Loading [MathJax]/jax/output/SVG/jax.js
Review

Type I CRISPR-Cas-mediated microbial gene editing and regulation

  • There are six major types of CRISPR-Cas systems that provide adaptive immunity in bacteria and archaea against invasive genetic elements. The discovery of CRISPR-Cas systems has revolutionized the field of genetics in many organisms. In the past few years, exploitations of the most abundant class 1 type I CRISPR-Cas systems have revealed their great potential and distinct advantages to achieve gene editing and regulation in diverse microorganisms in spite of their complicated structures. The widespread and diversified type I CRISPR-Cas systems are becoming increasingly attractive for the development of new biotechnological tools, especially in genetically recalcitrant microbial strains. In this review article, we comprehensively summarize recent advancements in microbial gene editing and regulation by utilizing type I CRISPR-Cas systems. Importantly, to expand the microbial host range of type I CRISPR-Cas-based applications, these structurally complicated systems have been improved as transferable gene-editing tools with efficient delivery methods for stable expression of CRISPR-Cas elements, as well as convenient gene-regulation tools with the prevention of DNA cleavage by obviating deletion or mutation of the Cas3 nuclease. We envision that type I CRISPR-Cas systems will largely expand the biotechnological toolbox for microbes with medical, environmental and industrial importance.

    Citation: Zeling Xu, Shuzhen Chen, Weiyan Wu, Yongqi Wen, Huiluo Cao. Type I CRISPR-Cas-mediated microbial gene editing and regulation[J]. AIMS Microbiology, 2023, 9(4): 780-800. doi: 10.3934/microbiol.2023040

    Related Papers:

    [1] Junli Liu . Threshold dynamics of a time-delayed hantavirus infection model in periodic environments. Mathematical Biosciences and Engineering, 2019, 16(5): 4758-4776. doi: 10.3934/mbe.2019239
    [2] Timothy C. Reluga, Jan Medlock, Alison Galvani . The discounted reproductive number for epidemiology. Mathematical Biosciences and Engineering, 2009, 6(2): 377-393. doi: 10.3934/mbe.2009.6.377
    [3] Junyuan Yang, Rui Xu, Xiaofeng Luo . Dynamical analysis of an age-structured multi-group SIVS epidemic model. Mathematical Biosciences and Engineering, 2019, 16(2): 636-666. doi: 10.3934/mbe.2019031
    [4] Zi Sang, Zhipeng Qiu, Xiefei Yan, Yun Zou . Assessing the effect of non-pharmaceutical interventions on containing an emerging disease. Mathematical Biosciences and Engineering, 2012, 9(1): 147-164. doi: 10.3934/mbe.2012.9.147
    [5] Wenjuan Guo, Ming Ye, Xining Li, Anke Meyer-Baese, Qimin Zhang . A theta-scheme approximation of basic reproduction number for an age-structured epidemic system in a finite horizon. Mathematical Biosciences and Engineering, 2019, 16(5): 4107-4121. doi: 10.3934/mbe.2019204
    [6] Akhil Kumar Srivastav, Pankaj Kumar Tiwari, Prashant K Srivastava, Mini Ghosh, Yun Kang . A mathematical model for the impacts of face mask, hospitalization and quarantine on the dynamics of COVID-19 in India: deterministic vs. stochastic. Mathematical Biosciences and Engineering, 2021, 18(1): 182-213. doi: 10.3934/mbe.2021010
    [7] Ann Nwankwo, Daniel Okuonghae . Mathematical assessment of the impact of different microclimate conditions on malaria transmission dynamics. Mathematical Biosciences and Engineering, 2019, 16(3): 1414-1444. doi: 10.3934/mbe.2019069
    [8] Ridouan Bani, Rasheed Hameed, Steve Szymanowski, Priscilla Greenwood, Christopher M. Kribs-Zaleta, Anuj Mubayi . Influence of environmental factors on college alcohol drinking patterns. Mathematical Biosciences and Engineering, 2013, 10(5&6): 1281-1300. doi: 10.3934/mbe.2013.10.1281
    [9] Ning Yu, Xue Zhang . Discrete stage-structured tick population dynamical system with diapause and control. Mathematical Biosciences and Engineering, 2022, 19(12): 12981-13006. doi: 10.3934/mbe.2022606
    [10] Baojun Song . Basic reinfection number and backward bifurcation. Mathematical Biosciences and Engineering, 2021, 18(6): 8064-8083. doi: 10.3934/mbe.2021400
  • There are six major types of CRISPR-Cas systems that provide adaptive immunity in bacteria and archaea against invasive genetic elements. The discovery of CRISPR-Cas systems has revolutionized the field of genetics in many organisms. In the past few years, exploitations of the most abundant class 1 type I CRISPR-Cas systems have revealed their great potential and distinct advantages to achieve gene editing and regulation in diverse microorganisms in spite of their complicated structures. The widespread and diversified type I CRISPR-Cas systems are becoming increasingly attractive for the development of new biotechnological tools, especially in genetically recalcitrant microbial strains. In this review article, we comprehensively summarize recent advancements in microbial gene editing and regulation by utilizing type I CRISPR-Cas systems. Importantly, to expand the microbial host range of type I CRISPR-Cas-based applications, these structurally complicated systems have been improved as transferable gene-editing tools with efficient delivery methods for stable expression of CRISPR-Cas elements, as well as convenient gene-regulation tools with the prevention of DNA cleavage by obviating deletion or mutation of the Cas3 nuclease. We envision that type I CRISPR-Cas systems will largely expand the biotechnological toolbox for microbes with medical, environmental and industrial importance.



