DNA-Inspired Information Concealing

نویسندگان

  • Lukas Kencl
  • Martin Loebl
چکیده

Protection of the sensitive content is crucial for extensive information sharing. We present a technique of information concealing, based on introduction and maintenance of families of repeats. Repeats in DNA constitute a basic obstacle for its reconstruction by hybridisation. Information concealing in DNA by repeats is considered in [1].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DNA-inspired information concealing: A survey

Various research efforts would benefit from the ability to exchange and share information (traces with packet payloads, or other detailed system logs) to enable more data-driven research. Protection of the sensitive content is crucial for extensive information sharing. We present results of Kencl and Loebl (2009) [41] and Blamey et al. (in preparation) [4] about a technique of information conce...

متن کامل

FPGA Based Data Hiding Methods using DNA Cryptography Techniques

Received Apr 24, 2016 Revised Aug 3, 2016 Accepted Aug 18, 2016 To convey the information safely DNA grouping mechanisms are used. There are many methods used by DNA sequences. The proposed method is of both encryption and information concealing utilizing a few properties of Deoxyribonucleic Acid (DNA) groupings. This technique is highlighted that DNA groupings have many more intriguing propert...

متن کامل

A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy

Genomic data provides clinical researchers with vast opportunities to study various patient ailments. Yet the same data contains revealing information, some of which a patient might want to remain concealed. The question then arises: how can an entity transact in full DNA data while concealing certain sensitive pieces of information in the genome sequence, and maintain DNA data utility? As a re...

متن کامل

Impossibility of quantum string commitment under Holevo information

We show a new impossibility result for Quantum string commitment (QSC) schemes (introduced in [BCH05]). For a single execution of protocol we show binding-concealing trade-offs in terms of the well known and studied Holevo-χ information. Our result is an improvement over the result of [BCH05] who, for a single execution of the protocol, showed binding-concealing trade-offs in terms of a quantit...

متن کامل

Privacy-Preserving Adversarial Networks

We propose a data-driven framework for optimizing privacy-preserving data release mechanisms toward the information-theoretically optimal tradeoff between minimizing distortion of useful data and concealing sensitive information. Our approach employs adversarially-trained neural networks to implement randomized mechanisms and to perform a variational approximation of mutual information privacy....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0904.4449  شماره 

صفحات  -

تاریخ انتشار 2009