0% found this document useful (0 votes)
10 views12 pages

A Review of DNA Cryptography

This review article discusses DNA cryptography, an emerging field that utilizes the biological properties of DNA for information security. It covers foundational concepts, two types of DNA cryptography (pseudo-DNA and natural DNA), and highlights challenges such as measurability and standard protocols. The authors also outline future directions for the development of DNA cryptography to enhance data security in the digital age.

Uploaded by

Alexandre Chaves
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views12 pages

A Review of DNA Cryptography

This review article discusses DNA cryptography, an emerging field that utilizes the biological properties of DNA for information security. It covers foundational concepts, two types of DNA cryptography (pseudo-DNA and natural DNA), and highlights challenges such as measurability and standard protocols. The authors also outline future directions for the development of DNA cryptography to enhance data security in the digital age.

Uploaded by

Alexandre Chaves
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

REVIEW ARTICLE

A Review of DNA Cryptography


Ling Chu1†, Yanqing Su1†, Xiangyu Yao1, Peng Xu1,2,3*, and Wenbin Liu1,3*
Citation: Chu L, Su Y, Yao X, Xu P,
1
Institute of Computing Science and Technology, Guangzhou University, Guangzhou, Guangdong, China. Liu W. A Review of DNA Cryptography.
2 Intell. Comput. 2025;4:Article
School of Computer Science of Information Technology, Qiannan Normal University for Nationalities,
0106. https://doi.org/10.34133/
Duyun, Guizhou, China. 3Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image icomputing.0106
Analysis and Application, Guangzhou, Guangdong, China.
Submitted 15 April 2024
Revised 8 July 2024
*Address correspondence to: [email protected] (W.L.); [email protected] (P.X.) Accepted 9 October 2024
†These authors contributed equally to this work. Published 17 January 2025

Copyright © 2025 Ling Chu et al.


Deoxyribonucleic acid (DNA), the oldest natural storage medium, offers a highly promising mode for Exclusive licensee Zhejiang Lab. No
information computing and storage with its high information density, low maintenance costs, and the ability claim to original U.S. Government
to do parallel processing. DNA cryptography is an emerging discipline focused on achieving information Works. Distributed under a Creative
security within this new paradigm. In this paper, we first present the foundational concepts of cryptography Commons Attribution License
and biological technologies involved in DNA cryptography. We then comprehensively review 2 types of DNA (CC BY 4.0).

Downloaded from https://spj.science.org on May 25, 2025


cryptography: pseudo-DNA cryptography and natural DNA cryptography. After summarizing and discussing
the security foundations of these cryptographic methods, we highlight the main challenges relating to
measurability, standard protocols, robustness, and operability. Finally, we outline future directions for DNA
cryptography, hoping to facilitate the evolution of this nascent field.

Introduction synthesis, preservation, amplification, sequencing, and decoding)


as shown in Fig. 1. For example, not knowing the key primers
With the rapid development of emerging technologies such as makes it difficult to amplify the target DNA sequences; the trans-
cloud computing and artificial intelligence, global digital data formation of the origami structure makes it difficult to assemble
are growing exponentially and are predicted to exceed 175 ZB the information planted on it; a single-nucleotide mutation could
by 2025 [1]. Mainstream magnetic, optical, and electronic stor- be used to encode information; and the alternative splicing of
age technologies hardly keep pace with the increasing demand gene structure produces wide variability.
for data storage. In addition, they also suffer from limitations in In this paper, we start from the perspective of biological dif-
terms of power consumption, volume, reliability, effective stor- ficulties, reviewing 2 types of DNA cryptography: pseudo-DNA
age duration, etc. Exploring new computational theories and cryptography and natural DNA cryptography [14]. The former
storage media is thus a crucial issue for the sustainable develop- is a biomimetic technology that leverages the complexity of bio-
ment of information technology [2–4]. As early as 1959, Nobel logical difficulties to enhance the performance of binary cryp-
laureate Feynman proposed the concept of molecular-scale tographic systems. The latter directly utilizes DNA molecules to
computing. Subsequently, Wiener and Neiman introduced the construct cryptographic systems and incorporates mathematical
idea of molecular genetic storage [5–7]. In 1994, Turing Award difficulties. We summarize and discuss 3 current challenges: lack
winner Adleman first solved a 7-vertex Hamiltonian path prob- of measurability and standard protocols, operational complexity,
lem with biological enzymes and biochemical techniques [8]. and data integrity. Finally, we envision future directions for DNA
In the following year, Baum proposed the construction of a high- cryptography with the hope of developing a secure DNA storage
capacity database storage system based on deoxyribonucleic acid architecture for large-scale applications.
(DNA) [9]. Adelman and Baum thus opened up the era of bio-
logical computing and DNA storage. Concept of Cryptography
As a promising storage medium, DNA has advantages such as
high density, long lifespan, low maintenance cost, and exceptional Cryptography is the practice and study of techniques that ensure
parallelism [10–12]. In 2023, a French company, Biomemory, data confidentiality, integrity, and authenticity against unauthor-
released the first commercial DNA data storage card, which has ized access and tampering [15]. With the rapid development of
a capacity of 1 KB. As DNA storage approaches practical applica- technologies, cryptography has evolved from a simple substitu-
tion, it is critical to develop biologically compatible security tech- tion to a complex and efficient public-key system. Throughout
nologies to achieve data confidentiality, integrity, and availability the evolution of cryptography, encryption and hiding remain 2
(CIA) in this new storage paradigm. Conventional digital security fundamental security strategies [16].
is based on mathematical difficulties, such as NP-hard problems Encryption secures the confidentiality of information by
[13]. Similarly, DNA cryptography takes advantage of the biologi- converting original information (plaintext) into an incompre-
cal difficulties involved in DNA storage processes (encoding, hensible ciphertext through the use of algorithms and secret

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 1


Fig. 1. DNA cryptography adds a security layer for the data stored in DNA molecules. It takes advantage of the biological difficulties inherent in the various mechanisms and

Downloaded from https://spj.science.org on May 25, 2025


technologies of biological information processing, such as encoding, synthesis, amplification, sequencing, and complex structures.

keys [17]. Only the one possessing the correct key can retrieve DNA cryptography experiment to hide the military secret mes-
the original information. There are 2 main types of encryption sage “June 6 Invasion: Normandy” within DNA microdots. As
algorithms: (a) Symmetric encryption algorithms, such as the DNA cryptography is a nascent discipline, advancements are
advanced encryption standard (AES), data encryption standard largely inspired by the principles of conventional cryptography
(DES), and triple DES (3DES) algorithms, use the same key for and have led to methods such as DNA encryption and DNA hid-
both the encryption and decryption processes, typically offering ing, which will be discussed in detail.
fast operation suitable for large-scale information encryption.
(b) Asymmetric encryption algorithms, such as the Rivest– Molecular Biology Background of
Shamir–Adleman (RSA) and elliptic curve cryptography (ECC)
algorithms, also known as public-key encryption, employ a pair DNA Cryptography
of keys: a public key that can be shared openly for encryption To achieve the security of confidential information, DNA cryp-
and a private key that must be kept secret for decryption. This tography utilizes underlying principles and technologies involved
type of encryption algorithm is also commonly used for digital in genetic information processing, such as the triple codons
signatures, secure key exchange, and authentication. for amino acids, alternative splicing, polymerase chain reaction
Hiding conceals secret information by embedding it within (PCR) amplification, and gene manipulation operations [28,29].
nonsensitive data (cover), making it inaccessible or impercep- In this section, we provide a basic introduction to some relevant
tible to unauthorized users [18]. There are 2 main types of hid- biology concepts and biotechnologies.
ing techniques: (a) Steganography conceals secret information
within other media (such as images, audio, video, or docu-
ments), making the existence of the information undetectable. Double helical structure of DNA
This technique is typically applied in scenarios requiring high DNA is composed of 4 deoxyribonucleotide triphosphates
levels of secrecy, such as secret communication or hiding sensi- (dNTPs) [30]. Each dNTP consists of a deoxyribose sugar, a
tive information. (b) Digital watermarking embeds identifying phosphate group, and one nitrogenous base, adenine (A), gua-
information (such as copyright information) into digital media nine (G), cytosine (C), or thymine (T). Phosphodiester bonds
(such as audio, video, or images) to achieve copyright protection link the phosphate group at the 5′ position of one nucleotide
and content authentication. Steganography focuses on imper- to the 3′ position of the next, while the bases adhere to a spe-
ceptible concealment, while digital watermarking demands cific complement rule (A always pairs with T, and G with C).
greater robustness. Following this principle, 2 complementary DNA strands form
DNA cryptography is an extension of conventional cryptog- a stable double helix structure through hydrogen bonds (as
raphy into the field of life sciences, offering new mechanisms for shown in Fig. 2).
information security by exploring the potential capabilities
of biological properties and techniques. Since Adleman dem- Central dogma
onstrated the massive parallelism of DNA computation [8], The central dogma elucidates the basic principles of genetic
researchers have turned their attention to using DNA to decipher information transmission from DNA to ribonucleic acid (RNA)
conventional cryptographic algorithms such as DES [19,20], RSA and ultimately to protein (as shown in Fig. 3). Initially, the
[21,22], NTRU [23], Diffie–Hellman key exchange [24,25], and double helix structure of DNA partially unwinds at specific
knapsack [26]. Concurrently, Clelland et al. [27] conducted a locations. Under the guidance of transcription factors, RNA

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 2


polymerase binds to these locations and moves along the DNA nonessential introns from pre-mRNA, alternative splicing
template to transcribe precursor messenger RNA (pre-mRNA). enriches biological diversity and plays a vital role in the regula-
This pre-mRNA is then processed into mature messenger RNA tion of gene expression, enhancing the complexity of cellular
(mRNA) through splicing and capping. Finally, the ribosome functions.
translates the bonded mRNA into protein. In this process,
64 triplet codons are reduced to 20 standard amino acids, one Enzymatic tools for DNA modification
start signal, and 3 stop signals. Such redundancy is beneficial In genetic engineering, enzymes are crucial in cutting and past-
in minimizing genetic transmission errors [31]. ing single-/double-strand DNA (ssDNA/dsDNA). Restriction
endonucleases recognize and cleave dsDNA at specific nucleo-
Alternative splicing tide sequences. DNA ligases join the ends of 2 DNA strands.
Alternative splicing enables one gene to generate multiple pro- Exonucleases selectively degrade single/double DNA strands
tein variants [32]. By selectively assembling exons and removing by trimming DNA ends or removing excess sequences.
Clustered regularly interspaced short palindromic repeats
(CRISPR) is an advanced gene editing technology that can
precisely locate, cut, and modify specific DNA sequences with
CRISPR-associated (Cas) enzymes [33]. Unlike traditional
enzymatic techniques that recognize particular DNA sequences,
the CRISPR system can edit almost any site by designing spe-
cific guide RNA (gRNA). Moreover, CRISPR-Cas12a possesses
dual cutting capabilities that not only specifically recognize and
precisely edit targeted dsDNA but also indiscriminately cut
ssDNA within the system [34] (Fig. 4).

Downloaded from https://spj.science.org on May 25, 2025


DNA hybridization
DNA hybridization is a fundamental technique used in various
applications, including DNA chips, Southern blotting, northern
blotting, in situ hybridization, and PCR primer design. In the
PCR process, the primers first bind to the complementary
sequences, flanking the target region, and then extending along
the target DNA sequence by adding complementary nucleo-
tides. In DNA computing and storage, DNA hybridization is
classified into specific and nonspecific hybridization. The for-
mer means a completely complementary hybridization between
the probe and the target sequences, while the latter represents
a partial hybridization [35].

Base operations
In previous studies, researchers designed base operations as
in digital computing to perform information transformation
Fig. 2. Schematic diagram of the double helical structure of DNA. On the left is shown using 2 DNA sequences [36]. Table 1 shows 3 rules for base
a general schematic of the double helix, while on the right is shown the nucleotide exclusive or (XOR), addition (ADD), and subtraction (SUB)
structure, hydrogen bonds (A–T and C–G pairing), and phosphodiester bonds. operations.

Fig. 3. Schematic diagram of the central dogma. Genetic information is transferred from DNA by transcription to pre-mRNA, spliced to form mRNA, and finally translated
into proteins by ribosomes.

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 3


Downloaded from https://spj.science.org on May 25, 2025
Fig. 4. Different forms of DNA modification by enzymes. (A) Restriction endonucleases. (B) DNA ligase. (C) Exonucleases. (D) CRISPR-Cas12a.

Table 1. Base exclusive or, addition, and subtraction operation rules

Exclusive or Addition Subtraction


XOR A G C T  + A G C T  - A G C T
A A G C T  A A G C T  A A T C G
G G A T C  G G C T A  G G A T C
C C T A G  C C T A G  C C G A T
T T C G A  T T A G C  T T C G A

Pseudo-DNA Cryptography logistic maps with DNA addition and base complement opera-
tions to scramble image information. This method effectively
“Pseudo-DNA cryptography” refers to introducing biological combines base operations with chaos theory, providing a promis-
complexity into conventional encryption and aims to provide ing perspective for image encryption. In 2012, Liu et al. [39]
enhanced security for binary data. In 2009, Kang Ning devised employed the piecewise linear chaotic map system to scramble a
a text encryption method by simulating the central dogma [37]. DNA-formatted image, simulating the DNA base pairing rules to
Specifically, the plaintext is encoded into DNA sequences, then modify each nucleotide. Zhang et al. [40] encoded and segmented
spliced and translated to produce a protein-formatted cipher- an image into multiple short DNA sequences and utilized
text. The secret key consists of the genetic code table used for the Chen hyperchaotic system for selecting positions to expand,
translation and the patterns and locations of splicing. This truncate, delete, or insert these sequences. Enayatifar et al. [41]
method offers powerful resistance to brute force attacks by encrypted images by integrating genetic algorithms with a logistic
leveraging the complex mechanisms of the gene translation map, effectively reducing the correlation among adjacent pixels.
process. Kalpana and Murali [42] increased encryption complexity by
In 2010, Zhang et al. [38] proposed an image encryption selecting distinct coding rules for different color channels (e.g.,
method (as shown in Fig. 5A) that integrates 1- and 2-dimensional red, green, blue). However, static encoding rules are insufficient