    H.265/HEVC stands for high efficiency video coding. It is a new generation of video compression coding standards officially released by the ITU-T | ISO/IEC Joint Collaboration Team on Video Coding (JCT-VC). A more efficient video coding algorithm saves 50% of the bit rate compared to the previous generation coding standard H.264/AVC, which greatly increases the video data transmission speed and supports higher-definition video coding [1]. The encryption and decryption operations of video data require a large number of ciphers, which are the same as the requirements of the 'one-time pads' encryption technology proposed by Shannon [2]. For any piece of plain text information, a cipher with the same volume as the plain text information must be generated, and a bit XOR operation obtains ciphertext information of equal volume. Chaos is the externally complex performance of nonlinear deterministic systems due to inherent randomness. In the material world, chaos can be seen everywhere, as large as the entire universe, as small as a single elementary particle, everything is subject to chaos theory. The introduction of chaos theory into cryptography was first proposed by British scholar R. Matthews in 1989 [3], therefore chaotic systems have received great attention in the field of cryptography and information security, especially in the aspect of rapid processing of a large quantity of video data, which makes the chaotic cryptography algorithm a promising cryptographic algorithm [4].

    As an increasing number of chaotic stream cipher algorithms have been proposed, the security and efficiency issues of applying chaotic map to stream cipher algorithms have also received attention. Chaotic systems used in cryptographic algorithms can be divided into two categories: one-dimensional chaos and high-dimensional chaos. The advantage of a one-dimensional chaotic system is its simple structure and ease of implementation, such as Logistic map and Tent map, but a one-dimensional chaotic system has some inherent defects in cryptography, such as uneven orbit distribution, a small key space, and a low Lyapunov exponent. High-dimensional chaotic systems have the advantages of a large key space and strong randomness, but the calculation process of high-dimensional maps is complicated, and the efficiency in the computer realization process is insufficient, which hinders the practical application of high-dimensional chaotic cryptographic algorithms. The coupled map lattice (CML) model is introduced to ensure that the one-dimensional chaotic system has a high-dimensional chaotic map, and simultaneously reduces the calculation process complexity [5]. Wang et al. proposed using the segmented Logistic map as a local chaotic map and introduced it into the two-dimensional coupled map lattice model to construct a chaotic model with complex dynamics [6]. By introducing the state value offset, the state value probability of the model was solved. Considering the problem of uneven density distribution, analysis of the Lyapunov exponent, bifurcation, ergodic interval and probability density distribution of the parameter settings in the model shows that the proposed model has good performance. Zhang et al proposed a new image encryption algorithm based on spatiotemporal nonadjacent coupled graphs [7]. Compared with the logical map or the coupled map lattice, the nonadjacent coupled map lattice system has a better encryption function in terms of dynamics. In the encryption of the image, a bit-level pixel replacement method is used to make the bit planes of the pixels replace each other without any additional storage space. However, obtaining data directly on the chaotic trajectory and directly outputting it exposes certain characteristics of the chaotic map, making it possible to predict the trend of the chaotic trajectory, which in turn leads to its weak security. Lv proposed a pseudorandom number generator based on time-varying coupled map lattice [8]. The calculation of the next value of the current grid is not only related to the current value of the model, but also uses a similar Chebyshev map to determine the time delay t, and couples the grid at the current time with the grid before time t, which increases the chaos of the system degree, making its orbit in phase space more complicated. However, the probability density of the core components used in the system is not uniform. In the process of designing cryptographic algorithms, choosing core components with uniform probability density helps increase the difficulty of the attacker attacking the algorithm. Yang proposed an improper fractional-order laser chaos system and applied it to image encryption [9]. The experimental results show that the key space, correlation coefficient, information entropy, histogram, differential attack and robustness of the encryption scheme are good. The improper fractional-order laser chaotic system not only has rich dynamic characteristics, but also is used in image encryption algorithms. It has better safety at the time. However, this system is a high-dimensional chaotic system, and its computational complexity is not superior to that of a lower-dimensional system.

