Research Article

Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol

by  Harry C. Shaw, Sayed Hussein, Hermann Helgert
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Issue 3
Published: October 2012
Authors: Harry C. Shaw, Sayed Hussein, Hermann Helgert
10.5120/8868-2840
PDF

Harry C. Shaw, Sayed Hussein, Hermann Helgert . Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol. International Journal of Computer Applications. 56, 3 (October 2012), 1-5. DOI=10.5120/8868-2840

                        @article{ 10.5120/8868-2840,
                        author  = { Harry C. Shaw,Sayed Hussein,Hermann Helgert },
                        title   = { Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 56 },
                        number  = { 3 },
                        pages   = { 1-5 },
                        doi     = { 10.5120/8868-2840 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Harry C. Shaw
                        %A Sayed Hussein
                        %A Hermann Helgert
                        %T Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol%T 
                        %J International Journal of Computer Applications
                        %V 56
                        %N 3
                        %P 1-5
                        %R 10.5120/8868-2840
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

We address the problem of creating an adaptive source coding algorithm for a genomic encryption protocol using a small alphabet such as the nucleotide bases represented in the genetic code. For codewords derived from an alphabet of N plaintext with probability of occurrence, p, we describe a mapping into a floating point representation of the codewords which are translated into genomic codewords derived from a novel modification of the Shannon-Fano-Elias coding process. Errors in the reverse decoding process are processed through an adaptive, self-correcting codebook to determine the best fit codeword decoding solution. A genetic algorithmic approach to error correction within the source coding is also summarized.

References
  • H. Shaw and S. Hussein, "A DNA-Inspired Encryption Methodology for Secure, Mobile Ad-Hoc Networks (MANET), Proceedings of the First International Conference on Biomedical Electronics and Devices, BIOSIGNALS 2008, Funchal, Madeira, Portugal, vol. 2, pp. 472-477, January 28-31, 2008
  • A. Gehani, T. LaBean, and J. Reif, "DNA-based Cryptography, Aspects of Molecular Computing", Springer-Verlag Lecture Notes in Computer Science, vol. 2950, pp. 167-188, 2004.
  • H. Shaw, S. Hussein, and H. Helgert, "Genomics-based Security Protocols: From Plaintext to Cipherprotein", International Journal on Advances in Security, vol. 4 no 1 & 2, 2011
  • M. Ehrlich and R. Y. Wang, "5-Methylcytosine in eukaryotic DNA", Science 19 June 1981: Vol. 212 no. 4501 pp. 1350-1357
  • J. M. Berg, J. L. Tymoczko, and L. Stryer, Biochemistry. 5th edition (online ed,), New York: W H Freeman; 2002, sec. 27. 6. 1
  • H. Singh, K. Chugh, H. Dhaka and A. K. Verma, "DNA based Cryptography: an Approach to Secure Mobile Networks", International Journal of Computer Applications 1(1):77–80, February 2010.
  • P. Vijayakumar, V. Vijayalakshmi and G. Zayaraz. "DNA Computing based Elliptic Curve Cryptography", International Journal of Computer Applications 36(4):18-21, December 2011
  • S. Sadeg, M. Gougache, N. Mansouri, and H. Drias, "An encryption algorithm inspired from DNA", Machine and Web Intelligence (ICMWI), 2010 International Conference on, 3-5 Oct. 2010, pp. 344 - 349
  • N. G. Bourbakis, "Image Data Compression-Encryption Using G-Scan Patterns", Systems, Man, and Cybernetics, IEEE International Conference on Computational Cybernetics and Simulation, vol. 2, pp. 1117—1120, October 1997
  • A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, "Cryptography with DNA binary strands", BioSystems, vol. 57, issue 1, pp. 13-22, June 2000
  • C. T. Clelland, V. Risca, and C. Bancroft, "Hiding Messages in DNA microdots", Nature, vol. 399, pp. 533—534, June 1999
  • D. Heider and A. Barnekow, "DNA-based watermarks using the DNA-Crypt algorithm", BMC Bioinformatics, vol. 8, pp. 176, May 2007
  • D. Heider and A. Barnekow, "DNA watermarks: A proof of concept", BMC Molecular Biology 2008, vol. 9, p, 40
  • T. M. Cover and J. A. Thomas, 2006, Elements of Information Theory, 2nd Ed. , Wiley Interscience
  • C. M. Fraser, J. D. Gocayne, O. White, M. D Adams, R. A. Clayton, R. D. Fleischmann, et al. , "The Minimal Gene Complement of Mycoplasma genitalium", Science, vol. 270, No. 5235, pp. 397-403, Oct. 20, 1995
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Source coding genetic algorithms probability mass functions. Shannon-Fano-Elias

Powered by PhDFocusTM