On Covert Data Communication Channels Employing DNA Recombinant and Mutagenesis-based Steganographic Techniques
|
|
|
- Duane Matthews
- 10 years ago
- Views:
Transcription
1 On Covert Data Communication Channels Employing DNA Recombinant and Mutagenesis-based Steganographic Techniques MAGDY SAEB 1, EMAN EL-ABD 2, MOHAMED E. EL-ZANATY 1 1. School of Engineering, Computer Department, Arab Academy for Science, Technology and Maritime Transport Alexandria, EGYPT [email protected] 2. Molecular Biology Group, Medical Technology Center, Medical Research Institute, Alexandria University, EGYPT Abstract: The well-known formulation of the Prisoner s Problem was an inspiration to the academic community to pay more attention to a large number of issues that had arisen in data hiding communication security. Most of the techniques that were implemented were based on modulating a media file to hide the information required to be transmitted. If the transmission is rather continuous in time, one may refer to the technique as a covert communication channel between two parties. Various methods of advanced steganalysis techniques, with varying degrees of success, were developed to detect the existence of such hidden messages in a media file. In this work, we present an alternative approach to hiding data in media files. To be more precise, we use two different DNA-based steganographic techniques where the message is embedded within a vector sequence using recombinant DNA technology or created using DNA mutagenesis technique. The proposed method has many potential unconventional applications not only in data hiding but also in massive data storage. Key words:- DNA, Steganography, Data Communication security, Recombinant, Mutagenesis. 1 Introduction Clandestine communication between two parties is always meant to be covert and inconspicuous. This can be achieved using cryptography wherein, information is encrypted or, in other words, scrambled so that, it cannot be comprehended by the intruder. However, encrypted messages are more noticeable than unencrypted ones. Steganographic, or data hiding techniques, would be the more appropriate solution. In contrast to cryptography which scrambles the message so it can not be understood, steganography hides the message so it can't be observed. Encryption can be combined to most of steganographic methods to add another key of security in case the existence of a hidden message is detected. Different methods of steganographic techniques were used from ancient times to hide secret messages including: invisible inks, microdots, character shifting arrangements, digital signatures, and covert channels and spread spectrum communications. Due to the enormous use of computers and digital media, other approaches such as least significant bit insertion, masking and filtering algorithms, transformation, and software packaging were all introduced relatively recent. More recently, DNAbased steganographic techniques were used. These techniques depend on the high randomness of the DNA to hide any message without being noticed [1]. DNA has many characteristics which make it a perfect steganographic media. These characteristics have two significant facts; the DNA has tremendous information storage capacity. For example, only 1 gram of DNA contains as much information as 1 trillion CD s [8]. In addition, any DNA sequence can be synthesized in any desirable length. In the following section, we will summarize the methodology that had been adopted. Section 3 formalizes the proposed procedure in an algorithmic pseudo code; Details are shown in [Appendix D]. Section 4 provides the details of implementation, and finally section 5 gives a summary and conclusions. Appendices A, B, and C provides the details
2 regarding the recombinant, mutagenesis and the dictionary utilized in this work respectively. 2 Methodology In this work we propose two methods of hiding message into DNA: Using DNA Recombinant: In this method we ligate the message strand with the DNA strand after opening it in a specific position with the restriction enzymes, and then we use the ligase enzymes to recombinant the two strands into one strand. Using DNA Mutagenesis: In this method we use the mutation of the DNA to change or replace some nucleotides in a specific position with the message nucleotides. To accomplish this, we assume the following two assumptions; we use a limited vocabulary for the 1024 most commonly used words in the English language [5]. In addition, we use five DNA bases for each word to cover all the words without any duplication. A sample of this encoding is shown in table 1, shown below. Table 1: DNA mapping table Word Mapping Hello CGTGC world TTCGT For a five-character encoding, we obtain 4 5 that are equal to 1024 which is equal to the 1024 used words. This 1024-word vocabulary is used to encode all of our messages. In this respect we apply two different methods, Recombinant DNA, and DNA Mutagenesis, as shown in sections 2.1, 2.2 respectively. 2.1 Using DNA Recombinant In this method we use the recombinant technology to embed a message strand into another DNA strand using a DNA vector and restriction enzymes. The method is discussed at the sender and the receiver sides as shown next. At the Sender End: Fig.1 explains the procedure of hiding the message into DNA strand using DNA Recombinant. A. Prepare the message B. Prepare the DNA vector C. Embed the message using ligase enzyme Fig.1: procedure of hiding message into DNA vector using DNA recombinant technology. This procedure can be explained as follows: A. Preparing the message: The message will be designed simply by making a substitution to each word in it by its corresponding DNA bases, as shown in Fig.2 Plain text (original message) : Hello world Cipher text (after substitution): CGTGC TTCGT A header sequence will be added. As an example: ACGTG CGTGC TTCGT The restriction sites will be added on each end [2,3]: GG*CCACGTGCGTGC TTCGT A*AGCTT-3` HaeIII site Hello world HindIII Fig.2: Preparing the message Then the message sequence will be synthesized by DNA synthesizer. B. Preparing the DNA vector:
3 DNA vector will be digested by the same restriction enzymes, and the vector will be gel purified and dephosphorylated. C. Embedding the message using the ligase enzyme: The message is digested and ligated to the dephosphorylated vector using DNA ligase enzyme. The recombinant vector and other vectors which carry dummy messages will be sent to the receiver. [4]. Example: If we want to embed (Hello world) into DNA, Fig.3 will explain the procedure: Get the mapped DNA message CC ACGTG CGTGC TTCGT Cut the vector with any two enzymes (HaeIII,HindIII) TAGG CCGTAGCTGCTCCA AGCTTGA Replace the cut fragment with the message fragment: TAGGCCACGTGCGTGCTTCGTAAGCTT GA Make the recombinant between the message Fig.3: Embedding the message using the ligase enzyme Fig.4 demonstrates this process using plasmid vector [Appendix A]. A In order to retrieve the embedded message at the receiver end, the next few steps should be followed: Recombinant vectors will be linearized by the two restriction enzymes (Key) into the DNA [7] molecule. In case of bacterial messages, bacteria will be cultured and vectors will be extracted first. The DNA molecule will be denatured and sequenced using specific DNA primer carrying key elements (i.e. header sequence such as: ACGTG). The DNA message will be codified Security Vulnerability: During the execution of the procedure, we have noticed that the words of the message must be sequential, and the utilized vector is short so it may be noticed by an attacker. Therefore, we suggest the following modifications Modifications: We propose two imperative modifications: To avoid the sequential words we will use a vector for each word in the message, And a sequence number for each vector. To overcome the shortness of the vector we will mix these vectors with other vectors having the same length. 2.2 Using DNA Mutagenesis In this method we use the mutation of the DNA nucleotides to change the nucleotides between two restriction sites of two selected restriction enzymes to the nucleotides of the message [Appendix C]. At the Sender End: Fig.5 gives details the procedure of hiding a message into DNA strand using DNA Mutagenesis. A. Prepare the message Fig.4: Recombinant the DNA using plasmids At the Receiver End: B. Scan specific DNA sequence for specific two restriction sites C. Use Mutagenesis technique to modify bases and create your DNA message
4 Fig.5: procedures of hiding message into specific DNA sequence using mutagenesis technique. This procedure can be explained as follows: A. Prepare the message: The message will be designed in the same way except that it will not be synthesized. B. Scan specific DNA sequence for specific two restriction sites: A specific DNA sequence will be scanned for the occurrence of specific two restriction sites of two selected restriction enzymes. C. Use DNA Mutagenesis to modify bases and create your DNA message: The bases will be modified using DNA mutagenesis technique to create the message [6]. Fig.6 will explain an example, If we want to embed (Hello world) into DNA then the message will be: CGTGC TTCGT If the original DNA sequence is: AGG*CCGTA*AGCTTAAGG*CCAAA*AGCTT With HaeIII (GG*CC), and HindIII (A*AGCTT) restriction sites. Use Mutagenesis to insert the bases encoding the message between the two restriction site sequences. AGGCC GT AAGCTTAAGGCC AA AAGCTT AGGCCCGTGCAAGCTTAAGGCCTTCGTAAGC TT [I b id d h l d b h Fig.6: Hiding message into DNA strand using DNA Mutagenesis. At the Receiver End: The next two steps are followed In order to retrieve the embedded message at the receiver end: DNA will be sequenced using specific DNA primer carrying the restriction site and other key elements (i.e. header and sequence number encoding sequences) [7]. The DNA message will be codified Security Vulnerability: During the execution of the procedure, we have noticed that the message may contain one of the target substrings of the cutting enzyme. Moreover, there are too many fragments will be found after cutting with enzymes which is very hard to get the message fragments. Also, the selected fragments are disordered, and that the mutagenesis technique is time and effort consuming. It is also more expensive than DNA recombinant technology Modifications: In order to overcome some or all of these vulnerabilities, we propose the following modifications: To avoid that the message may contain one of restriction enzymes target substring we must choose another enzyme. To avoid long search for the message fragments a header for each message fragment can be made. To avoid unordered fragments a sequence number for each message fragment can be made. Example: Choose ACGTG as header (The Key) And ACCTT as 1 And TTCGC as 2 And so on. Fig.7 will explain an example. TAGGCCACGTGACCTTCGTGCAAGC TT Fig.7: Adding the header and the sequence number In the next section, we will formalize all of these procedures in an algorithmic pseudo code. 3 Procedure of hiding a message onto DNA We propose a procedure, shown in [Appendix D] in a formal description, of hiding message into DNA file. In order to retrieve the message from the DNA file we use the previously demonstrated algorithm but in
5 a converse order. The next section outlines the details of the implementation of the proposed algorithm. 4 Implementation In this work we have developed a C# program with its associated the Database, as shown in [Appendix C], that can encrypt and decrypt utilizing a given DNA file. The process is summarized as follows: Defining the mapping table with limited vocabulary and their mapped DNA without any duplication. Defining all the restriction enzymes and their cutting substring (restriction sites). Searching in the DNA file for the number of occurrences for its substring (restriction site) for each enzyme. Input the message and the header for each fragment. Selecting any two restriction enzymes that will cut the DNA. [Note: The number of occurrences must exceed the number of words in the message.] Running the program and it will generate the final DNA file with the hidden message. To get the message back, the user is asked to input the fragment header and the two restriction enzymes. The program generates the message again from the DNA file. In the following section, we will summarize this report and provide conclusions. 5 Summary and conclusion The DNA is a good medium for data hiding because of its great length and high randomness, so we proposed a new steganographic technique based on the DNA, which is summarized as follows: At sender end, we encrypt the message by: Substitute each word to its corresponding DNA mapped word. Choose any two restriction enzymes. Replace the nucleotides between the two selected restriction sites with the message fragments using (DNA Recombinant or DNA Mutagenesis) and hide it in microdot. At receiver end, we decrypt the message by: Putting the restriction enzymes in the DNA molecule and run it in the Gel electrophoresis Getting all fragments that contain the header and arrange them according to the sequence number. Making the backward substitution to find the plain message. Based on the given discussion, we believe that this type of data hiding technique, or steganography, employing DNA strands has many potential applications not only as a security device but also in massive data storage applications. 6 References [1] Wendell M. Smith, "DNA Based Steganography for Security Marking," Xix International Security Printers Conferences, Montreux, May, [2] Bruce Williams, "Restriction Endonucleases," com/data/endonucleases.html, August [3] Bruce Williams, Cutting DNA Close to Ends," ml, USA, April 7, [4] John W. Kimball, "Recombinant DNA and Gene Cloning, " comcast.net /~john.kimball1/biologypages /R/RecombinantDNA.html, 24 May [5] Site: worldenglish.org "The 500 Most Commonly Used Words in the English Language, 00.htm, [6] L.-J. Zhao, Q.X.Zhang, R.Padmanabhan, Recombinant DNA Methodology II, book, [7] LabBench Activity, "Cutting DNA with RestrictionEnzymes," cience/biology_place/labbench/lab6/cutdna.html, [8] Ashish Gehani, Thomas LaBean, and John Reif, DNA-Based Cryptography, IMACS DNA-Based Computers V, American Mathematical Society, USA, 2000.
6 Appendix A: DNA Recombinant DNA Recombinant: Two or more DNA strands are incorporated into a single recombinant molecule. Plasmid vectors are small circular molecules of double stranded DNA derived from natural plasmids that occur in bacterial cells. A piece of DNA can be inserted into a plasmid if both the circular plasmid and the source of DNA have recognition sites for the same restriction endonuclease. The plasmid and the foreign DNA are cut by this restriction endonuclease (EcoRI in this example) producing intermediates with sticky and complementary ends. Those two intermediates recombine by base- pairing and are linked by the action of DNA ligase. A new plasmid containing the foreign DNA as an insert is obtained. The new plasmid can be introduced into bacterial cells that can produce many copies of the inserted DNA. This technique is called DNA cloning. There is another cloning vector-like: Lambda phage, cosmid and yeast artificial chromosome (YAC). Appendix B: Database dictionary Enzyme Table: Variable name ID Enzyme_Name Sub_String Data Type numeric(18,0), char(10), char(10) Save the entire Enzymes list and their target substrings. Mapping Table: Variable name Data Type ID numeric(18,0), Alphabet char(10), Mapping char(10) Save all the 1024 words&their DNA mapping. Appendix C: DNA Mutagenesis Mutation: Is change of the DNA sequence within a gene or chromosome of an organism resulting in the creation of a new character or trait not found in the parental type. The process by which such a change occurs in a chromosome, either through an alteration in the nucleotide sequence of the DNA coding for a gene or through a change in the physical arrangement of a chromosome. For example :Insertion and Deletion (InDel) Mutation,Fig.8 will explain the example. Moose+0: ggt tct cta tta gga gtt tgc tta atc tta gaa atc G S L L G V C L I L E I Moose+1: ggt tct cta tta Tgg agt ttg ctt aat ctt aga aat c G S L L W S L L N L * Moose-1: g ggt tct cta ttavgag ttt gct taa tct tag aaa tc G S L L E F A * Moose+2: ggt tct cta tta TTg gag ttt gct taa tct tag aaa tc G S L L L E F A * Moose-2: gg ggt tct cta ttav agt ttg ctt aat ctt aga aat c G S L L S L L N L * Moose+3: ggt tct cta tta TTA gga gtt tgc tta atc tta gaa atc G S L L L G V C L I L E I Moose-3: gga ggt tct cta ttavgtt tgc tta atc tta gaa atc G S L L V C L I L E I The first line shows the standard moose sequence, with 4th, 5th, and 6th triplets highlighted. The second and third lines show a single-nucleotide insertion (T) or deletion (V) at the fifth triplet. The fourth and fifth lines show a double-nucleotide insertion (TT) or deletion (V) at the fifth triplet. Lines 6 and 7 show a triplet insertion (TTA), or deletion (V) of the fifth triplet. Fig.8: InDel Mutations.
7 Appendix D: Formal description of The proposed procedure In the following pseudo code, we describe the proposed procedure in a formal approach. Algorithm of hiding message into DNA text file [Given a DNA text file D, List of enzymes and its target substrings (Enzymes K,2 ), List of vocabulary and its DNA mapping (Mapping M,2 ), EnzymesAndOccurrences K,2 ] Input: D, Enzymes K,2, Mapping M,2, Message,NumberOfWords Output: NewD with the hidden message Algorithm Body: NumberOfEnzyme := K for i = 1 to NumberOfEnzyme // loop for all known enzymes to get the number of occurrences EnzymesAndOccurrences K,0 := Enzymes K,0 EnzymesAndOccurrences K,1 := GetNumberOfOccurrance(Enzymes K,1 ) next i // Function to get the number of occurrences of each target substring int GetNumberOfOccurrance(TargetSubString) begin function S := Read From D (DNA file) Count := 0 While (S Contains TargetSubString) Count := Count + 1 S := S started from Position of TargetSubString End while return Count End function // Procedure of hiding words of the message into the DNA file using two restriction enzymes S := Read from D (DNA file) Target1 := The target substring of Enzyme1 Target2 := The target substring of Enzyme2 S_before := "" for i := 1 to NumberOfWords position1 := The position of Target1 position2 := The position of Target2 while (position2 > position1) S_before := S_before + S to position1 S := S from position1 to End position1 := The position of Target1 position2 := The position of Target2 end while S := S from position2 to End Msg := S_before and DNAword and Target2 // Test if the message contains one of the target substrings if (!TestMessage(Msg)) then do Error Message Break else Write to NewD (the new DNA File) end do next i End Algorithm.
On Covert Data Communication Channels Employing DNA Steganography with Application in Massive Data Storage
ARAB ACADEMY FOR SCIENCE, TECHNOLOGY AND MARITIME TRANSPORT COLLEGE OF ENGINEERING AND TECHNOLOGY COMPUTER ENGINEERING DEPARTMENT On Covert Data Communication Channels Employing DNA Steganography with
GENEWIZ, Inc. DNA Sequencing Service Details for USC Norris Comprehensive Cancer Center DNA Core
DNA Sequencing Services Pre-Mixed o Provide template and primer, mixed into the same tube* Pre-Defined o Provide template and primer in separate tubes* Custom o Full-service for samples with unknown concentration
restriction enzymes 350 Home R. Ward: Spring 2001
restriction enzymes 350 Home Restriction Enzymes (endonucleases): molecular scissors that cut DNA Properties of widely used Type II restriction enzymes: recognize a single sequence of bases in dsdna, usually
Recombinant DNA & Genetic Engineering. Tools for Genetic Manipulation
Recombinant DNA & Genetic Engineering g Genetic Manipulation: Tools Kathleen Hill Associate Professor Department of Biology The University of Western Ontario Tools for Genetic Manipulation DNA, RNA, cdna
DNA Scissors: Introduction to Restriction Enzymes
DNA Scissors: Introduction to Restriction Enzymes Objectives At the end of this activity, students should be able to 1. Describe a typical restriction site as a 4- or 6-base- pair palindrome; 2. Describe
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
DNA Sample preparation and Submission Guidelines
DNA Sample preparation and Submission Guidelines Requirements: Please submit samples in 1.5ml microcentrifuge tubes. Fill all the required information in the Eurofins DNA sequencing order form and send
HCS604.03 Exercise 1 Dr. Jones Spring 2005. Recombinant DNA (Molecular Cloning) exercise:
HCS604.03 Exercise 1 Dr. Jones Spring 2005 Recombinant DNA (Molecular Cloning) exercise: The purpose of this exercise is to learn techniques used to create recombinant DNA or clone genes. You will clone
CCR Biology - Chapter 9 Practice Test - Summer 2012
Name: Class: Date: CCR Biology - Chapter 9 Practice Test - Summer 2012 Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Genetic engineering is possible
HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2
HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2 1 Tata Consultancy Services, India [email protected] 2 Bangalore University, India ABSTRACT
DNA Technology Mapping a plasmid digesting How do restriction enzymes work?
DNA Technology Mapping a plasmid A first step in working with DNA is mapping the DNA molecule. One way to do this is to use restriction enzymes (restriction endonucleases) that are naturally found in bacteria
pcas-guide System Validation in Genome Editing
pcas-guide System Validation in Genome Editing Tagging HSP60 with HA tag genome editing The latest tool in genome editing CRISPR/Cas9 allows for specific genome disruption and replacement in a flexible
(http://genomes.urv.es/caical) TUTORIAL. (July 2006)
(http://genomes.urv.es/caical) TUTORIAL (July 2006) CAIcal manual 2 Table of contents Introduction... 3 Required inputs... 5 SECTION A Calculation of parameters... 8 SECTION B CAI calculation for FASTA
The E. coli Insulin Factory
The E. coli Insulin Factory BACKGROUND Bacteria have not only their normal DNA, they also have pieces of circular DNA called plasmids. Plasmids are a wonderfully ally for biologists who desire to get bacteria
Biotechnology: DNA Technology & Genomics
Chapter 20. Biotechnology: DNA Technology & Genomics 2003-2004 The BIG Questions How can we use our knowledge of DNA to: diagnose disease or defect? cure disease or defect? change/improve organisms? What
pcmv6-neo Vector Application Guide Contents
pcmv6-neo Vector Application Guide Contents Package Contents and Storage Conditions... 2 Product Description... 2 Introduction... 2 Production and Quality Assurance... 2 Methods... 3 Other required reagents...
CHAPTER 6: RECOMBINANT DNA TECHNOLOGY YEAR III PHARM.D DR. V. CHITRA
CHAPTER 6: RECOMBINANT DNA TECHNOLOGY YEAR III PHARM.D DR. V. CHITRA INTRODUCTION DNA : DNA is deoxyribose nucleic acid. It is made up of a base consisting of sugar, phosphate and one nitrogen base.the
Part ONE. a. Assuming each of the four bases occurs with equal probability, how many bits of information does a nucleotide contain?
Networked Systems, COMPGZ01, 2012 Answer TWO questions from Part ONE on the answer booklet containing lined writing paper, and answer ALL questions in Part TWO on the multiple-choice question answer sheet.
UNIVERSITETET I OSLO Det matematisk-naturvitenskapelige fakultet
1 UNIVERSITETET I OSLO Det matematisk-naturvitenskapelige fakultet Exam in: MBV4010 Arbeidsmetoder i molekylærbiologi og biokjemi I MBV4010 Methods in molecular biology and biochemistry I Day of exam:.
10 µg lyophilized plasmid DNA (store lyophilized plasmid at 20 C)
TECHNICAL DATA SHEET BIOLUMINESCENCE RESONANCE ENERGY TRANSFER RENILLA LUCIFERASE FUSION PROTEIN EXPRESSION VECTOR Product: prluc-c Vectors Catalog number: Description: Amount: The prluc-c vectors contain
AP BIOLOGY 2007 SCORING GUIDELINES
AP BIOLOGY 2007 SCORING GUIDELINES Question 4 A bacterial plasmid is 100 kb in length. The plasmid DNA was digested to completion with two restriction enzymes in three separate treatments: EcoRI, HaeIII,
Gene Synthesis 191. Mutagenesis 194. Gene Cloning 196. AccuGeneBlock Service 198. Gene Synthesis FAQs 201. User Protocol 204
Gene Synthesis 191 Mutagenesis 194 Gene Cloning 196 AccuGeneBlock Service 198 Gene Synthesis FAQs 201 User Protocol 204 Gene Synthesis Overview Gene synthesis is the most cost-effective way to enhance
SERVICES CATALOGUE WITH SUBMISSION GUIDELINES
SERVICES CATALOGUE WITH SUBMISSION GUIDELINES 3921 Montgomery Road Cincinnati, Ohio 45212 513-841-2428 www.agctsequencing.com CONTENTS Welcome Dye Terminator Sequencing DNA Sequencing Services - Full Service
Bio 102 Practice Problems Recombinant DNA and Biotechnology
Bio 102 Practice Problems Recombinant DNA and Biotechnology Multiple choice: Unless otherwise directed, circle the one best answer: 1. Which of the following DNA sequences could be the recognition site
Recombinant DNA Technology
Recombinant DNA Technology Dates in the Development of Gene Cloning: 1965 - plasmids 1967 - ligase 1970 - restriction endonucleases 1972 - first experiments in gene splicing 1974 - worldwide moratorium
Provincial Exam Questions. 9. Give one role of each of the following nucleic acids in the production of an enzyme.
Provincial Exam Questions Unit: Cell Biology: Protein Synthesis (B7 & B8) 2010 Jan 3. Describe the process of translation. (4 marks) 2009 Sample 8. What is the role of ribosomes in protein synthesis? A.
Coding sequence the sequence of nucleotide bases on the DNA that are transcribed into RNA which are in turn translated into protein
Assignment 3 Michele Owens Vocabulary Gene: A sequence of DNA that instructs a cell to produce a particular protein Promoter a control sequence near the start of a gene Coding sequence the sequence of
1. Molecular computation uses molecules to represent information and molecular processes to implement information processing.
Chapter IV Molecular Computation These lecture notes are exclusively for the use of students in Prof. MacLennan s Unconventional Computation course. c 2013, B. J. MacLennan, EECS, University of Tennessee,
Gene Mapping Techniques
Gene Mapping Techniques OBJECTIVES By the end of this session the student should be able to: Define genetic linkage and recombinant frequency State how genetic distance may be estimated State how restriction
Recombinant DNA Unit Exam
Recombinant DNA Unit Exam Question 1 Restriction enzymes are extensively used in molecular biology. Below are the recognition sites of two of these enzymes, BamHI and BclI. a) BamHI, cleaves after the
Recombinant DNA and Biotechnology
Recombinant DNA and Biotechnology Chapter 18 Lecture Objectives What Is Recombinant DNA? How Are New Genes Inserted into Cells? What Sources of DNA Are Used in Cloning? What Other Tools Are Used to Study
(A) Microarray analysis was performed on ATM and MDM isolated from 4 obese donors.
Legends of supplemental figures and tables Figure 1: Overview of study design and results. (A) Microarray analysis was performed on ATM and MDM isolated from 4 obese donors. After raw data gene expression
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Lecture 13: DNA Technology. DNA Sequencing. DNA Sequencing Genetic Markers - RFLPs polymerase chain reaction (PCR) products of biotechnology
Lecture 13: DNA Technology DNA Sequencing Genetic Markers - RFLPs polymerase chain reaction (PCR) products of biotechnology DNA Sequencing determine order of nucleotides in a strand of DNA > bases = A,
PRACTICE TEST QUESTIONS
PART A: MULTIPLE CHOICE QUESTIONS PRACTICE TEST QUESTIONS DNA & PROTEIN SYNTHESIS B 1. One of the functions of DNA is to A. secrete vacuoles. B. make copies of itself. C. join amino acids to each other.
Genetic Technology. Name: Class: Date: Multiple Choice Identify the choice that best completes the statement or answers the question.
Name: Class: Date: Genetic Technology Multiple Choice Identify the choice that best completes the statement or answers the question. 1. An application of using DNA technology to help environmental scientists
2. The number of different kinds of nucleotides present in any DNA molecule is A) four B) six C) two D) three
Chem 121 Chapter 22. Nucleic Acids 1. Any given nucleotide in a nucleic acid contains A) two bases and a sugar. B) one sugar, two bases and one phosphate. C) two sugars and one phosphate. D) one sugar,
Mutations and Genetic Variability. 1. What is occurring in the diagram below?
Mutations and Genetic Variability 1. What is occurring in the diagram below? A. Sister chromatids are separating. B. Alleles are independently assorting. C. Genes are replicating. D. Segments of DNA are
a. Ribosomal RNA rrna a type ofrna that combines with proteins to form Ribosomes on which polypeptide chains of proteins are assembled
Biology 101 Chapter 14 Name: Fill-in-the-Blanks Which base follows the next in a strand of DNA is referred to. as the base (1) Sequence. The region of DNA that calls for the assembly of specific amino
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Basic Concepts Recombinant DNA Use with Chapter 13, Section 13.2
Name Date lass Master 19 Basic oncepts Recombinant DN Use with hapter, Section.2 Formation of Recombinant DN ut leavage Splicing opyright lencoe/mcraw-hill, a division of he Mcraw-Hill ompanies, Inc. Bacterial
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
Chapter 6 DNA Replication
Chapter 6 DNA Replication Each strand of the DNA double helix contains a sequence of nucleotides that is exactly complementary to the nucleotide sequence of its partner strand. Each strand can therefore
Genetic information (DNA) determines structure of proteins DNA RNA proteins cell structure 3.11 3.15 enzymes control cell chemistry ( metabolism )
Biology 1406 Exam 3 Notes Structure of DNA Ch. 10 Genetic information (DNA) determines structure of proteins DNA RNA proteins cell structure 3.11 3.15 enzymes control cell chemistry ( metabolism ) Proteins
Structure and Function of DNA
Structure and Function of DNA DNA and RNA Structure DNA and RNA are nucleic acids. They consist of chemical units called nucleotides. The nucleotides are joined by a sugar-phosphate backbone. The four
Molecular analyses of EGFR: mutation and amplification detection
Molecular analyses of EGFR: mutation and amplification detection Petra Nederlof, Moleculaire Pathologie NKI Amsterdam Henrique Ruijter, Ivon Tielen, Lucie Boerrigter, Aafke Ariaens Outline presentation
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
TransformAid Bacterial Transformation Kit
Home Contacts Order Catalog Support Search Alphabetical Index Numerical Index Restriction Endonucleases Modifying Enzymes PCR Kits Markers Nucleic Acids Nucleotides & Oligonucleotides Media Transfection
Expression and Purification of Recombinant Protein in bacteria and Yeast. Presented By: Puspa pandey, Mohit sachdeva & Ming yu
Expression and Purification of Recombinant Protein in bacteria and Yeast Presented By: Puspa pandey, Mohit sachdeva & Ming yu DNA Vectors Molecular carriers which carry fragments of DNA into host cell.
Hiding Color Images in DNA Sequences
Hiding Color Images in DNA Sequences Marc B. Beck*, Roman V. Yampolskiy Cybersecurity Lab, Department of Computer Engineering and Computer Science, Speed School of Engineering, University of Louisville,
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
Green Fluorescent Protein (GFP): Genetic Transformation, Synthesis and Purification of the Recombinant Protein
Green Fluorescent Protein (GFP): Genetic Transformation, Synthesis and Purification of the Recombinant Protein INTRODUCTION Green Fluorescent Protein (GFP) is a novel protein produced by the bioluminescent
DNA Fingerprinting. Unless they are identical twins, individuals have unique DNA
DNA Fingerprinting Unless they are identical twins, individuals have unique DNA DNA fingerprinting The name used for the unambiguous identifying technique that takes advantage of differences in DNA sequence
The sequence of bases on the mrna is a code that determines the sequence of amino acids in the polypeptide being synthesized:
Module 3F Protein Synthesis So far in this unit, we have examined: How genes are transmitted from one generation to the next Where genes are located What genes are made of How genes are replicated How
Biotechnology and Recombinant DNA (Chapter 9) Lecture Materials for Amy Warenda Czura, Ph.D. Suffolk County Community College
Biotechnology and Recombinant DNA (Chapter 9) Lecture Materials for Amy Warenda Czura, Ph.D. Suffolk County Community College Primary Source for figures and content: Eastern Campus Tortora, G.J. Microbiology
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
Gene Cloning. Reference. T.A. Brown, Gene Cloning, Chapman and Hall. S.B. Primrose, Molecular Biotechnology, Blackwell
Gene Cloning 2004 Seungwook Kim Chem. & Bio. Eng. Reference T.A. Brown, Gene Cloning, Chapman and Hall S.B. Primrose, Molecular Biotechnology, Blackwell Why Gene Cloning is Important? A century ago, Gregor
MORPHEUS. http://biodev.cea.fr/morpheus/ Prediction of Transcription Factors Binding Sites based on Position Weight Matrix.
MORPHEUS http://biodev.cea.fr/morpheus/ Prediction of Transcription Factors Binding Sites based on Position Weight Matrix. Reference: MORPHEUS, a Webtool for Transcripton Factor Binding Analysis Using
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Gene and Chromosome Mutation Worksheet (reference pgs. 239-240 in Modern Biology textbook)
Name Date Per Look at the diagrams, then answer the questions. Gene Mutations affect a single gene by changing its base sequence, resulting in an incorrect, or nonfunctional, protein being made. (a) A
ISTEP+: Biology I End-of-Course Assessment Released Items and Scoring Notes
ISTEP+: Biology I End-of-Course Assessment Released Items and Scoring Notes Page 1 of 22 Introduction Indiana students enrolled in Biology I participated in the ISTEP+: Biology I Graduation Examination
Arabidopsis. A Practical Approach. Edited by ZOE A. WILSON Plant Science Division, School of Biological Sciences, University of Nottingham
Arabidopsis A Practical Approach Edited by ZOE A. WILSON Plant Science Division, School of Biological Sciences, University of Nottingham OXPORD UNIVERSITY PRESS List of Contributors Abbreviations xv xvu
Thermo Scientific Phusion Site-Directed Mutagenesis Kit #F-541
PRODUCT INFORMATION Thermo Scientific Phusion Site-Directed Mutagenesis Kit #F-541 Lot _ Store at -20 C Expiry Date _ www.thermoscientific.com/onebio CERTIFICATE OF ANALYSIS The Phusion Site-Directed Mutagenesis
Genetics Test Biology I
Genetics Test Biology I Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Avery s experiments showed that bacteria are transformed by a. RNA. c. proteins.