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 4


Downloaded from https://spj.science.org on May 25, 2025
Fig. 5. Three pseudo-DNA cryptography methods. (A) The image encryption method combines pseudo-DNA operations (highlighted in red) with 1D/2D logistic chaotic maps
[38]. (B) State diagram of the new DNA right-circular and left-circular shift operators, which diffuse secret information at the DNA level by referencing the key base matrices
[44]. (C) The DNA-based Vigenère cipher accomplishes the base-substitution encryption by referencing the key sequence [55].

to defend against complex attacks. In 2019, Chai et al. [43] model with novel asymmetric base operations designed using
employed a chaotic system to dynamically select coding rules matrix calculations. Alawida [50] designed a DNA tree algorithm
for each pixel, designing an image encryption method sensitive and a new chaotic state machine map to encrypt images. The cha-
enough to resist known-plaintext and chosen-plaintext attacks. otic map integrates a finite state machine, while the DNA tree
In 2020, Zefreh [44] introduced 2 cyclic shift algebraic operators randomly generates a table that maps pixel values (0 to 255) to
based on DNA sequences to enhance DNA diffusion as shown in DNA bases (e.g., 150 to TAAA) and guides the performance of
Fig. 5B. Concretely, chaotic systems convert the original image DNA substitution operations (using a substitution box).
and secret key into DNA matrices. Subsequently, the image matri- Besides combining chaotic systems to design pseudo-DNA
ces are diffused at the DNA level by referencing the key matrices image encryption methods, researchers also employ pseudo-
and applying base operations such as addition, subtraction, right- DNA operations to develop other security techniques. Sadeg et al.
circular shift, and left-circular shift. Chidambaram et al. [45] [51] achieved a symmetric block encryption algorithm by design-
combined the chaotic-based key generation system with DNA ing new DNA operation rules and exploiting codon degeneration.
diffusion by base operations, ensuring the CIA of medical images Babu et al. [52] designed a pseudo-DNA communication model
stored in the cloud. To further enhance encryption security, that simulated DNA transcription and cooperative communica-
researchers explored more complex and higher-dimensional cha- tion among organelles. Thangavel and Varalakshmi [53] applied
otic systems. In 2023, Li and Chen [46] proposed a 6-dimensional the central dogma to secure data in the cloud, providing a more
hyperchaotic system and base XOR operations to encrypt color randomized and prudent system in practice. Majumdar et al. [54]
images. In 2024, Yu et al. [47] developed a dynamic encryption utilized the redundancy of alternative splicing to design a substi-
network incorporating 12 types of base operations where a hyper- tution box for encryption and stored related pieces of infor-
chaotic system was used to generate random keys. Wu et al. [48] mation, such as time, date, and owner ID, in introns to ensure
proposed a medical image encryption method consisting of ran- information integrity.
dom DNA encoding and content-aware DNA permutation and Furthermore, researchers utilized the randomness of genetic
diffusion. The former utilizes the piecewise linear chaotic map information to select natural DNA sequences as secret keys. In
system to select different binary-to-base encoding rules for each 2015, Najaftorkaman and Kazazi [55] chose natural DNA from
pixel, while the latter breaks the correlation between adjacent the National Center of Biotechnology Information (NCBI)
pixels using the hyperchaotic Lorenz system and base operations gene library as a secret key to implement the Vigenère cipher
(ADD, SUB, and XOR). Liu et al. [49] proposed a medical image encryption [56] at the DNA level as shown in Fig. 5C. Similarly,
encryption method integrating a new spatiotemporal chaotic Grass et al. [57] used short tandem repeat segments from the

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 5


human genome as keys for secure access to confidential infor- Substituting some specific sites within the cover sequence can
mation, Kolate and Joshi [58] achieved enhanced AES encryp- also hide secret information. Huang et al. [72] converted the cover
tion, and Al-Husainy et al. [59] implemented a lightweight sequence into decimal numbers and then selected hiding sites
internet-of-things encryption system. using the histogram shifting algorithm. In 2019, Sabry et al. [73]
exploited codon degeneracy to conceal information to eliminate
Natural DNA Cryptography unexpected influence on biological functionality. Each amino acid
maps to multiple codons, for instance, amino acid “I” maps to 3
Combined with mathematical difficulties in conventional cryp- codons, where U represents the base uracil: “AUU”, “AUC”, and
tography, natural DNA cryptography explores the potential of “AUA”; replacing “AUU” on the cover DNA sequence with “AUC”
biological difficulties involved in the wet-lab DNA manipulation signifies embedding “001”, while replacing it with “AUA” signifies
process [60]. In this section, we categorize and review advance- embedding “010”. Based on the same characteristic of the codon,
ments in natural DNA cryptography based on different biologi- Alhabeeb et al. [74] further enhanced the hiding capacity using
cal strategies, including DNA encoding, PCR, DNA chips, DNA a 2-tier codon lookup table. Mohammed et al. [75] utilized arti-
origami, and noisy storage channels. ficial neural networks to select hiding sites to achieve high-capac-
ity and safe information hiding. In the same year, Saha et al. [76]
DNA encoding encoded the cover sequence into a balanced tree and replaced all
Encryption can be achieved at the DNA level by designing com- leaf nodes with secret information. Ultimately, they generated the
plex coding rules. In 2004, Gehani et al. [61] proposed a one- embedded cover sequence using a depth-first traversal method
time pad encryption using a codebook of <plain, cipher> DNA to output the balanced tree. This method offers a high capacity
word pairs, as shown in Fig. 6, that can replace plaintext (P) for information hiding, but its security is compromised if the tree
with ciphertext (C). Siddaramappa and Ramesh [62] encrypted structure is leaked. In 2022, Hassan et al. [77] utilized a DNA-
DNA-formatted plaintext by XORing it with selected natural based Huffman coding to encrypt information and designed a
DNA sequences from the NCBI database. Hameed et al. [63] substitution algorithm to conceal the ciphertext within an actual

