Data encoded in molecules offers opportunities for secret messaging and extreme information density. Here, we explore how the same chemical and physical dimensions used to encode molecular information can expose molecular messages to detection and manipulation. To address these vulnerabilities, we write data using an object's pre-existing surface chemistry in ways that are indistinguishable from the original substrate. While it is simple to embed chemical information onto common objects (covers) using routine steganographic permutation, chemically embedded covers are found to be resistant to detection by sophisticated analytical tools. Using Turbo codes for efficient digital error correction, we demonstrate recovery of secret keys hidden in the pre-existing chemistry of American one dollar bills. These demonstrations highlight ways to improve security in other molecular domains, and show how the chemical fingerprints of common objects can be harnessed for data storage and communication.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8260626 | PMC |
http://dx.doi.org/10.1038/s41598-021-92987-2 | DOI Listing |
Fundam Res
July 2024
College of Electronic and Optical Engineering, & College of Flexible Electronics (Future Technology), Nanjing University of Posts and Telecommunications, Nanjing 210023, China.
Quantum secure direct communication (QSDC) can directly transmit secret messages through quantum channel without keys. Device-independent (DI) QSDC guarantees the message security relying only on the observation of the Bell-inequality violation, but not on any detailed description or trust of the devices' inner workings. Compared with conventional QSDC, DI-QSDC has relatively low secret message capacity.
View Article and Find Full Text PDFAngew Chem Int Ed Engl
December 2024
Institute of Analytical Chemistry, Department of Chemistry, Zhejiang University, Hangzhou, 310058, China.
The escalating needs in information protection underscore the urgency of developing advanced encryption strategies. Herein we report a novel chemical approach that enables information encryption by on-paper electrochemiluminescence (ECL). Dendritic porous silica nanospheres modified with polyetherimide and bovine serum albumin were prepared as the chemical ink to write the secret message on a paper.
View Article and Find Full Text PDFPeerJ Comput Sci
September 2024
College of Computer and Information Engineering, Henan Normal University, Xinxiang, Henan, China.
Background: With the development of steganography technology, lawbreakers can implement covert communication in social networks more easily, exacerbating network security risks. Sterilization of image steganography methods can eliminate secret messages to block the transmission of illegal covert communication. However, existing methods overly rely on cover-stego image pairs and are unable to sanitize unknown image, which reduces stego image blocking rate in social networks.
View Article and Find Full Text PDFiScience
October 2024
The School of Electronic Information, Central South University, Changsha 410083, China.
The Internet of Vehicles (IoVs) is one of the most popular techniques among the applications of Internet of Things. The existing IoVs are mainly protected by public key cryptographic systems, which provide identity authentication and information security. Nevertheless, using the proposed Shor's algorithm, the security of all classical cryptographic schemes will be exposed to future quantum computer technologies.
View Article and Find Full Text PDFPeerJ Comput Sci
August 2024
The Custodian of the Two Holy Mosques Institute for Hajj and Umrah Research, Umm Al-Qura University, Makkah, Saudi Arabia.
Mega events attract mega crowds, and many data exchange transactions are involved among organizers, stakeholders, and individuals, which increase the risk of covert eavesdropping. Data hiding is essential for safeguarding the security, confidentiality, and integrity of information during mega events. It plays a vital role in reducing cyber risks and ensuring the seamless execution of these extensive gatherings.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!