IEEE INT C AC SPEE
[5]   On the Embedding Capacity of DNA Strands under Substitution, Insertion, and Deletion Mutations [J].
Balado, Felix .
MEDIA FORENSICS AND SECURITY II, 2010, 7541
[6]   Geno2pheno: Interpreting genotypic HIV drug resistance tests [J].
Beerenwinkel, N ;
Lengauer, T ;
Selbig, J ;
Schmidt, B ;
Walter, H ;
Korn, K ;
Kaiser, R ;
Hoffmann, D .
IEEE INTELLIGENT SYSTEMS, 2001, 16 (06) :35-41
[7]   Systematic analysis of sporulation phenotypes in 624 non-lethal homozygous deletion strains of Saccharomyces cerevisiae [J].
Briza, P ;
Bogengruber, E ;
Thür, A ;
Rützler, M ;
Münsterkötter, M ;
Dawes, IW ;
Breitenbach, M .
YEAST, 2002, 19 (05) :403-422
[8]  
C Richter, 2000, 6 DIMACS WORKSH DNA
[9]   Codon adaptation index as a measure of dominating codon bias [J].
Carbone, A ;
Zinovyev, A ;
Képès, F .
BIOINFORMATICS, 2003, 19 (16) :2005-2015
[10]   Similar rates but different modes of sequence evolution in introns and at exonic silent sites in rodents: Evidence for selectively driven codon usage [J].
Chamary, JV ;
Hurst, LD .
MOLECULAR BIOLOGY AND EVOLUTION, 2004, 21 (06) :1014-1023