Downloaded from https://spj.science.org on May 25, 2025


independently encoded red, green, and blue image compo- DNA sequence obtained from the NCBI database. Huang et al.
nents into DNA sequences and performed addition operations [78] utilized the adaptive dynamic grouping algorithm to embed
between pairs of these sequences according to specific rules. secret information into quasi-natural pseudo-sequences, which
In 2019, Biswas et al. [64] developed a cryptography based on are generated by a trained long short-term memory model that
the Fibonacci sequence using a dynamic ASCII-to-base conver- learns the statistical properties of natural DNA.
sion table. In 2021, Nandy et al. [65] encoded images using 24
possible quadruplet combinations of ATCG where 16 quadru- Polymerase chain reaction
plets were mapped to the hexadecimal values “0” to “F”, and PCR is a molecular biology technique used to amplify specific
the remaining 8 were assigned to the most frequent pixels to DNA strands in vitro rapidly. PCR plays a crucial role in the
increase storage density and algorithm complexity. In 2022, reading process of DNA storage. By designing specific primers
Satir and Kendirli [66] proposed biotechnical encryption hard- [~20 nucleotides (nt)], even minute quantities of DNA strands
ware incorporating DNA encoding and operations within the can be amplified for sequencing. Without knowing the primer,
Feistel network structure. it is usually difficult to precisely amplify the target sequence.
Information hiding can also be achieved by inserting or sub- Researchers have designed some DNA cryptography methods
stituting specific nucleotides. Insertion hiding typically embeds using PCR primers (as shown in Fig. 7).
secret information at inconspicuous sites in cover DNA sequences. In 2000, Leier et al. [79] proposed a method for DNA cryp-
Menaka [67] combined different base pairing rules with the most tography that mixed secret DNA sequences (with primers) with
significant bit (MSB) algorithm, successfully embedding secret a large volume of irrelevant DNA sequences (without primers).
information into natural DNA. Malathi et al. [68] converted “1 Only with knowledge of the primer sequences can users specifi-
bit of secret information + 3 bits of unrelated information” into cally amplify the secret DNA strands and decrypt the informa-
DNA sequences using quaternary coding. In 2020, Khalifa [69] tion. In 2008, Cui et al. [80] utilized RSA to encrypt information
employed the 8 × 8 Playfair encryption algorithm to encode first, then assembled this ciphertext into a structure consisting
information into short DNA sequences. These sequences were of a forward primer (20 nt) followed by the DNA ciphertext
then randomly concatenated with unrelated sequences, resulting (64 nt) followed by a reverse primer (20 nt). To achieve obfusca-
in a long cover DNA sequence. Na [70] concealed secret informa- tion, these sequences were mixed with numerous DNA strands
tion in single-nucleotide polymorphism regions using genetic that had identical structures but utilized different primers. Zhang
variability. In 2023, Sadia et al. [71] hid secret information within et al. [81] segmented secret information into smaller DNA frag-
a vast cover DNA sequence where the inserted positions were ments, each paired with distinct primers and mixed with decoy
generated by a mathematical function. sequences. The decryption requires precise knowledge of all

Fig. 6. The one-time pad encryption method creates a codebook of <plain, cipher> DNA word pairs to replace plaintext (P) with ciphertext (C) [61].

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 6


Fig. 7. Specific and nonspecific PCR for DNA cryptography. The former specifically amplifies the secret DNA sequences (highlighted in color) with knowledge of the primer,

Downloaded from https://spj.science.org on May 25, 2025


while the latter amplifies all DNA sequences, resulting in the secret information being hidden among a sea of irrelevant information.

Fig. 8. The schematic diagram for DNA chip encryption [84]. Two predefined sets of sequences represent “0” and “1”. A randomly selected group of probes is spotted on the
DNA chip. Users can only discriminate between these 2 types of spots using the complementary strands of the probe set of “1”.

primer pairs and the order of these DNA segments. Considering sequences (probes) onto a solid surface and then hybridizing
the security risk of primer leakage, Li et al. [82] designed a them with labeled samples of complementary DNA. The inten-
pre-key mechanism by utilizing the dual cutting capabilities sity of the fluorescence indicates gene expression levels. DNA
of CRISPR/Cas12a. True primers were mixed with decoy prim- chips enable researchers to study gene activity in response to
ers to form a pre-key. Only after the precise cutting of CRISPR/ conditions like diseases or drug treatments, aiding in cancer
Cas12a does this mixture reveal the true key to decrypt the research, drug development, and personalized medicine.
real information. In 2021, Fan et al. [83] utilized Pfu DNA poly- Usually, it is difficult to precisely know the short probes
merase to concatenate 2 DNA molecules of distinct chirality end (~30 nt) spotted on a DNA chip, especially when each spot
to end. This method ensures that natural PCR amplifies only the is mixed with many different probes. In 2007, Lu et al. [84]
misleading information contained in D-DNA. Conversely, the developed a symmetric encryption as shown in Fig. 8. First,
true information encoded in L-DNA can be accessed only they designed 2 sets of DNA probes representing “0” and “1”.
through mirror-image PCR. Then, they printed a randomly selected group of probes from
the corresponding set on each spot of the chip. The biological
DNA chips difficulty comes from the tremendous number of probes for
A DNA chip (or DNA microarray) is a high-throughput tech- “0” or “1” and the versatility of probes in each spot. Only when
nology used to analyze the expression levels of thousands of the probes for “1” are known can the receiver decode the
genes simultaneously. It involves immobilizing short DNA printed ciphertext. When relaxed to nonspecific hybridization,

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 7


each receiver could have his own private keys, which could have Yao et al. [91] proposed an image encryption algorithm based
a high degree of hybridization with the printed spots. Based on on forward error correction DNA codes. In a noisy channel, it
this idea, they designed encryption systems for public keys and is difficult to infer the codes, and their dynamic invocation
digital signatures [85], dynamic broadcast encryption [86], and increases the decryption difficulty at the DNA level. Based on
information hiding [87]. the same idea, Yao et al. [92] introduced DNA hybridization for
pixel replacement and gene mutation for pixel diffusion. Zan
DNA origami et al. [93] proposed an image encryption method based on the
DNA origami is a revolutionary technique in nanotechnology modulation-based storage architecture shown in Fig. 10. The
that enables the precise folding of DNA into complex nano- key idea is to use the unpredictable modulation carrier to encrypt
structures, such as rectangles, squares, tetrahedra, and cubes. images in highly error-prone DNA storage channels. Without
This process begins with computer-aided design, which speci- the true modulation carrier (secret key), numerous base errors
fies sequences for scaffold DNA and staple strands. Upon mix- in DNA sequences cannot be corrected, ensuring that the secret
ing under controlled conditions, the strands self-assemble to information remains undecipherable to attackers. Compared
form intricate shapes. The versatility and precision of DNA with the former 2 methods, this method is feasible for higher-
origami make it a potent tool for creating tailored nanostruc- noise storage channels (≥20%) due to the robustness of modula-
tures with diverse functionalities, such as biosensing and drug tion coding [94]. Chu et al. [95] applied a noisy storage channel
delivery. Moreover, the programmability and addressability of to deniable encryption by using 2 similar modulation carriers
DNA origami provide potential opportunities in information to encode true and fake messages into DNA sequences. The con-
storage, which is usually read by atomic force microscopy. fusion caused by the noisy channel makes it difficult for coercive
In 2013, Wong et al. [88] utilized the competitive binding adversaries to distinguish between the true and fake DNA, allow-
affinities of biotin and desthiobiotin toward streptavidin, employ- ing them to obtain only the “plausible” fake message.
ing biotin as a secret key to selectively reverse the desthiobiotinyl-
ated streptavidin sites on the origami for revealing sensitive