2006 7.012 Problem Set 3 KEY
2006 7.012 Problem Set 3 KEY Due before 5 PM on FRIDAY, October 13, 2006. Turn answers in to the box outside of 68-120. PLEASE WRITE YOUR ANSWERS ON THIS PRINTOUT. 1. Which reaction is catalyzed by each
The Techniques of Molecular Biology: Forensic DNA Fingerprinting
Revised Fall 2011 The Techniques of Molecular Biology: Forensic DNA Fingerprinting The techniques of molecular biology are used to manipulate the structure and function of molecules such as DNA and proteins
Compiled and/or written by Amy B. Vento and David R. Gillum
Fact Sheet Describing Recombinant DNA and Elements Utilizing Recombinant DNA Such as Plasmids and Viral Vectors, and the Application of Recombinant DNA Techniques in Molecular Biology Compiled and/or written
RNA & Protein Synthesis
RNA & Protein Synthesis Genes send messages to cellular machinery RNA Plays a major role in process Process has three phases (Genetic) Transcription (Genetic) Translation Protein Synthesis RNA Synthesis
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Difficult DNA Templates Sequencing. Primer Walking Service
Difficult DNA Templates Sequencing Primer Walking Service Result 16/18s (ITS 5.8s) rrna Sequencing Phylogenetic tree 16s rrna Region ITS rrna Region ITS and 26s rrna Region Order and Result Cloning Service
Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
Network Security Chapter 12 Learning Objectives After reading this chapter, you should be able to: Recognize the basic forms of system attacks Recognize the concepts underlying physical protection measures
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography
CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What
Hands on Simulation of Mutation
Hands on Simulation of Mutation Charlotte K. Omoto P.O. Box 644236 Washington State University Pullman, WA 99164-4236 [email protected] ABSTRACT This exercise is a hands-on simulation of mutations and their
Genetics Lecture Notes 7.03 2005. Lectures 1 2
Genetics Lecture Notes 7.03 2005 Lectures 1 2 Lecture 1 We will begin this course with the question: What is a gene? This question will take us four lectures to answer because there are actually several
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
LAB 7 DNA RESTRICTION for CLONING
BIOTECHNOLOGY I DNA RESTRICTION FOR CLONING LAB 7 DNA RESTRICTION for CLONING STUDENT GUIDE GOALS The goals of this lab are to provide the biotech student with experience in DNA digestion with restriction
A Brief Guide to Interpreting the DNA Sequencing Electropherogram Version 3.0
A Brief Guide to Interpreting the DNA Sequencing Electropherogram Version 3.0 Plant-Microbe Genomics Facility The Ohio State University 484 W.12 th Ave., Columbus, OH 43210 Ph: 614/247-6204 FAX: 614/247-8696
TITRATION OF raav (VG) USING QUANTITATIVE REAL TIME PCR
Page 1 of 5 Materials DNase digestion buffer [13 mm Tris-Cl, ph7,5 / 5 mm MgCl2 / 0,12 mm CaCl2] RSS plasmid ptr-uf11 SV40pA Forward primer (10µM) AGC AAT AGC ATC ACA AAT TTC ACA A SV40pA Reverse Primer
International Language Character Code
, pp.161-166 http://dx.doi.org/10.14257/astl.2015.81.33 International Language Character Code with DNA Molecules Wei Wang, Zhengxu Zhao, Qian Xu School of Information Science and Technology, Shijiazhuang
Chapter 8: Recombinant DNA 2002 by W. H. Freeman and Company Chapter 8: Recombinant DNA 2002 by W. H. Freeman and Company
Genetic engineering: humans Gene replacement therapy or gene therapy Many technical and ethical issues implications for gene pool for germ-line gene therapy what traits constitute disease rather than just
Hill s Cipher: Linear Algebra in Cryptography
Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a
Inverse PCR & Cycle Sequencing of P Element Insertions for STS Generation
BDGP Resources Inverse PCR & Cycle Sequencing of P Element Insertions for STS Generation For recovery of sequences flanking PZ, PlacW and PEP elements E. Jay Rehm Berkeley Drosophila Genome Project I.
PAPER RFLP TEACHER GUIDE
PAPER RFLP TEACHER GUIDE Paper = DNA Scissors = Restriction Enzyme Desktop = Electrophoresis NOTE: There are TWO versions of this activity one where the students write their own sentences (to represent
4. DNA replication Pages: 979-984 Difficulty: 2 Ans: C Which one of the following statements about enzymes that interact with DNA is true?
Chapter 25 DNA Metabolism Multiple Choice Questions 1. DNA replication Page: 977 Difficulty: 2 Ans: C The Meselson-Stahl experiment established that: A) DNA polymerase has a crucial role in DNA synthesis.
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Description: Molecular Biology Services and DNA Sequencing
Description: Molecular Biology s and DNA Sequencing DNA Sequencing s Single Pass Sequencing Sequence data only, for plasmids or PCR products Plasmid DNA or PCR products Plasmid DNA: 20 100 ng/μl PCR Product:
