Hiding Data in DNA
Just like disk or RAM, DNA and RNA can store vast amounts of information, and just like data stored in digital media, DNA data can be easily copied or tampered with. However, unlike in the digital realm, there are no techniques for watermarking, annotating, or encrypting information in DNA and RNA. The ability to catalogue genes, place checksums, watermark, and otherwise protect intellectual property in such a medium is of profound importance. This paper proposes the original idea of hiding data in DNA and RNA. Moreover, it defines two new and original techniques for hiding the data. The first is a simple technique that hides data in non-coding DNA such as non- transcribed and non-translated regions as well as non-genetic DNA such as DNA computing solutions. The second technique can be used to place data in active coding segments without changing the resulting amino acid sequence. Combining codon redundancy with arithmetic encoding and public key cryptography, this robust technique can be used simultaneously for encryption and authentication. Protecting genetic discoveries, gene therapy drugs, and a great deal of other intellectual property in medicine, genetics, molecular biology, and even DNA computing, could be made possible by the techniques presented in this paper.
KeywordsIntellectual Property Binary Sequence Hiding Data Arithmetic Code Data Hiding Scheme
Unable to display preview. Download preview PDF.
- 1.Adelman L., “Molecular computation of solutions to combinatorial problems”, Science 266, Nov. 11, 1994Google Scholar
- 2.J. Lach, W. Mangione-Smith, and M. Potkonjak Fingerprinting Digital Circuits on Programmable Hardware. Information Hiding Workshop, Portland, Oregon, 1998Google Scholar
- 3.B. Kahng, J. Lach, W. H. Mangione-Smith, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe Watermarking Techniques for Intellectual Property Protection. DAC-98 35th ACM/IEEE DAC Design Automation Conference, pp. 776–781, San Francisco, CA, June 1998Google Scholar
- 4.Campbell, N. A., Biology pp 322–335, Benjamin/Cummings Publishing, 1990Google Scholar
- 5.Felsenfeld, G. “DNA”, Scientific American, Oct 1985Google Scholar
- 6.Darnell, J., “RNA”, Scientific American, Oct 1985Google Scholar
- 7.Campbell, N. A., Biology pp 360, Benjamin/Cummings Publishing, 1990Google Scholar
- 8.Gallo, R. C., “The First Human Retrovirus”, Scientific American, December 1986Google Scholar
- 9.Bender, W., Gruhl, D., Morimoto, N., Lu, A., “Techniques for Hiding Data”, IBM Systems Journal, Vol. 35, NOS 3 & 4, 1996Google Scholar
- 11.Diffie, W. and Hellman, M. E. “Privacy and Authentication: An Introduction to Cryptography”, Proceedings of the IEEE, Vol. 67, No. 3, March 1979Google Scholar