Downloaded from https://spj.science.org on May 25, 2025


information. Zhang et al. [89] designed an encryption method Challenges
for braille-encoded information, where a group of specialized Table 2 presents a summary of the main biotechnologies used
staples (serving as keys) could deconstruct the arrangement of in DNA cryptography. The cryptographic complexity of DNA
the biotinylated information positions on the origami (as shown encoding arises from 2 aspects: the dynamic cryptographic pro-
in Fig. 9). Later, Fan et al. [90] developed a DNA origami domino cesses in base coding/operation rules and a sufficiently large key
array based on the same principle to achieve encryption and space (typically ~2n), where n is the encoding length of sequences,
hiding synchronously. usually approximately 200 nt in vitro [96]. For DNA chips and
DNA origami, the relatively high security derives from the large
Noisy storage channels number of possibilities for random combinations of various
One ubiquitous characteristic of DNA storage is insertion– probes (~20 nt) [97] and staples (~30 nt) [98]. The former pro-
deletion–substitution (IDS) errors in the sequenced reads vides possible key combinations when choosing 2,000 probes
because of imperfect synthesis, PCR, and sequencing technolo- to denote “1” and another 2,000 for “0” [84], while the latter
gies. The error rate is 1% to 2% in mainstream next-generation achieves a theoretical key size of over 700 bits (much greater
sequencing and up to 10% for nanopore sequencers [1,10]. In than the 256 bits of AES) when using a 7,249-nt M13mp18 scaf-
the reading process, the sequenced reads are usually clustered fold [89]. The complexity of the noise channel stems from the
in groups that may come from the same encoding sequences. magnitude of the noise level (IDS error rates typically ≤10%)
The decoding process is performed on these clusters using vari- and the encoding length (~200 nt in vitro); the former affects
ous error correction techniques. Researchers have proposed the difficulty of inference, while the latter determines the key
various methods to tackle this problem for reliable information space (typically ~2200). The cryptographic space of PCR is rela-
retrieval [82,85]. From the perspective of information security, tively low because of the limited number of primers. The largest
such a unique noise channel may provide new opportunities orthogonal primer set reported in [99] is approximately 5,625,
for encryption and hiding. and their combinations number less than 8 × 106. Additionally,

Fig. 9. Schematic diagram of DNA origami encryption [89]. Secret information is encoded into a tactile grid pattern and meticulously marked onto the scaffold of DNA origami.
Only with all the correct staples can the scaffold be deconstructed from a disordered state back to a state where the braille information is clearly visible.

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 8


Downloaded from https://spj.science.org on May 25, 2025
Fig. 10. Schematic diagram of image encryption based on noisy storage channels. On the left is the traditional cryptography process, which implements pixel scrambling
and diffusion; on the right is modulation-based cryptography, which provides further confusion by utilizing noisy storage channels [93]. © 2023 Frontiers. Reprinted, with
permission, from Zan et al. [93].

Table 2. Summary of the biotechnologies used in DNA cryptography

Biotechnology Biological difficulty Security Operability Robustness Information density


DNA encoding Unknown coding/operation rules High Simple Weak High (≥1 bit/nt)
DNA chips Unknown mixed probes High Simple Moderate Low (<<1 bit/nt)
DNA origami Diversity of 3D structures High Complex Moderate Low (<<1 bit/nt)
Noisy storage channels Inference difficulty High Simple High High (≥1 bit/nt)
PCR Unknown primers Low Simple Weak High (≥1 bit/nt)

compared with other techniques, the information density of empirical data, advanced modeling techniques, and in-depth
DNA chips and DNA origami is extremely low (<<1 bit/nt) biological knowledge. Moreover, no standard protocol exists to
because the probes (~30 nt) in each spot only represent one bit test the security of the system under malicious biological attacks.
of information. Therefore, a quantitative measure of these complexities is neces-
Although various DNA cryptography methods have been sary to guarantee the security and efficiency of the system and
proposed by researchers, they are far from being practically to boost the advancement of DNA cryptography.
applied. To develop a solid and reliable cryptographic system Second, a well-established protocol (e.g., key generation,
that is compatible with biological technologies, there are several distribution, and management) has not yet been developed in
main challenges, as follows: DNA cryptography, which hinders its application in practical
First, it is difficult to quantify the biological difficulties inher- scenarios. Conventional cryptography has developed a set of
ent in biochemical reactions, which form the essential basis for standard protocols and algorithms, such as substitution, per-
DNA cryptography. The overall complexity is a function of the mutation, confusion, diffusion, and encryption/decryption
number of biochemical reaction steps (n), the variability of algorithms, which form the foundation for various symmetric
reaction conditions (V), the uncertainty in enzyme kinetics (U), encryption algorithms, such as AES and DES. To achieve reli-
and the influence of external biological factors (F). Variations able data encryption, we should also construct biologically
in reaction conditions can considerably impact the outcome as compatible protocols in DNA cryptography.
these factors are highly interrelated. Quantifying and determin- Third, the unique IDS noise in DNA storage can consider-
ing the exact functional relationship require a combination of ably impact DNA encryption. DNA encoding and PCR both

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 9


code at the base level, making them susceptible to IDS noise. Competing interests: The authors declare that they have no
This noise may disrupt the encryption process, complicate key competing interests.
management, reduce operational efficiency, and increase vul-
nerability to attacks. However, most of these methods assume References
that DNA storage is an ideal process without IDS errors or other
environmental noise. This assumption limits their practical 1. Dong Y, Sun F, Ping Z, Ouyang Q, Qian L. DNA storage:
applications in more complex real-world scenarios. Research landscape and future prospects. Natl Sci Rev.
Lastly, the complex operability of biotechnologies has con- 2020;7(6):1092–1107.
siderable influence on DNA cryptography. Even minor mis- 2. Rydning DR-JG-J, Reinsel J, Gantz J. The digitization of the world
takes or deviations in the procedures can lead to incorrect from edge to core. Framingham Int Data Corp. 2018;16:1–28.
encryption or decryption, potentially compromising the con- 3. Williams ED, Ayres RU, Heller M. The 1.7 kilogram
fidentiality and integrity of the data. The complexity also slows microchip: Energy and material use in the production
down the speed of the encryption and decryption processes of semiconductor devices. Environ Sci Technol.
[100]. For example, the productivity and formation of DNA 2002;36(24):5504–5510.
origami are highly affected by biochemical reaction conditions, 4. Panda D, Molla KA, Baig MJ, Swain A, Behera D, Dash M.
such as pH, temperature, and concentration [101]. The precur- DNA as a digital information storage device: Hope or hype?
sor hydrolysis process of DNA origami requires more than 3 Biotech. 2018;8(5):1–9.
2 days at pH 7.3, while these structures aggregate at pH 9.3 [102]. 5. Wiener N. Interview: Machines smarter than men. US News
Furthermore, the intricate nature of the operations makes it World Rep. 1964;56:84–86.
difficult to standardize and optimize the cryptographic algo- 6. Neiman M. On the molecular memory systems and the
rithms based on DNA. directed mutations. Radiotekhnika. 1965;1(1):3–12.
7. Feynman RP. There’s plenty of room at the bottom
[data storage]. J Microelectromech Syst. 1992;1(1):60–66.

Downloaded from https://spj.science.org on May 25, 2025


Conclusion 8. Adleman LM. Molecular computation of solutions to
DNA cryptography is an emerging discipline that explores the combinatorial problems. Science. 1994;266(5187):1021–1024.
potential capability involved in biological mechanisms and 9. Baum EB. Building an associative memory vastly larger than
biotechnologies. In this paper, we first presented a brief intro- the brain. Science. 1995;268(5210):583–585.
duction to the concept of cryptography and the arising of DNA 10. Ceze L, Nivala J, Strauss K. Molecular digital data storage
cryptography. Then, we introduced some basic concepts and using DNA. Nat Rev Genet. 2019;20(8):456–466.
technologies involved in DNA cryptography. Based on this 11. Landsman D, Strauss K. The DNA data storage model.
preliminary knowledge, we comprehensively reviewed advance- Computer. 2023;56(7):78–85.
ments in both pseudo-DNA and natural DNA cryptography. 12. Meiser LC, Nguyen BH, Chen YJ, Nivala J, Strauss K,
After discussing the security, operability, robustness, and stor- Ceze L, Grass RN. Synthetic DNA applications in information
age density of the mechanisms and technologies, we summa- technology. Nat Commun. 2022;13(1):352.
rized the main theoretical and technological challenges for 13. Wang G, Lu S, Feng Y, Liu W, Ma R. Research on modeling of
DNA cryptography. latent virus propagation behavior with increasing or decreasing
As we know, biological systems have developed many mech- network nodes. Acta Electron Sin. 2022;50(2):273–283.
anisms for reliable and efficient information processing in the 14. Mahjabin T, Olteanu A, Xiao Y, Han W, Li T, Sun W. A survey
evolution of living organisms. Therefore, learning from biology on DNA-based cryptography and steganography. IEEE Access.
and exploring the underlying genetic mechanisms will shed 2023;11:116423–116451.
new light on and facilitate the development of DNA cryptog- 15. Stinson DR. Cryptography: Theory and practice. Boca Raton
raphy. We believe that it is possible to develop a secure DNA (FL): Chapman and Hall/CRC; 2005.
storage architecture for future large-scale applications with the 16. Niu Y, Zhao K, Zhang X, Cui, G. Review on DNA
fusion of biotechnology and information technology. cryptography. In: Bio-inspired Computing: Theories and
Applications: 14th International Conference, BIC-TA 2019,
Zhengzhou, China, November 22–25, 2019, Revised Selected
Acknowledgments Papers, Part II. Singapore: Springer; 2020. p. 134–148.
Funding: This work was supported in part by the National Natural 17. Bhanot R, Hans R. A review and comparative analysis
Science Foundation of China (grant nos. 62072128 and 62002079), of various encryption algorithms. Int J Secur Appl.
the Natural Science Foundation of Guangdong Province of China 2015;9(4):289–306.
(grant no. 2023A1515011401), the Municipal School Joint Fund of 18. Katzenbeisser S, Petitcolas F. Information hiding. Norwood
Guangzhou Science and Technology Bureau (grant no. SL2022A­ (MA): Artech House; 2016.
03J00935), and the Open Project of Guangdong Provincial Key 19. Boneh D, Dunworth C, Lipton RJ. Breaking DES using a
Laboratory of Artificial Intelligence in Medical Image Analysis and molecular computer. DNA Based Computers. 1995;27:37–66.
Application (grant no. 2022B1212010011). 20. Faulhammer D, Cukras AR, Lipton RJ, Landweber LF.
Author contributions: L.C. led the literature collection and Molecular computation: RNA solutions to chess problems.
drafted the manuscript. Y.S. and X.Y. assisted in the literature Proc Natl Acad Sci USA. 2000;97(4):1385–1389.
analysis and synthesized the findings. P.X. guided the structure 21. Brun Y. Nondeterministic polynomial time factoring in the
of the review and performed critical revisions. W.L. engaged tile assembly model. Theor Comput Sci. 2008;395(1):3–23.
in a critical discussion of the content of the review and ensured 22. Brun Y. Arithmetic computation in the tile assembly
the accuracy and coherence of the final manuscript. All authors model: Addition and multiplication. Theor Comput Sci.
read and approved the final manuscript. 2007;378(1):17–31.

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 10


23. Pelletier O, Weimerskirch A. Algorithmic self-assembly of 45. Chidambaram N, Thenmozhi K, Raj P, Amirtharajan R.
DNA tiles and its application to cryptanalysis. arXiv. 2001. DNA-chaos governed cryptosystem for cloud-based medical
https://doi.org/10.48550/arXiv.cs/0110009 image repository. Clust Comput. 2024;27:4127–4144.
24. Li K, Zou S, Xu J. Fast parallel molecular algorithms for 46. Li Q, Chen L. An image encryption algorithm based on
DNA-based computation: Solving the elliptic curve discrete 6-dimensional hyper chaotic system and DNA encoding.
logarithm problem over GF (2n). Paper presented at: 2007 Multimed Tools Appl. 2024;83(2):5351–5368.
Frontiers in the Convergence of Bioscience and Information 47. Yu J, Peng K, Zhang L, Xie W. Image encryption algorithm
Technologies; 2007; Jeju City, South Korea. based on DNA network and hyperchaotic system. Vis
25. Cheng Z. Computation of multiplicative inversion and Comput. 2024;40:8001–8021.
division in GF (2 n) by self-assembly of DNA tiles. J Comput 48. Wu Y, Zhang L, Berretti S, Wan S. Medical image encryption
Theor Nanosci. 2012;9(3):336–346. by content-aware DNA computing for secure healthcare.
26. Darehmiraki M, Nehi HM. Molecular solution to the 0–1 IEEE Trans Industr Inform. 2022;19(2):2089–2098.
knapsack problem based on DNA computing. Appl Math 49. Liu H, Teng L, Zhang Y, Si R, Liu P. Mutil-medical image
Comput. 2007;187(2):1033–1037. encryption by a new spatiotemporal chaos model and DNA
27. Clelland CT, Risca V, Bancroft C. Hiding messages in DNA new computing for information security. Expert Syst Appl.
microdots. Nature. 1999;399(6736):533–534. 2024;235:Article 121090.
28. Velculescu VE, Zhang L, Vogelstein B, Kinzler KW. Serial 50. Alawida M. A novel DNA tree-based chaotic image encryption
analysis of gene expression. Science. 1995;270(5235):484–487. algorithm. J Inf Secur Appl. 2024;83:Article 103791.
29. Wilson K, Hofmann A, Walker JM, Clokie S. Wilson and 51. Sadeg S, Gougache M, Mansouri N, Drias H. An encryption
Walker’s principles and techniques of biochemistry and molecular algorithm inspired from DNA. Paper presented at: 2010
biology. Cambridge (UK): Cambridge University Press; 2018. International Conference on Machine and Web Intelligence;
30. Travers A, Muskhelishvili G. DNA structure and function. 2010; Algiers, Algeria.
FEBS J. 2015;282(12):2279–2295. 52. Babu ES, Raju CN, Prasad MHK. Inspired pseudo biotic

