DNA-Inspired Information Concealing
نویسندگان
چکیده
Protection of the sensitive content is crucial for extensive information sharing. We present a technique of information concealing, based on introduction and maintenance of families of repeats. Repeats in DNA constitute a basic obstacle for its reconstruction by hybridisation. Information concealing in DNA by repeats is considered in [1].
منابع مشابه
DNA-inspired information concealing: A survey
Various research efforts would benefit from the ability to exchange and share information (traces with packet payloads, or other detailed system logs) to enable more data-driven research. Protection of the sensitive content is crucial for extensive information sharing. We present results of Kencl and Loebl (2009) [41] and Blamey et al. (in preparation) [4] about a technique of information conce...
متن کاملFPGA Based Data Hiding Methods using DNA Cryptography Techniques
Received Apr 24, 2016 Revised Aug 3, 2016 Accepted Aug 18, 2016 To convey the information safely DNA grouping mechanisms are used. There are many methods used by DNA sequences. The proposed method is of both encryption and information concealing utilizing a few properties of Deoxyribonucleic Acid (DNA) groupings. This technique is highlighted that DNA groupings have many more intriguing propert...
متن کاملA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
Genomic data provides clinical researchers with vast opportunities to study various patient ailments. Yet the same data contains revealing information, some of which a patient might want to remain concealed. The question then arises: how can an entity transact in full DNA data while concealing certain sensitive pieces of information in the genome sequence, and maintain DNA data utility? As a re...
متن کاملImpossibility of quantum string commitment under Holevo information
We show a new impossibility result for Quantum string commitment (QSC) schemes (introduced in [BCH05]). For a single execution of protocol we show binding-concealing trade-offs in terms of the well known and studied Holevo-χ information. Our result is an improvement over the result of [BCH05] who, for a single execution of the protocol, showed binding-concealing trade-offs in terms of a quantit...
متن کاملPrivacy-Preserving Adversarial Networks
We propose a data-driven framework for optimizing privacy-preserving data release mechanisms toward the information-theoretically optimal tradeoff between minimizing distortion of useful data and concealing sensitive information. Our approach employs adversarially-trained neural networks to implement randomized mechanisms and to perform a variational approximation of mutual information privacy....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0904.4449 شماره
صفحات -
تاریخ انتشار 2009