{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T20:34:05Z","timestamp":1772138045122,"version":"3.50.1"},"reference-count":26,"publisher":"Oxford University Press (OUP)","issue":"17","license":[{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/100000092","name":"National Library Of Medicine","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000092","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["R01LM013429"],"award-info":[{"award-number":["R01LM013429"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,9]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:sec>\n                    <jats:title>Motivation<\/jats:title>\n                    <jats:p>Genome data is a subject of study for both biology and computer science since the start of the Human Genome Project in 1990. Since then, genome sequencing for medical and social purposes becomes more and more available and affordable. Genome data can be shared on public websites or with service providers (SPs). However, this sharing compromises the privacy of donors even under partial sharing conditions. We mainly focus on the liability aspect ensued by the unauthorized sharing of these genome data. One of the techniques to address the liability issues in data sharing is the watermarking mechanism.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Results<\/jats:title>\n                    <jats:p>To detect malicious correspondents and SPs\u2014whose aim is to share genome data without individuals\u2019 consent and undetected\u2014, we propose a novel watermarking method on sequential genome data using belief propagation algorithm. In our method, we have two criteria to satisfy. (i) Embedding robust watermarks so that the malicious adversaries cannot temper the watermark by modification and are identified with high probability. (ii) Achieving \u03f5-local differential privacy in all data sharings with SPs. For the preservation of system robustness against single SP and collusion attacks, we consider publicly available genomic information like Minor Allele Frequency, Linkage Disequilibrium, Phenotype Information and Familial Information. Our proposed scheme achieves 100% detection rate against the single SP attacks with only 3% watermark length. For the worst case scenario of collusion attacks (50% of SPs are malicious), 80% detection is achieved with 5% watermark length and 90% detection is achieved with 10% watermark length. For all cases, the impact of \u03f5 on precision remained negligible and high privacy is ensured.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Availability and implementation<\/jats:title>\n                    <jats:p>https:\/\/github.com\/acoksuz\/PPRW\\_SGD\\_BPLDP<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Supplementary information<\/jats:title>\n                    <jats:p>Supplementary data are available at Bioinformatics online.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1093\/bioinformatics\/btab128","type":"journal-article","created":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T15:42:10Z","timestamp":1614094930000},"page":"2668-2674","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-preserving and robust watermarking on sequential genome data using belief propagation and local differential privacy"],"prefix":"10.1093","volume":"37","author":[{"given":"Abdullah \u00c7a\u011flar","family":"\u00d6ks\u00fcz","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Bilkent University , Ankara, Turkey"}]},{"given":"Erman","family":"Ayday","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Bilkent University , Ankara, Turkey"},{"name":"Department of Electrical Engineering and Computer Science, Case Western Reserve University , Cleveland, OH, USA"}]},{"given":"U\u011fur","family":"G\u00fcd\u00fckbay","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Bilkent University , Ankara, Turkey"}]}],"member":"286","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"key":"2024041009361700700_btab128-B1","article-title":"Geo-indistinguishability: differential privacy for location-based systems","volume":"pp. 901\u2013914","author":"Andr\u00e9s","year":"2013"},{"key":"2024041009361700700_btab128-B2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1145\/2517840.2517843","volume-title":"Proceedings of 12th ACM Workshop on Workshop on Privacy in the Electronic Society, WPES \u201913","author":"Ayday","year":"2013"},{"key":"2024041009361700700_btab128-B3","first-page":"323","volume-title":"Proceedings of the 22nd Int. Symp. Res. Attacks, Intrusions, Defenses, RAID \u201919","author":"Ayday","year":"2019"},{"key":"2024041009361700700_btab128-B4","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913512","volume-title":"Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications","author":"Barni","year":"2004","edition":"1st edn"},{"key":"2024041009361700700_btab128-B5","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.jmoldx.2018.07.009","article-title":"Considerations for genomic data privacy and security when working in the cloud","volume":"21","author":"Carter","year":"2019","journal-title":"J. Mol. Diagn"},{"key":"2024041009361700700_btab128-B6","year":"1996"},{"key":"2024041009361700700_btab128-B7","volume-title":"Digital Watermarking and Steganography","author":"Cox","year":"2008"},{"key":"2024041009361700700_btab128-B8","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/TCBB.2017.2709740","article-title":"An inference attack on genomic data using kinship, complex correlations, and phenotype information","volume":"15","author":"Deznabi","year":"2018","journal-title":"IEEE\/ACM Trans. Comp. Biol. Bioinf"},{"key":"2024041009361700700_btab128-B9","volume-title":"Primer of Applied Regression & Analysis of Variance","author":"Glantz","year":"2016"},{"key":"2024041009361700700_btab128-B10","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1038\/s41587-019-0271-3","article-title":"Data privacy in the age of personal genomics","volume":"37","author":"Grishin","year":"2019","journal-title":"Nat. Biotechnol"},{"key":"2024041009361700700_btab128-B11","doi-asserted-by":"crossref","DOI":"10.1186\/1471-2199-9-40","article-title":"DNA watermarks: a proof of concept","volume":"9","author":"Heider","year":"2008","journal-title":"BMC Mol. Biol"},{"key":"2024041009361700700_btab128-B12","first-page":"1141","author":"Humbert","year":"2013"},{"key":"2024041009361700700_btab128-B13","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0117717","article-title":"GenInfoGuard\u2014a robust and distortion-free watermarking technique for genetic data","volume":"10","author":"Iftikhar","year":"2015","journal-title":"PLoS One"},{"key":"2024041009361700700_btab128-B14","year":"2013"},{"key":"2024041009361700700_btab128-B15","first-page":"1","article-title":"Extremal mechanisms for local differential privacy","volume":"17","author":"Kairouz","year":"2016","journal-title":"J. Mach. Learn. Res., 17,"},{"key":"2024041009361700700_btab128-B16","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1093\/bioinformatics\/btx568","article-title":"A utility maximizing and privacy preserving approach for protecting kinship in genomic databases","volume":"34","author":"Kale","year":"2017","journal-title":"Bioinformatics"},{"key":"2024041009361700700_btab128-B17","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/ICDM.2003.1250908","volume-title":"Third IEEE international conference on data mining","author":"Kargupta","year":"2003"},{"key":"2024041009361700700_btab128-B18","doi-asserted-by":"crossref","first-page":"p. 272","DOI":"10.1109\/ISIE.2001.931796","article-title":"A survey of watermarking techniques applied to multimedia","volume":"1","author":"Lee","year":"2001","journal-title":"ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570)"},{"key":"2024041009361700700_btab128-B19","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/ICDE.2007.367856","article-title":"t-closeness: privacy beyond k-anonymity and l\u2013diversity","author":"Li","year":"2007","journal-title":"2007 IEEE 23rd International Conference on Data Engineering"},{"key":"2024041009361700700_btab128-B20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0042465","article-title":"Embedding permanent watermarks in synthetic genes","volume":"7","author":"Liss","year":"2012","journal-title":"PLoS One"},{"key":"2024041009361700700_btab128-B21","doi-asserted-by":"crossref","DOI":"10.1145\/1217299.1217302","article-title":"L diversity: privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"2024041009361700700_btab128-B22","doi-asserted-by":"crossref","first-page":"2867","DOI":"10.1093\/bioinformatics\/btq559","article-title":"Robust relationship inference in genome-wide association studies","volume":"26","author":"Manichaikul","year":"2010","journal-title":"Bioinformatics"},{"key":"2024041009361700700_btab128-B23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.5032\/jae.1994.01005","article-title":"Correlations: description or inference?","volume":"35","author":"Miller","year":"1994","journal-title":"J. Agric. Educ"},{"key":"2024041009361700700_btab128-B24","author":"Samurai","year":"1998"},{"key":"2024041009361700700_btab128-B25","doi-asserted-by":"crossref","first-page":"R225","DOI":"10.1093\/hmg\/ddh254","article-title":"Mechanisms of non-Mendelian inheritance in genetic disease","volume":"13","author":"van Heyningen","year":"2004","journal-title":"Hum. Mol. Genet"},{"key":"2024041009361700700_btab128-B26","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/S0167-7799(02)00039-2","article-title":"Biomedical databases: protecting privacy and promoting research","volume":"21","author":"Wylie","year":"2003","journal-title":"Trends Biotechnol"}],"container-title":["Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/bioinformatics\/advance-article-pdf\/doi\/10.1093\/bioinformatics\/btab128\/38245811\/btab128.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/37\/17\/2668\/57196281\/btab128.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/37\/17\/2668\/57196281\/btab128.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T05:40:44Z","timestamp":1712727644000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article\/37\/17\/2668\/6149476"}},"subtitle":[],"editor":[{"given":"Jinbo","family":"Xu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,2,25]]},"references-count":26,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2021,9,9]]}},"URL":"https:\/\/doi.org\/10.1093\/bioinformatics\/btab128","relation":{"has-preprint":[{"id-type":"doi","id":"10.1101\/2020.09.04.283135","asserted-by":"object"}]},"ISSN":["1367-4803","1367-4811"],"issn-type":[{"value":"1367-4803","type":"print"},{"value":"1367-4811","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2021,9,1]]},"published":{"date-parts":[[2021,2,25]]}}}