Downloaded from https://spj.science.org on May 25, 2025


31. Bustamante C, Cheng W, Mejia YX. Revisiting the central DNA based cryptographic mechanism against adaptive
dogma one molecule at a time. Cell. 2011;144(4):480–497. cryptographic attacks. Int J Netw Secure. 2016;18(2):291–303.
32. Kelemen O, Convertini P, Zhang Z, Wen Y, Shen M, 53. Thangavel M, Varalakshmi P. Enhanced DNA and ElGamal
Falaleeva M, Stamm S. Function of alternative splicing. Gene. cryptosystem for secure data storage and retrieval in cloud.
2013;514(1):1–30. Clust Comput. 2018;21:1411–1437.
33. Barrangou R, Doudna JA. Applications of CRISPR technologies 54. Majumdar A, Biswas A, Majumder A, Sood SK, Baishnab KL.
in research and beyond. Nat Biotechnol. 2016;34(9):933–941. A novel DNA-inspired encryption strategy for concealing
34. Li S-Y, Cheng Q-X, Liu J-K, Nie X-Q, Zhao G-P, Wang J. cloud storage. Front Comp Sci. 2021;15:153807.
CRISPR-Cas12a has both cis-and trans-cleavage activities on 55. Najaftorkaman M, Kazazi NS. A method to encrypt
single-stranded DNA. Cell Res. 2018;28(4):491–493. information with DNA-based cryptography. Int J Cyber-
35. Su Y, Lin W, Chu L, Zan X, Xu P, Zhang F, Liu B, Liu W. Security Digital Forensics. 2015;4(3):417–426.
Nano scale instance-based learning using non-specific 56. Rubinstein-Salzedo S. The vigenère cipher. In: Cryptography;
hybridization of DNA sequences. Commun Eng. 2023;2(1):87. 2018. p. 41–54.
36. Mondal B, Mandal T. A light weight secure image encryption 57. Grass RN, Heckel R, Dessimoz C, Stark WJ. Genomic
scheme based on chaos & DNA computing. J King Saud Univ encryption of digital data stored in synthetic DNA. Angew
Comput Info Sci. 2017;29(4):499–504. Chem Int Ed Engl. 2020;59(22):8476–8480.
37. Ning K. A pseudo DNA cryptography method. arXiv. 2009. 58. Kolate V, Joshi R. An information security using DNA
https://doi.org/10.48550/arXiv.0903.2693 cryptography along with AES algorithm. Turk J Comput Math
38. Zhang Q, Guo L, Wei X. Image encryption using DNA Educ. 2021;12(1S):183–192.
addition combining with chaotic maps. Math Comput Model. 59. Al-Husainy MAF, Al-Shargabi B, Aljawarneh S. Lightweight
2010;52(11-12):2028–2035. cryptography system for IoT devices using DNA. Comput
39. Liu H, Wang X, Kadir A. Image encryption using DNA Electr Eng. 2021;95:Article 107418.
complementary rule and chaotic maps. Appl Soft Comput. 60. Xiao G, Lu M, Qin L, Lai X. New field of cryptography: DNA
2012;12(5):1457–1466. cryptography. Chin Sci Bull. 2006;51:1413–1420.
40. Zhang Q, Wei X. A novel couple images encryption algorithm 61. Gehani A, LaBean T, Reif J. DNA-based cryptography. In:
based on DNA subsequence operation and chaotic system. Aspects of molecular computing: Essays dedicated to Tom Head
Optik. 2013;124(23):6276–6281. on the occasion of his 70th birthday. Heidelberg (Germany):
41. Enayatifar R, Abdullah AH, Isnin IF. Chaos-based image Springer; 2004. p. 167–188.
encryption using a hybrid genetic algorithm and a DNA 62. Siddaramappa V, Ramesh K. DNA-based XOR operation
sequence. Opt Lasers Eng. 2014;56:83–93. (DNAX) for data security using DNA as a storage medium.
42. Kalpana J, Murali P. An improved color image encryption Integr Intell Comput Comm Secur. 2019:343–351.
based on multiple DNA sequence operations with DNA 63. Hameed SM, Sa’adoon HA, Al-Ani M. Image encryption using
synthetic image and chaos. Optik. 2015;126(24):5703–5709. DNA encoding and RC4 algorithm. Iraqi J Sci. 2018;434–446.
43. Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image 64. Biswas MR, Alam KMR, Tamura S, Morimoto Y. A technique
encryption scheme based on DNA sequence operations and for DNA cryptography based on dynamic mechanisms. J Inf
chaotic systems. Neural Comput Appl. 2019;31:219–237. Secur Appl. 2019;48:Article 102363.
44. Zefreh EZ. An image encryption scheme based on a hybrid 65. Nandy N, Banerjee D, Pradhan C. Color image encryption
model of DNA computing, chaotic systems and hash using DNA based cryptography. Int J Inf Technol.
functions. Multimed Tools Appl. 2020;79(33-34):24993–25022. 2021;13(2):533–540.

