Data Hiding in DNA for Authentication of Plant Variety Rights

被引:0
|
作者
Wei-Liang Tai [1 ]
Charles C.N.Wang [2 ]
Phillip C.Y.Sheu [2 ]
Jeffrey J.P.Tsai [2 ]
机构
[1] the Department of Information Communications,Chinese Culture University
[2] the Department of Biomedical Informatics,Asia University
关键词
Authentication; data hiding; deoxyribose nucleic acid; watermarking;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Hiding data in the deoxyribose nucleic acid(DNA) can facilitate the authentication and annotation of important plant variety rights.A grant of plant variety rights for a new plant variety gives you the exclusive right to produce for sale and sell propagating material of the variety.Digital watermarking techniques have been proposed for a wide range of applications,including ownership protection,copy control,annotation,and authentication.However,existing data hiding methods for DNA change the functionalities of DNA sequences,which induce morphological changes in biological patterns.This paper proposes a high capacity data hiding scheme for DNA without changing the functionalities of DNA sequences.This scheme adaptively varies the embedding process according to the amount of hidden data.Experimental results show that the proposed scheme gives a significantly improved hiding performance than previous schemes.And the robustness and security issues are also analyzed.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [41] Data Hiding and Authentication Scheme for Medical Images Using Double POB
    Ren, Fang
    Shi, Xuan
    Tang, Enya
    Zeng, Mengmeng
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (06):
  • [42] EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication
    Cao, Hong
    Kot, Alex C.
    [J]. 2012 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2012,
  • [43] An option perspective on generating and maintaining plant variety rights in China
    Koo, Bonwoo
    Pardey, Philip G.
    Qian, Keming
    Zhang, Yi
    [J]. AGRICULTURAL ECONOMICS, 2006, 35 (01) : 35 - 48
  • [44] Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System
    Dey, Somdip
    Nath, Asoke
    Agarwal, Shalabh
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 512 - 517
  • [45] AUTHENTICATION OF MP4 FILE BY PERCEPTUAL HASH AND DATA HIDING
    Maung, April Pyone Maung
    Ten, Yiqi
    Wong, KokSheik
    [J]. MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2019, 32 (04) : 304 - 314
  • [46] A content-based image authentication system with lossless data hiding
    Zou, DK
    Wu, CW
    Xuan, GR
    Shi, YQ
    [J]. 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 213 - 216
  • [47] Hiding iris data for authentication of digital images using wavelet theory
    Hassanien A.E.
    [J]. Pattern Recognition and Image Analysis, 2006, 16 (4) : 637 - 643
  • [48] Biometric Authentication using Steganography via Chaotic Encryption and Data Hiding
    Bharathi, M. K.
    Nagarajan, E.
    [J]. RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 277 - 283
  • [49] Data hiding for text document image authentication by connectivity-preserving
    Yang, HJ
    Kot, AC
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 505 - 508
  • [50] A Review on DNA based Cryptography for Data hiding
    Singh, Shradhanjali
    Sharma, Yash
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019), 2019, : 282 - 285