    The selective encryption algorithm usually selects some important syntax elements for encryption during the encoding process, while the encrypted video can maintain format compatibility and ensure that it can be decoded by the HEVC standard decoder. The encrypted and decoded video produces distortion, and unauthorized access users cannot obtain effective information from it. Saleh et al. proposed a scheme to encrypt moving targets in HEVC [10]. This solution selectively encrypts the moving objects in the video content, selects the vertical data with a motion vector difference, and uses the AES algorithm for encryption. This solution only protects the moving objects in the video sequence and skips the static objects. If the moving objects in the video to be encrypted are not closely related in the time domain and the spatial domain, the encryption effect is greatly reduced. If the encrypted data are very small, such as only the sign bit of the motion vector difference or the sign of the transform coefficient, the encrypted data are vulnerable to brute force attacks. However, the solution performs well in terms of calculation cost, time consumption, format compatibility and bit increase, and it can be used for videos of different resolutions. Chen et al. proposed a HEVC-aware encryption scheme based on the RC4 algorithm [11]. This scheme constructs a key stream generation method based on RC4, which can adjust the ratio of "1" and "0" in the key stream. The four syntax elements of the sign of the motion vector difference, the magnitude of the motion vector difference, the sign of the luminance residual coefficient, and the sign of the chrominance residual coefficient are encrypted by the selected key stream. This solution has the advantages of large encryption space, low calculation cost, no increase in bit rate, and format compatibility. However, when the encryption ratio is not high, the video encryption effect is not good. Long et al. proposed a separable and reversible data hiding and encryption scheme for HEVC [12]. In the encoding stage, the RC4 key stream is used to encrypt the symbols of the motion vector difference and the remaining coefficients, and hide the data in the nonzero AC remaining coefficients. The encryption scheme has good perceived security and sufficient encryption space, which can effectively resist brute force attacks on video content. While ensuring that the video content is protected, data embedding can also be completed, and format compatibility can be ensured. However, it is necessary to complete data encryption and embedding, and the calculation cost is moderate. Yang et al. proposed an efficient format-compatible encryption scheme [13]. This solution selects the most important syntax elements in video reconstruction for encryption, and ensures that the encrypted bit stream is compatible with the HEVC standard. The suffix of the absolute value of the motion vector difference, the remaining coefficients, the motion vector difference, and the suffix of the absolute value of the difference between the coding unit quantization parameter and the predicted value in the prediction unit are encrypted using AES. The encryption scheme does not need to modify the structure of the HEVC standard decoder, and can ensure format compatibility after encryption. However, there is a trade-off between security and computational complexity. When security is the primary consideration, the computational cost increases accordingly. Zhang et al. proposed a selective encryption scheme based on hyperchaotic Lorenz system for HEVC [14]. First, the hyperchaotic Lorenz system is discretized, and the generated chaotic state value is converted into a chaotic pseudo-random sequence for encryption. The experimental results show that the encrypted video is highly disturbed and the video information cannot be identified. The analysis of the objective index results shows that the scheme is both efficient and safe. But it also has the disadvantage of high computational complexity, which is not conducive to video data with the characteristics of large data volume and strong real-time performance. The paper will propose a one-dimensional chaotic system, and will focus on solving the problems that exist when high-dimensional chaotic systems are applied to encryption. In the choice of syntax elements to be encrypted, reference [14] is selected as the comparison algorithm.