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 11


66. Şatir E, Kendirli O. A symmetric DNA encryption process 84. Lu M, Lai X, Xiao G, Qin L. Symmetric-key cryptosystem
with a biotechnical hardware. J King Saud Univ Sci. with DNA technology. Sci China Ser F Inf Sci. 2007;50:
2022;34(3):Article 101838. 324–333.
67. In Menaka K. World congress on computing and 85. Lai X, Lu M, Qin L, Han J, Fang X. Asymmetric encryption
communication technologies. IEEE. 2014;2014:182–184. and signature method with DNA technology. Sci China Inf
68. Malathi P, Manoaj M, Manoj R, Raghavan V, Vinodhini R. Sci. 2010;53:506–514.
Highly improved DNA based steganography. Procedia 86. Fang X, Lai X. DNA-chip-based dynamic broadcast
Comput Sci. 2017;115:651–659. encryption scheme with constant-size ciphertexts and
69. Khalifa A. A blind DNA-steganography approach using decryption keys. Sci China Inf Sci. 2014;57:1–10.
ciphering and random sequence splicing. Paper presented at: 87. Fang X, Lai X. DNA-chip based information hiding scheme
2020 10th International Conference on Information Science achieving information-theoretic security. J Comput Theor
and Technology (ICIST); 2020; Bath, London, Plymouth, UK. Nanosci. 2015;12(7):1402–1407.
70. Na D. DNA steganography: Hiding undetectable secret 88. Wong NY, Xing H, Tan LH, Lu Y. Nano-encrypted Morse
messages within the single nucleotide polymorphisms of a code: A versatile approach to programmable and reversible
genome and detecting mutation-induced errors. Microb Cell nanoscale assembly and disassembly. J Am Chem Soc.
Factories. 2020;19(1):128. 2013;135(8):2931–2934.
71. Sadia NB, Hasan M, Islam MR. Information hiding through 89. Zhang Y, Wang F, Chao J, Xie M, Liu H, Pan M, Kopperger E,
a novel DNA steganography technique to secure text Liu X, Li Q, Shi J, et al. DNA origami cryptography for secure
communication. In: Cyber security and business intelligence. communication. Nat Commun. 2019;10(1):5469.
Abingdon (UK): Routledge; 2023. p. 184–196. 90. Fan S, Wang D, Cheng J, Liu Y, Luo T, Cui D, Ke Y, Song J.
72. Huang Y-H, Chang C-C, Wu C-Y. A DNA-based data hiding Information coding in a reconfigurable DNA origami domino
technique with low modification rates. Multimed Tools Appl. array. Angew Chem Int Ed Engl. 2020;132(31):13091–13097.
2014;70:1439–1451. 91. Yao X, Su Y, Zan X, Xu P, Liu W. An image encryption and

Downloaded from https://spj.science.org on May 25, 2025


73. Sabry M, Nazmy T, Khalifa ME. Steganography in DNA storage algorithm based on forward error correction DNA
sequence on the level of amino acids. Paper presented at: 2019 codes. J Cyber Secur. 2023;8(6):28–36.
Ninth International Conference on Intelligent Computing 92. Yao X, Xie R, Zan X, Su Y, Xu P, Liu W. A novel image
and Information Systems (ICICIS); 2019; Cairo, Egypt. encryption scheme for DNA storage systems based on
74. Alhabeeb OH, Fauzi F, Sulaiman R. Developing a novel DNA hybridization and gene mutation. Interdiscip Sci.
DNA-based steganography algorithm using random table 2023;15(3):419–432.
generation with segmentation. Multimed Tools Appl. 93. Zan X, Chu L, Xie R, Su Y, Yao X, Xu P, Liu W. An image
2023;83:40529–40567. cryptography method by highly error-prone DNA storage
75. Mohammed MH, Ali BH, Taloba AI. Self-adaptive DNA- channel. Front Bioeng Biotechnol. 2023;11:1173763.
based steganography using neural networks. Inf Sci Lett. 94. Zan X, Xie R, Yao X, Xu P, Liu W. A robust and efficient DNA
2019;8(1):15–23. storage architecture based on modulation encoding and
76. Saha P, Pinky LY, Islam MA, Akter P. Higher payload capacity decoding. J Chem Inf Model. 2023;63(12):3967–3976.
in DNA steganography using balanced tree data structure. Int 95. Chu L, Su Y, Zan X, Lin W, Yao X, Xu P, Liu W. A deniable
J Recent Technol Eng. 2019;8(4):6551–6556. encryption method for modulation-based DNA storage.
77. Hassan S, Muztaba MA, Hossain MS, Narman HSA. Hybrid Interdiscip Sci. 2024;16(4):872–881.
encryption technique based on DNA cryptography and 96. Dimopoulou M, Antonini M. Data and image storage on
steganography. Paper presented at: 2022 IEEE 13th Annual synthetic DNA: Existing solutions and challenges. Eurasip J
Information Technology, Electronics and Mobile Communication Image Video Process. 2022;2022(1):23.
Conference (IEMCON); 2022; Vancouver, BC, Canada. 97. Nimse SB, Song K-S, Kim J, Ta V-T, Nguyen V-T, Kim T. A
78. Huang C, Yang Z, Hu Z, Yang J, Qi H, Zhang J, Zheng L. DNA generalized probe selection method for DNA chips. Chem
synthetic steganography based on conditional probability adaptive Commun. 2011;47(46):12444–12446.
coding. IEEE Trans Inf Forensics Secur. 2023;18:4747–4759. 98. Jun H, Wang X, Parsons MF, Bricker WP, John T, Li S,
79. Leier A, Richter C, Banzhaf W, Rauhe H. Cryptography with Jackson S, Chiu W, Bathe M. Rapid prototyping of arbitrary
DNA binary strands. Biosystems. 2000;57(1):13–22. 2D and 3D wireframe DNA origami. Nucleic Acids Res.
80. Cui G, Qin L, Wang Y, Zhang X. An encryption scheme using 2021;49(18):10265–10274.
DNA technology. Paper presented at: 2008 3rd International 99. Organick L, Ang SD, Chen Y-J, Lopez R, Yekhanin S,
Conference on Bio-Inspired Computing: Theories and Makarychev K, Racz MZ, Kamath G, Gopalan P, Nguyen B,
Applications; 2008; Adelaide, SA, Australia. et al. Random access in large-scale DNA data storage. Nat
81. Zhang Y, Zhang D, Sun P, Guo F. DNA sequencing puzzle Biotechnol. 2018;36(3):242–248.
based DNA cryptography algorithm. Paper presented at: 7th 100. Wagenbauer KF, Engelhardt FA, Stahl E, Hechtl VK,
IASTED International Conference on Modelling, Simulation Stömmer P, Seebacher F, Meregalli L, Ketterer P, Gerling T,
and Identification; 2017; Calgary, Canada. Dietz H. How we make DNA origami. Chembiochem.
82. Li S-Y, Liu J-K, Zhao G-P, Wang J. CADS: CRISPR/Cas12a- 2017;18(19):1873–1885.
assisted DNA steganography for securing the storage and 101. Dey S, Fan C, Gothelf KV, Li J, Lin C, Liu L, Liu N,
transfer of DNA-encoded information. ACS Synth Biol. Nijenhuis MA, Saccà B, Simmel FC, et al. DNA origami. Nat
2018;7(4):1174–1178. Rev Methods Primers. 2021;1(1):13.
83. Fan C, Deng Q, Zhu TF. Bioorthogonal information storage 102. Shang Y, Li N, Liu S, Wang L, Wang ZG, Zhang Z, Ding B.
in l-DNA with a high-fidelity mirror-image Pfu DNA Site-specific synthesis of silica nanostructures on DNA
polymerase. Nat Biotechnol. 2021;39(12):1548–1555. origami templates. Adv Mater. 2020;32(21):2000294.

Chu et al. 2025 | https://doi.org/10.34133/icomputing.0106 12

You might also like