CFP last date
20 May 2024
Reseach Article

Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol

by Harry C. Shaw, Sayed Hussein, Hermann Helgert
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 3
Year of Publication: 2012
Authors: Harry C. Shaw, Sayed Hussein, Hermann Helgert
10.5120/8868-2840

Harry C. Shaw, Sayed Hussein, Hermann Helgert . Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol. International Journal of Computer Applications. 56, 3 ( October 2012), 1-5. DOI=10.5120/8868-2840

@article{ 10.5120/8868-2840,
author = { Harry C. Shaw, Sayed Hussein, Hermann Helgert },
title = { Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 3 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number3/8868-2840/ },
doi = { 10.5120/8868-2840 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:57:52.680771+05:30
%A Harry C. Shaw
%A Sayed Hussein
%A Hermann Helgert
%T Adaptive Self-Correcting Floating Point Source Coding Methodology for a Genomic Encryption Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 3
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We address the problem of creating an adaptive source coding algorithm for a genomic encryption protocol using a small alphabet such as the nucleotide bases represented in the genetic code. For codewords derived from an alphabet of N plaintext with probability of occurrence, p, we describe a mapping into a floating point representation of the codewords which are translated into genomic codewords derived from a novel modification of the Shannon-Fano-Elias coding process. Errors in the reverse decoding process are processed through an adaptive, self-correcting codebook to determine the best fit codeword decoding solution. A genetic algorithmic approach to error correction within the source coding is also summarized.

References
  1. H. Shaw and S. Hussein, "A DNA-Inspired Encryption Methodology for Secure, Mobile Ad-Hoc Networks (MANET), Proceedings of the First International Conference on Biomedical Electronics and Devices, BIOSIGNALS 2008, Funchal, Madeira, Portugal, vol. 2, pp. 472-477, January 28-31, 2008
  2. A. Gehani, T. LaBean, and J. Reif, "DNA-based Cryptography, Aspects of Molecular Computing", Springer-Verlag Lecture Notes in Computer Science, vol. 2950, pp. 167-188, 2004.
  3. H. Shaw, S. Hussein, and H. Helgert, "Genomics-based Security Protocols: From Plaintext to Cipherprotein", International Journal on Advances in Security, vol. 4 no 1 & 2, 2011
  4. M. Ehrlich and R. Y. Wang, "5-Methylcytosine in eukaryotic DNA", Science 19 June 1981: Vol. 212 no. 4501 pp. 1350-1357
  5. J. M. Berg, J. L. Tymoczko, and L. Stryer, Biochemistry. 5th edition (online ed,), New York: W H Freeman; 2002, sec. 27. 6. 1
  6. H. Singh, K. Chugh, H. Dhaka and A. K. Verma, "DNA based Cryptography: an Approach to Secure Mobile Networks", International Journal of Computer Applications 1(1):77–80, February 2010.
  7. P. Vijayakumar, V. Vijayalakshmi and G. Zayaraz. "DNA Computing based Elliptic Curve Cryptography", International Journal of Computer Applications 36(4):18-21, December 2011
  8. S. Sadeg, M. Gougache, N. Mansouri, and H. Drias, "An encryption algorithm inspired from DNA", Machine and Web Intelligence (ICMWI), 2010 International Conference on, 3-5 Oct. 2010, pp. 344 - 349
  9. N. G. Bourbakis, "Image Data Compression-Encryption Using G-Scan Patterns", Systems, Man, and Cybernetics, IEEE International Conference on Computational Cybernetics and Simulation, vol. 2, pp. 1117—1120, October 1997
  10. A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, "Cryptography with DNA binary strands", BioSystems, vol. 57, issue 1, pp. 13-22, June 2000
  11. C. T. Clelland, V. Risca, and C. Bancroft, "Hiding Messages in DNA microdots", Nature, vol. 399, pp. 533—534, June 1999
  12. D. Heider and A. Barnekow, "DNA-based watermarks using the DNA-Crypt algorithm", BMC Bioinformatics, vol. 8, pp. 176, May 2007
  13. D. Heider and A. Barnekow, "DNA watermarks: A proof of concept", BMC Molecular Biology 2008, vol. 9, p, 40
  14. T. M. Cover and J. A. Thomas, 2006, Elements of Information Theory, 2nd Ed. , Wiley Interscience
  15. C. M. Fraser, J. D. Gocayne, O. White, M. D Adams, R. A. Clayton, R. D. Fleischmann, et al. , "The Minimal Gene Complement of Mycoplasma genitalium", Science, vol. 270, No. 5235, pp. 397-403, Oct. 20, 1995
Index Terms

Computer Science
Information Sciences

Keywords

Source coding genetic algorithms probability mass functions. Shannon-Fano-Elias