    Chaotic systems can produce complex nonlinear behaviors in both time and space domains. Spatiotemporal chaos is a kind of nonlinear dynamic system with chaotic characteristics in both dimensions of time and space. CMLs are a classic spatiotemporal chaotic system. CML has more complex dynamic characteristics and a larger key space, so they are widely used in the construction of cryptographic systems [15,16,17]. The definition of CML under discrete time n can be described as Eq (1):

    xn+1(i)=(1ε)f[xn(i)]+ε2{f[xn(i1)]+f[xn(i+1)]} (1)

    A typical feature of chaotic systems is that they have a positive Lyapunov value, and the calculation equation of Lyapunov is defined as:

    λ=limn1nn1i=0ln|f(xi)| (2)

    where ε is coupled constant, i is the lattice position, and f(x) is the dynamic chaotic function. The CML diffusion process is the adjacent coupled process produced by the same map equation, so it is also called self-coupled. Wang proposed in [6] that the maximum Lyapunov exponent of the coupled map lattice model represented by Eq (1) is determined by f(x).

    Han et al. proposed an iterative chaotic map with infinite collapses (ICMIC) [18]. Equation (3) is the function of ICMIC, and the value range of a is a(0,).

    xn+1=f(xn)=sin(axn) (3)

    Compared with the existing chaotic maps that fold infinitely in a limited space, ICMIC has good chaotic characteristics, which are manifested in stronger sensitivity to the initial value of the iteration and a larger Lyapunov exponent value. Therefore, after combining with a logistic map, a new one-dimensional chaotic system L-ICMIC (Logistic-ICMIC) is proposed. The equation is defined as Eq (4), and the value range of a is also a(0,), where the initial value x00,aπxnxn2kπ2xn12±142ak(k=1,2,3...). The scope of the chaotic map is (0,1].

    xn+1=f(xn)=sin2(aπxnxn2) (4)

    The following analyzes the performance indicators of the L-ICMIC chaotic map, mainly analyzing and comparing its chaotic performance from the bifurcation graph, ergodicity, and Lyapunov exponent.

    (1) The bifurcation diagram of the chaotic map can intuitively reflect the bifurcation of the period-doubling of the chaotic map, indicating the change in the characteristics of the chaotic system when the system parameters change.

    It can be clearly seen in Figure 1. that L-ICMIC enters a completely chaotic state earlier than ICMIC, and the corresponding control parameters a have a larger value range when the system is in a chaotic state. This means that the key space when L-ICMIC is utilized as an encryption algorithm is larger than that of ICMIC.

    Figure 1.  Bifurcation of ICMIC and L-ICMIC chaotic dynamical systems.

    (2) The ergodicity of the chaotic map describes the distribution of state values in the phase space of the system. When the stronger ergodicity of a chaotic map is utilized for encryption, the stronger the violent anti-attack capability, and encryption, the better the performance.

    Figure 2 shows the distribution of state values of ICMIC and L-LCMIC chaotic maps as a function of control parameter a. When the L-ICMIC chaotic map state value occupies the entire phase space, the control parameter has a larger value range. It also confirms the change in bifurcation. Therefore, when both L-ICMIC and ICMIC meet the ergodicity requirements, L-ICMIC has a larger parameter value range.

    Figure 2.  Ergodicity of ICMIC and L-ICMIC chaotic dynamical systems.

    (3) The definition and expression of the Lyapunov exponent were given earlier, and the Lyapunov exponent is an important indicator to measure whether a dynamic system is a chaotic system. The higher the value of the Lyapunov exponent is, the better the degree of chaos of the dynamic system.

    Figure 3 shows that compared to ICMIC, L-ICMIC has a wide continuous range of chaotic parameters and stable dynamic characteristics. It is a robust nonlinear dynamic system that meets the requirements of cryptographic security properties.

    Figure 3.  Lyapunov exponent of ICMIC and L-ICMIC chaotic dynamical systems.

