Skip to main content

Finding Data in DNA: Computer Forensic Investigations of Living Organisms

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2012)

Abstract

Recent advances in genetic engineering have allowed the insertion of artificial DNA strands into the living cells of organisms. Several methods have been developed to insert information into a DNA sequence for the purpose of data storage, watermarking, or communication of secret messages. The ability to detect, extract, and decode messages from DNA is important for forensic data collection and for data security. We have developed a software toolkit that detects the presence of a hidden message within a DNA sequence, and deciphers that message. In order to decode a message we are modifying several existing cryptanalysis tools that have been developed for solving simple substitution ciphers and compare their performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anam, B., Sakib, K., Hossain, A., Dahal, K.: Review on the Advancements of DNA Cryptography. In: International Conference on Software, Knowledge, Information Management and Application, Paro, Bhutan, August 25-27 (2010)

    Google Scholar 

  2. Nirenberg, M.: Historical review: Deciphering the genetic code – a personal account. Trends in Biochemical Sciences 29(1), 46–54 (2004)

    Article  Google Scholar 

  3. Jiao, S.-H., Goutte, R.: Code For Encryption Hiding Data Into Genomic DNA. In: International Conference on Software Process (2008)

    Google Scholar 

  4. Adleman, L.M.: Molecular Computation of Solutions To Combinatorial Problems. Science, New Series 266(5187), 1021–1024 (1994)

    Google Scholar 

  5. Ogihara, M., Ray, A.: Simulating Boolean Circuits on a DNA Computer. RECOMB (1997)

    Google Scholar 

  6. Bogard, C.M., Rouchka, E.C., Arazi, B.: DNA media storage. Progress in Natural Science 18, 603–609 (2007)

    Article  Google Scholar 

  7. Arita, M., Ohashi, Y.: Secret Signatures Inside Genomic DNA. Biotechnology Progress 20(5), 1605–1607 (2004)

    Article  Google Scholar 

  8. Yachie, N., Sekiyama, K., Sugahara, J., Ohashi, Y., Tomita, M.: Alignment-Based Approach for Durable Data Storage into Living Organisms. Biotechnology Progress 23(2), 4 (2007); (Epub January 25, 2007)

    Google Scholar 

  9. Arita, M.: Comma-free design for DNA words. Communications of the ACM 47(5), 99 (2004)

    Article  Google Scholar 

  10. Heider, D., Barnekow, A.: DNA-based watermarks using the DNA-Crypt algorithm. BMC Bioinformatics 8, 176 (2007) (Epub May 31, 2007)

    Google Scholar 

  11. Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature, 533–534 (1999)

    Google Scholar 

  12. Brenner, S., Williams, S.R., Vermaas, E.H., Storck, T., Moon, K., McCollum, C., et al.: In vitro cloning of complex mixtures of DNA on microbeads: Physical separation of differentially expressed cDNAs. Proceedings of the National Academy of Sciences of the United States of America 97(4), 1665–1670 (2000)

    Article  Google Scholar 

  13. Jiao, S.-H., Goutte, R.: Hiding data in DNA of living organisms. Natural Science 1(3), 181–184 (2009)

    Article  Google Scholar 

  14. Heider, D., Barnekow, A.: DNA watermarks: A proof of concept. BMC Molecular Biology 9, 40 (2008); (Epub April 23, 2008)

    Google Scholar 

  15. Gibson, D.G., Glass, J.I., Lartigue, C., Noskov, V.N., Chuang, R.Y., Algire, M.A., et al.: Creation of a bacterial cell controlled by a chemically synthesized genome. Science 329(5987), 52–56 (2010); (Epub May 22, 2010)

    Google Scholar 

  16. Bancroft, C., Bowler, T., Bloom, B., Clelland, C.T.: Long-Term Storage of Information in DNA. Science, New Series 293(5536), 1763–1765 (2001)

    Google Scholar 

  17. A Y3K bug.pdf. nature biotechnology 18 (2000)

    Google Scholar 

  18. Drake, J.W., Charlesworth, B., Charlesworth, D., Crow, J.F.: Rates of Spontaneous mutation. Genetics 148(4), 20 (1998)

    Google Scholar 

  19. Smith, G.C., Fiddes, C.C., Hawkins, J.P., Cox, J.P.L.: Some possible codes for encrypting data in DNA. Biotechnology Letters 25(14), 1125–1130 (2003)

    Article  Google Scholar 

  20. Wong, P.C., Wong, K.-K., Foote, H.: Organic Data Memory Using the DNA Approach. Communications of the ACM 46(1), 95–98 (2003)

    Article  Google Scholar 

  21. Tanaka, K., Okamoto, A., Saito, I.: Public-key system using DNA as a one-way function for key distribution. Bio Systems 81(1), 25–29 (2005); (Epub May 27, 2005)

    Google Scholar 

  22. Huffman, D.A.: A Method for the Construction of Minimum-Redundancy Codes. In: Proceedings of the IRE, pp. 1098–1102 (1952)

    Google Scholar 

  23. Singh, S.: The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. Doubleday, New York (1999)

    Google Scholar 

  24. Jupiter, D.C., Ficht, T.A., Qin, Q.-M., de Figueiredo, P.: DNA Watermarking of Infectious Agents Progress and Prospects. Public Library of Science Pathogens 6(6), 1–3 (2010)

    Google Scholar 

  25. Johnson, N.F., Jajodia, S.: Steganalysis: The Investigation of Hidden Information. In: IEEE Information Technology Conference, Syracuse, NY (1998)

    Google Scholar 

  26. Li, B., Huang, J., Shi, Y.Q.: Steganalysis of YASS. IEEE Transactions on Information Forensics and Security 4(3), 369–382 (2009)

    Article  Google Scholar 

  27. Xin-guang, S., Hui, L., Zhong-liang, Z.: A Steganalysis Method Based on the Distribution of Characters.pdf. In: 8th International Conference on Signal Processing, Beijing, China (2006)

    Google Scholar 

  28. Wang, G., Zhang, W.: A steganalysis-based approach to comprehensive identification and characterization of functional regulatory elements. Genome Biology 7(6), R49 (2006); (Epub June 22, 2006)

    Google Scholar 

  29. Spillman, R., Janssen, M., Nelson, B., Kepner, M.: Use of a Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers. Cryptologia 17(1), 31–44 (1993)

    Article  Google Scholar 

  30. Delman, B.: Genetic Algorithms in Cryptography. Rochester Institute of Technology, Rochester (2004)

    Google Scholar 

  31. Hasinoff, S.: Solving Substitution Ciphers. A Technical Report, University of Toronto (2003)

    Google Scholar 

  32. Uddin, M.F., Youssef, A.M.: An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers. In: CCECE+CCGEI, May 7-10, pp. 1582–1585. IEEE, Ottawa (2006)

    Google Scholar 

  33. Lucks, M.: A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 132–144. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  34. Hart, G.W.: To decode short Cryptograms. Communications of the ACM 37(9), 102–108 (1994)

    Article  Google Scholar 

  35. Jakobsen, T.: A fast method for cryptanalysis of substitution ciphers. Cryptologia 19(3), 265–274 (1995)

    Article  MATH  Google Scholar 

  36. Forsyth, W.S., Safavi-Nani, R.: Automated Cryptanalysis of substitution ciphers. Cryptologia 17(4), 407–424 (1993)

    Article  MATH  Google Scholar 

  37. Peleg, S., Rosenfeld, A.: Breaking Substitution Ciphers Using a Relaxation Algorithm. Communications of the ACM 22(11), 598–605 (1979)

    Article  MATH  Google Scholar 

  38. Modegi, T.: Watermark Embedding Techniques for DNA Sequences Using Codon Usage Bias Features. In: 16th International Conference on Genome Informatics, Yokohama, Japan (2005)

    Google Scholar 

  39. Yampolskiy, R.V., El-Barkouky, A.: Wisdom of artificial crowds algorithm for solving NP-had problems. International Journal of Bio-Inspired Computation 3(6) (2011)

    Google Scholar 

  40. Yampolskiy, R.V., Ashby, L.H.: Genetic Algorithm and Wisdom of Artificial Crowds Algorithm Applied to Light Up. In: The 16th International Conference on Computer Games, Louisville, KY, pp. 27–32 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Beck, M.B., Rouchka, E.C., Yampolskiy, R.V. (2013). Finding Data in DNA: Computer Forensic Investigations of Living Organisms. In: Rogers, M., Seigfried-Spellar, K.C. (eds) Digital Forensics and Cyber Crime. ICDF2C 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39891-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39891-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39890-2

  • Online ISBN: 978-3-642-39891-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics