Deoxyribonucleic acid (DNA) Biometrics CPSC 4600 Biometrics and Cryptography.

Slides:



Advertisements
Similar presentations
DNA Fingerprinting and Forensic Analysis
Advertisements

Explain how crime scene evidence is
Welcome to CS262!. Goals of this course Introduction to Computational Biology  Basic biology for computer scientists  Breadth: mention many topics &
Computational Genomics Lecture 1, Tuesday April 1, 2003.
Sequence Alignment. CS262 Lecture 2, Win06, Batzoglou Complete DNA Sequences More than 300 complete genomes have been sequenced.
Sequence Alignment Cont’d. Sequence Alignment -AGGCTATCACCTGACCTCCAGGCCGA--TGCCC--- TAG-CTATCAC--GACCGC--GGTCGATTTGCCCGAC Definition Given two strings.
Sequence Alignment. Before we start, administrivia Instructor: Serafim Batzoglou, CS x Office hours: Monday 2:00-3:30 TA:
Sequence Alignment Cont’d. Evolution Scoring Function Sequence edits: AGGCCTC  Mutations AGGACTC  Insertions AGGGCCTC  Deletions AGG.CTC Scoring Function:
Welcome to CS262: Computational Genomics Instructor: Serafim Batzoglou TAs: Eugene Davydov Christina Pop Monday & Wednesday.
Sequence Alignment Slides courtesy of Serafim Batzoglou, Stanford Univ.
DNA Analysis Lesson 1.2 PBS.
DNA Fingerprinting & Forensic Analysis. How is DNA Typing Performed? Only one-tenth of 1% of DNA differs in each person; this variation can create.
Biometrics Deoxyribonucleic acid (DNA) Biometrics.
DNA Fingerprinting.
explain how crime scene evidence is
Explain how crime scene evidence is
1 Chapter 7 Chapter 7 DNA Fingerprinting Learning Goals: o Explain how crime scene evidence is collected and processed to obtain DNA o Describe how radioactive.
Dna It’s an individual sort of thing. What does DNA mean? D- deoxyribo N- nucleic A- acid Deoxyribonucleic Acid.
How can DNA be used to solve Crimes?
Chapter 7 Biologically Unique Copyright © 2012 by W. H. Freeman and Company.
DNA fingerprinting. DNA fingerprinting is used to determine paternity Look at the DNA of the mother, father and child Could these parents produce this.
DNA & Proteins B3a.
DNA Analysis. What is DNA? Deoxyribonucleic Acid Genes found on a chromosome are composed of DNA DNA contains all of our body’s genetic material.
How is DNA used to solve crimes? 8 th Grade Forensic Science T. Trimpe
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
How is DNA used to solve crimes?
Minimum Edit Distance Definition of Minimum Edit Distance.
DNA What is a DNA TEST.....Enjoy! ( Deoxyribonucleic Acid ) IF THAT DID NOT WORK ONE MORE TRY!
DNA Fingerprinting. Also known as DNA profiling Used in criminal and legal cases since the 1980’s to determine identity or parentage Also used to identify.
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
Do you agree or disagree with these statements: 1.I have eaten food that contains genetically modified (GM) crops. 2.GM foods should be available, as long.
 Intro to DNA Analysis Forensic Science 11/20/14.
Applications of DNA Analysis. DNA analysis has broad applications. Genetic Tests Huntington's disease or cystic fibrosis.
9-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein Chapter 9.
Pairwise sequence alignment Lecture 02. Overview  Sequence comparison lies at the heart of bioinformatics analysis.  It is the first step towards structural.
How is DNA be used to solve crimes? 8 th Grade Forensic Science T. Trimpe
Forensic Science DNA Analysis 1. History of Biological Evidence in Forensics  DNA fingerprinting  Also known as DNA profiling  Used with a high degree.
All rights Reserved Cengage/NGL/South-Western © 2016.
History Evidence BIOLOGICAL EVIDENCE EXAMINED FOR INHERITED TRAITS TECHNIQUES EMERGED FROM HEALTHCARE DNA FINGERPRINTING DEVELOPED IN 1984.
DNA AND ITS STRUCTURE. DNA is located inside the nucleus.
DNA Deoxyribonucleic Acid. DNA Review Genetic material (DNA) is found in the nucleus of cells, and is contained on chromosomes. An organism inherits chromosomes.
DNA Evidence How can DNA be used to solve Crimes?.
DNA Forensics 352 – O’Dette. Why DNA? DNA is individual evidence DNA links or eliminates a suspect to a crime DNA identifies a victim even if no body.
DNA Fingerprinting Review. Why DNA? DNA is individual evidence DNA links or eliminates a suspect to a crime DNA identifies a victim even if no body is.
Explain how crime scene evidence is
Explain how crime scene evidence is
Biotechnology.
All rights Reserved Cengage/NGL/South-Western © 2016.
5/14/2018 DNA Analysis.
Using DNA to solve crimes
All rights Reserved Cengage/NGL/South-Western © 2016.
Try not to leave any behind – I dare you!
DNA Fingerprinting DNA Profiling.
DNA Analysis Forensics Chapter 11.
History of Biological Evidence in Forensics
Chapter 7 T. Trimpe DNA Analysis Chapter 7 T. Trimpe
Explain how crime scene evidence is
How is DNA be used to solve crimes?
Explain how crime scene evidence is
Try not to leave any behind – I dare you!
DNA Fingerprinting.
Ch. 11: DNA Analysis.
The Indispensable Forensic Tool
Explain how crime scene evidence is
explain how crime scene evidence is
Structure and Function within Forensic Science
Explain how crime scene evidence is
Warm Up Objective: Scientists will describe DNA and its use as evidence by taking notes and analyzing DNA fingerprints. What is the topic? What will you.
Try not to leave any behind – I dare you!
Presentation transcript:

Deoxyribonucleic acid (DNA) Biometrics CPSC 4600 Biometrics and Cryptography

 DNA analysis is no longer confined to genetic and medical research.  Criminal Forensics: –Forensic science relies heavily on the ability of DNA to identify the source of biological substances and determine who is most likely to have committed a crime. –This ability to identify an individual is enhanced by the variety of substances that contain DNA, including blood, hair, urine, bone, teeth, and tissues. DNA

 Criminal Forensics: –Using saliva, the FBI were able to match DNA samples from letters mailed to relatives by Theodore Kaczynski with DNA obtained from stamps on letters mailed by the Unabomber (University and Airline Bomber). Theodore Kaczynski –Identification of specimens using DNA has had other benefits, in one third of the cases where this technique has been used, DNA analysis has been able to exonerate people wrongly accused of crimes. DNA

 Establishing paternity –DNA analysis is now a common tool for establishing paternity, and it has been called on to identify remains after tragedies such as airline accidents.  Investigating migration of human beings and genetic disease –Anthropologists are using DNA analysis to study the migration of human beings across the oceans. –Historians employ these techniques to identify genetic disease in famous individuals.  Tracking endangered species –Wildlife biologists use the variation of DNA sequences between species to track endangered species. DNA

Features of DNA  DNA is composed of FOUR different chemical building blocks called "bases". These four bases are: –adenine (A) –guanine (G) –thymine (T) –cytosine (C)  They are joined together in one strand by strong covalent bonds. These two strands are held together in a double helix because bases with complementary shapes can pair with each other.

The chemical structure of DNA

Features of DNA (cont’d)  Adenine is able to pair with Thymine and Guanine pairs with Cytosine.  Complementary base pairs are found along the entire length of the DNA duplex.  The complementary nature of the two strands provides a basis for copying genetic information and for passing this information on to offspring.

 Information is stored in DNA in the sequence of bases just as information can be stored in a book in the sequence of letters.  Each human cell contains approximately 3 billion base pairs of DNA organized in 23 pairs of chromosomes.  Every person inherits one set of 23 chromosomes from the mother and one set of 23 chromosomes from the father. Features of DNA (cont’d)

Techniques used for DNA fingerprinting 1.Isolating the DNA in question from the rest of the cellular material in the nucleus. 2.Cutting the DNA into several pieces of different sizes. 3.Sorting the DNA pieces by size. 4.Denaturing the DNA, so that all of the DNA is rendered single-stranded. This can be done either by heating or chemically treating the DNA in the gel. 5.Blotting the DNA. 6.DNA sequence is detected: AGGCCTC More: html html

Polymerase Chain Reaction (PCR) for DNA Fingerprinting  Often DNA samples obtained from crime scenes are too small in quantity or too degraded by sunlight or high temperature to be analyzed by the restriction fragment length polymorphism (RFLP) method.  These samples are subjected to a different fingerprinting technique known as PCR.  PCR is a valuable technique because it provides a method for producing millions of copies of small regions of DNA.

DNA Matching -- Sequence Alignment -AGGCTATCACCTGACCTCCAGGCCGA--TGCCC--- TAG-CTATCAC--GACCGC--GGTCGATTTGCCCGAC Definition Given two strings x = x 1 x 2...x M, y = y 1 y 2 …y N, an alignment is an assignment of gaps to positions 0,…, N in x, and 0,…, N in y, so as to line up each letter in one sequence with either a letter, or a gap in the other sequence AGGCTATCACCTGACCTCCAGGCCGATGCCC TAGCTATCACGACCGCGGTCGATTTGCCCGAC

What is a good alignment? Alignment: The “best” way to match the letters of one sequence with those of the other How do we define “best”? Alignment: A hypothesis that the two sequences come from a common ancestor through sequence edits Parsimonious explanation: Find the minimum number of edits that transform one sequence into the other

Scoring Function  Sequence edits: AGGCCTC –MutationsAGGACTC –InsertionsAGGGCCTC –DeletionsAGG. CTC Scoring Function: Match: +m Mismatch: -s Gap:-d Score F = (# matches)  m - (# mismatches)  s – (#gaps)  d

How do we compute the best alignment? AGTGCCCTGGAACCCTGACGGTGGGTCACAAAACTTCTGGA AGTGACCTGGGAAGACCCTGACCCTGGGTCACAAAACTC Too many possible alignments: O( 2 M+N ) M N

DNA Matching -- Dot matrix method  The dot matrix method (dot plot method) is a graphical way of comparing two sequences.  In a dot matrix, two sequences to be compared are represented as horizontal and vertical axes of a two- dimensional diagram.  The comparison is done by scanning each residue of one sequence for similarity with all residues in the other sequence.

Dot matrix method If a residue match is found, a dot is placed within the graph. Otherwise, the matrix positions will be left blank. When the two sequences have substantial regions of similarity, many dots line up to form contiguous diagonal lines, which reveal the sequence alignment. If there are interruptions in the middle of a diagonal line, they will indicate insertions and deletions. Parallel diagonal lines represent repetition. Basically Diagonal lines = alignment Non-diagonal lines = gaps

Dynamic Programming Dynamic programming is a method that determines optimal alignment between two sequences. Suppose we wish to align x 1 ……x M y 1 ……y N Let F(i,j) = optimal score of aligning x 1 ……x i y 1 ……y j

Three steps: 1. creates a two-dimensional alignment grid as in the dot matrix method.. 2. accumulates scores in the matrix for matches and mismatches b/w sequences. 3. traces back through matrix in reverse order to identify the highest scoring path. Dynamic Programming (cont’d)

Notice three possible cases: 1.x i aligns to y j x 1 ……x i-1 x i y 1 ……y j-1 y j 2.x i aligns to a gap x 1 ……x i-1 x i y 1 ……y j - 3.y j aligns to a gap x 1 ……x i - y 1 ……y j-1 y j m, if x i = y j F(i,j) = F(i-1, j-1) + -s, if not F(i,j) = F(i-1, j) - d F(i,j) = F(i, j-1) - d Match: +m Mismatch: -s Gap: -d F(i-1, j-1)F(i-1, j) F( i, j-1)F(i, j) +m/-s -d

Dynamic Programming (cont’d)  How do we know which case is correct? Inductive assumption: F(i, j-1), F(i-1, j), F(i-1, j-1) are optimal Then, F(i-1, j-1) + s(x i, y j ) F(i, j) = maxF(i-1, j) – d F( i, j-1) – d Where s(x i, y j ) = m, if x i = y j ;-s, if not Match: +m Mismatch: -s Gap: -d

Intuitive understanding of the algorithm F(i, j) is the maximum score from one of the three directions. Match: +m Mismatch: -s Gap: -d F(i-1, j-1)F(i-1, j) F( i, j-1)F(i, j) +m/-s -d

F(i,j) i = Example x = AGTAm = 1 y = ATAs = 1 d = 1 AGTA A T-2 A-3 j = Optimal Alignment: F(4,3) = 2 AGTA A - TA

Example x = AGTAm = 1 y = ATAs = -1 d = -1 AGTA A10 -2 T 0010 A-3 02 F(i,j) i = j = Optimal Alignment: F(4,3) = 2 AGTA A - TA Score= 3 match + 0 mismatch + 1 gap = 3x1 + 0x(-1) + 1x(-1) = 2

The Needleman-Wunsch Matrix x 1 ……………………………… x M y 1 ……………………………… y N Every nondecreasing path from (0,0) to (M, N) corresponds to an alignment of the two sequences Can think of it as a divide-and-conquer algorithm

The Needleman-Wunsch Algorithm 1.Initialization. a.F(0, 0) = 0 b.F(0, j) = - j  d c.F(i, 0)= - i  d 2.Main Iteration. Filling-in partial alignments a.For each i = 1……M For eachj = 1……N F(i-1,j) – d [case 1] F(i, j) = max F(i, j-1) – d [case 2] F(i-1, j-1) + s(x i, y j ) [case 3] UP, if [case 1] Ptr(i,j)= LEFTif [case 2] DIAGif [case 3] 3.Termination. F(M, N) is the optimal score, and from Ptr(M, N) can trace back optimal alignment

Performance  Time: O(NM)  Space: O(NM)

The local alignment problem Given two strings x = x 1 ……x M, y = y 1 ……y N Find substrings x’, y’ whose similarity (optimal global alignment value) is maximum e.g.x = aaaacccccgggg y = cccgggaaccaacc

DP for local alignment

The Smith-Waterman algorithm Idea: Ignore badly aligning regions Modifications to Needleman-Wunsch: Initialization:F(0, j) = F(i, 0) = 0 0 Iteration:F(i, j) = max F(i – 1, j) – d F(i, j – 1) – d F(i – 1, j – 1) + s(x i, y j )

The Smith-Waterman algorithm Termination: 1.If we want the best local alignment… F OPT = max i,j F(i, j) 2.If we want all local alignments scoring > t For all i, j find F(i, j) > t, and trace back

Smith-Waterman Algorithm (Example) ATCTCGTATGATGGTCTATCAC  Align S1=ATCTCGTATGATG S2=GTCTATCAC  G T C T A T C A C  ATCTCGTATGATG  d=1 A T C T C G T A T G A T G G T C T A T C A C G T C  T A T C A C m, if x i = y j S(i,j) = -s, if not

An example of Smith Waterman A T T G C Align with DP:A G G C Match: m = 1 Gap: d = -1 Mismatch: s = 0

0 0 1 Match: 1 Gap: -1 Mismatch: 0 An example of Smith Waterman

Score= 3 match + 1 mismatch + 1 gap = 3x1 + 1x0 + 1x(-1) = Match: 1 Gap: -1 Mismatch: 0 An example of Smith Waterman

Advantages and disadvantages of DP

Biometrics Issues and concerns

Issues and concerns  Excessive concern with the biometric may have an eclipsing effect on the performance of the technology. One could: –plant DNA at the scene of the crime –associate another's identity with his biometrics, thereby impersonating without arousing suspicion –interfere with the interface between a biometric device and the host system, so that a "fail" message gets converted to a "pass".

Identity theft and privacy issues  Two types of privacy concerns: –Informational privacy. Relates to the unauthorized collection, storage, and usage of biometric information. For example, if someone’s iris scan is stolen it allows someone else to access personal information or financial accounts, the damage could be irreversible. –Personal privacy. Relates to an inherent discomfort individuals may feel when encountering biometric technology. –The former one is more critical.

Defining Application-Specific Privacy Risk: The BioPrivacy Impact Framework  Certain types of biometric deployments are more prone than others to lead to privacy- invasive uses, while other types of deployments have little or no bearing on privacy.  Biometrics, in and of themselves, are neither a protector nor an enemy of privacy.  The type of deployment determines the relation between biometrics and privacy.

Biometric Deployments  Overt versus Covert –User awareness and consent, –Notices and signs –A covert system can not permanently store biometric info collected from individuals who do not match watch lists.  Opt-in versus Mandatory –Mandatory system runs greater privacy risks than a voluntary or opt-in system. –Choice over whether one wants to provide one’s personal info is a central privacy principle.

Biometric Deployments  Verification versus Identification –Identification (1:N) is more susceptible to privacy- related abuse than a system only capable of 1:1 matching.  Fixed Duration versus Indefinite Duration –When deployed for an indefinite duration, the risk increases.  Public Sector versus Private Sector –Data in public sector are more likely to be misused.

Biometric Deployments  Citizen, Employee, Traveler, Student, Customer, Individual  User ownership versus Institutional Ownership of Biometric Data  Personal Storage versus Storage in Template Database

Sociological concerns  Physical concerns: –Biometric technology can cause physical harm to an individual using the methods, or instruments are unsanitary.  Personal information concerns: –whether our personal information taken through biometric methods can be misused, tampered with, or sold, e.g. by criminals stealing, rearranging or copying the biometric data. –The data obtained using biometrics can be used in unauthorized ways without the individual's consent.

Sociological concerns  Society fears in using biometrics will continue over time. As the public becomes more educated on the practices, and the methods are being more widely used, these concerns will become more and more evident.  Biometric technology is being used at border crossings that have electronic readers that are able to read the chip in the cards and verify the information present in the card and on the passport.  Biometric method allows for the increase in efficiency and accuracy of identifying people at the border crossing. CANPASS, by Canada Customs is currently being used by some major airports that have kiosks set up to take digital pictures of a person’s eye as a means of identification.

Conclusions  Despite these misgivings, biometric systems have the potential to identify individuals with a very high degree of certainty.  Forensic DNA evidence enjoys a particularly high degree of public trust at present  Also substantial claims are being made in respect of iris recognition technology, which has the capacity to discriminate between individuals with identical DNA, such as monozygotic twins.