609
Views
5
CrossRef citations to date
0
Altmetric
Perspective

Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system

Article: e23478 | Published online: 01 Mar 2013

References

  • Dahm R. Discovering DNA: Friedrich Miescher and the early years of nucleic acid research. Hum Genet 2008; 122:565 - 81; http://dx.doi.org/10.1007/s00439-007-0433-0; PMID: 17901982
  • Avery OT, Macleod CM, McCarty M. Studies on the chemical nature of the substance inducing transformation of pneumococcal types. Inductions of transformation by a deoxyribonucleic acid fraction isolated from pneumococcus type III. J Exp Med 1944; 79:137 - 58; http://dx.doi.org/10.1084/jem.79.2.137; PMID: 19871359
  • Watson JD, Crick FHC. Molecular structure of nucleic acids; a structure for deoxyribose nucleic acid. Nature 1953; 171:737 - 8; http://dx.doi.org/10.1038/171737a0; PMID: 13054692
  • Carlson EA. Defining the gene: an evolving concept. Am J Hum Genet 1991; 49:475 - 87; PMID: 1867208
  • Venter JC, Adams MD, Myers EW, Li PW, Mural RJ, Sutton GG, et al. The sequence of the human genome. Science 2001; 291:1304 - 51; http://dx.doi.org/10.1126/science.1058040; PMID: 11181995
  • Rauhe H, Vopper G, Feldkamp U, Banzhaf W, Howard JC. Digital DNA molecules. Proc. 6th DIMACS Workshop on DNA Based Computers; Leiden, Netherlands, 2000; 13-17.
  • Heider D, Barnekow A. DNA-based watermarks using the DNA-Crypt algorithm. BMC Bioinformatics 2007; 8:176; http://dx.doi.org/10.1186/1471-2105-8-176; PMID: 17535434
  • Clelland CT, Risca V, Bancroft C. Hiding messages in DNA microdots. Nature 1999; 399:533 - 4; http://dx.doi.org/10.1038/21092; PMID: 10376592
  • Gehani A, LaBean TH, Reif JH. DNA-based cryptography. Discr Math Theor Comput Sci 2000; 54:233 - 49
  • Wyle H, Erb T, Banow R. Reduced-time facsimile transmission by digital coding. IRE Trans Commun Syst 1961; 9:215 - 22; http://dx.doi.org/10.1109/TCOM.1961.1097692
  • Rothemund PWKA. DNA and restriction enzyme implimentation of Turing machines. Discr Math Theor Comput Sci 1996; 27:75 - 119
  • Provos N, Honeyman P. Hide and seek: an introduction to steganography. Secur Priv IEEE 2003; 1:32 - 44; http://dx.doi.org/10.1109/MSECP.2003.1203220
  • Wong PC, Wong KK, Foote H. Organic data memory using the DNA approach. Commun ACM 2003; 46:95 - 8; http://dx.doi.org/10.1145/602421.602426
  • Kawano T, Bouteau F, Mancuso S. Finding and defining the natural automata acting in living plants: Towards the synthetic biology for robotics and informatics in vivo.. Commun Integr Biol 2012; In press http://dx.doi.org/10.4161/cib.21805
  • Kawano T. Biomolecule-assisted natural computing approaches for simple polynomial algebra over fields. ICIC Exp Lett 2013; In press
  • Yokawa K, Kagenishi T, Kawano T. Prevention of oxidative DNA degradation by copper-binding peptides. Biosci Biotechnol Biochem 2011; 75:1377 - 9; http://dx.doi.org/10.1271/bbb.100900; PMID: 21737913
  • Yokawa K, Kadono T, Suzuki Y, Suzuki T, Uezu K, Kawano T. DNA-mediated sensitive detection and quantification of rare earth ions using polymerase chain reaction. Sens Mater 2011; 23:219 - 28