Data encoded in molecules offers opportunities for secret messaging and extreme information density. Here, we explore how the same chemical and physical dimensions used to encode molecular information can expose molecular messages to detection and manipulation. To address these vulnerabilities, we write data using an object's pre-existing surface chemistry in ways that are indistinguishable from the original substrate. While it is simple to embed chemical information onto common objects (covers) using routine steganographic permutation, chemically embedded covers are found to be resistant to detection by sophisticated analytical tools. Using Turbo codes for efficient digital error correction, we demonstrate recovery of secret keys hidden in the pre-existing chemistry of American one dollar bills. These demonstrations highlight ways to improve security in other molecular domains, and show how the chemical fingerprints of common objects can be harnessed for data storage and communication.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8260626PMC
http://dx.doi.org/10.1038/s41598-021-92987-2DOI Listing

Publication Analysis

Top Keywords

secret messaging
8
common objects
8
messaging endogenous
4
endogenous chemistry
4
chemistry data
4
data encoded
4
encoded molecules
4
molecules offers
4
offers opportunities
4
opportunities secret
4

Similar Publications

High-capacity device-independent quantum secure direct communication based on hyper-encoding.

Fundam Res

July 2024

College of Electronic and Optical Engineering, & College of Flexible Electronics (Future Technology), Nanjing University of Posts and Telecommunications, Nanjing 210023, China.

Quantum secure direct communication (QSDC) can directly transmit secret messages through quantum channel without keys. Device-independent (DI) QSDC guarantees the message security relying only on the observation of the Bell-inequality violation, but not on any detailed description or trust of the devices' inner workings. Compared with conventional QSDC, DI-QSDC has relatively low secret message capacity.

View Article and Find Full Text PDF

Remote On-Paper Electrochemiluminescence-Based High-Safety and Multilevel Information Encryption.

Angew Chem Int Ed Engl

December 2024

Institute of Analytical Chemistry, Department of Chemistry, Zhejiang University, Hangzhou, 310058, China.

The escalating needs in information protection underscore the urgency of developing advanced encryption strategies. Herein we report a novel chemical approach that enables information encryption by on-paper electrochemiluminescence (ECL). Dendritic porous silica nanospheres modified with polyetherimide and bovine serum albumin were prepared as the chemical ink to write the secret message on a paper.

View Article and Find Full Text PDF

Sterilization of image steganography using self-supervised convolutional neural network.

PeerJ Comput Sci

September 2024

College of Computer and Information Engineering, Henan Normal University, Xinxiang, Henan, China.

Background: With the development of steganography technology, lawbreakers can implement covert communication in social networks more easily, exacerbating network security risks. Sterilization of image steganography methods can eliminate secret messages to block the transmission of illegal covert communication. However, existing methods overly rely on cover-stego image pairs and are unable to sanitize unknown image, which reduces stego image blocking rate in social networks.

View Article and Find Full Text PDF

The Internet of Vehicles (IoVs) is one of the most popular techniques among the applications of Internet of Things. The existing IoVs are mainly protected by public key cryptographic systems, which provide identity authentication and information security. Nevertheless, using the proposed Shor's algorithm, the security of all classical cryptographic schemes will be exposed to future quantum computer technologies.

View Article and Find Full Text PDF

A novel approach to secure communication in mega events through Arabic text steganography utilizing invisible Unicode characters.

PeerJ Comput Sci

August 2024

The Custodian of the Two Holy Mosques Institute for Hajj and Umrah Research, Umm Al-Qura University, Makkah, Saudi Arabia.

Mega events attract mega crowds, and many data exchange transactions are involved among organizers, stakeholders, and individuals, which increase the risk of covert eavesdropping. Data hiding is essential for safeguarding the security, confidentiality, and integrity of information during mega events. It plays a vital role in reducing cyber risks and ensuring the seamless execution of these extensive gatherings.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!