    It can be seen in [5,6,7,8,9] that CML has better chaotic characteristics. Now the proposed L-ICMIC is applied to the CML model to obtain a chaotic system with better performance in various aspects, and a pseudorandom sequence is generated for encryption. Next is the analysis of the new model system. Wang proposed in [6] that the largest Lyapunov exponent of the model has nothing to do with the size L and coupling strength ε of the model. The L-ICMIC-CML equation set after the introduction of CML can be expressed as Eq (5):

    {xn+1=(1ε)f[xn(i)]+ε2{f[xn(i1)+f[xn(i+1)]}f(xn)=xn+1=sin2(aπxnxn2) (5)

    n represents the time after discretization, i represents the lattice space coordinates, f(x) is the local chaotic map L-ICMIC, ε is the coupling strength; L is the number of lattices.

    The following analyzes the performance indicators of the L-ICMIC-CML chaotic system, mainly comparing its chaotic performance from the bifurcation diagram, Lyapunov exponent, dynamic characteristics of the system model, and Kolmogorov-Sinai entropy density analysis.

    (1) For M-dimensional spatiotemporal chaotic systems, the Lyapunov exponent can be defined by calculating the Jacobian matrix of the coupled lattice. The Jacobian matrix of spatiotemporal chaos is defined as Eq (6):

    J=[xn+1(1)x(1) xn+1(1)x(2)...xn+1(1)x(M)xn+1(2)x(1) xn+1(2)x(2)...xn+1(2)x(M)xn+1(M)x(1) xn+1(M)x(2)...xn+1(M)x(M)] (6)

    Substitute a set of chaotic state values xi(i=0,1,2n) into Eq (6) and perform the product operation to obtain RM:

    RM=J(x0)J(x1)J(xn) (7)

    By calculating the M eigenvalues of the matrix RM, the M Lyapunov exponents of the spatiotemporal chaotic system are obtained:

    λi=limN1Nlog|r(i)N| i=1,2M (8)

    Figure 4 shows the bifurcation and Lyapunov exponent of the L-ICMIC-CML system. After using the coupled map lattice, compared to the one-dimensional chaotic system L-ICMIC, the value of a has a larger range, which indicates that the system can enter the chaotic state faster.

    Figure 4.  Bifurcation and Lyapunov exponent of L-ICMIC-CML system.

    (2) The spatiotemporal chaos model will show different states depending on the setting of the number of lattices, coupling parameters and other factors. When the CML system enters a fully developed chaotic state, the entire phase space orbit of the CML will be completely covered by the chaotic state. It can be seen from Figure 5 that the L-ICMIC-CML system is completely chaotic in time and space.

    Figure 5.  The chaotic state of L-ICMIC-CML system.

    (3) Kolmogorov-Sinai entropy is used to describe the rate of increase of the amount of information in a dynamic system over time. The higher the entropy value, the better its nonlinearity and randomness. For M-dimensional spatiotemporal chaotic systems, the Kolmogorov-Sinai entropy value is proportional to the system size M. In order to eliminate the influence of the number of spatial lattices on the entropy value and make the test results have general meaning, the Kolmogorov-Sinai entropy density is used to measure the degree of chaos, it can be expressed as Eq (9):

    {DKS=Li=1λ+(i)LDL=Li=1L+(i)L (9)

    DKS represents the average chaotic performance of the overall system, and DL represents the proportion of the number of lattices in the chaotic state to the total lattice, which represents the chaotic behavior within different lattices. Li=1λ+(i) represents the sum of positive Lyapunov in all L lattices, DKS>0 represents the system is in a chaotic state, and Li=1L+(i) represents the total number of lattices in a chaotic state.

    It can be clearly seen from the left side of Figure 6 that the L-ICMIC-CML system is in a chaotic state in the entire parameter space range. From the right side of Figure 6 it can be seen that all lattices of the L-ICMIC-CML are in a chaotic state.

    Figure 6.  The Kolmogorov-Sinai entropy density of L-ICMIC-CML.

    Therefore, the proposed system has stable chaotic characteristics and can be utilized to generate pseudorandom key streams. The steps of the binary stream cipher generator based on L-ICMIC-CML are as follows:

    Step 1: Choose the 256-bit initial key S and divide it into 32 groups, each with 8 bits.

    S=(S1,S2,S3,S32) (10)

    Step 2: Use S as the initial value of each lattice and enter it into the L-ICMIC-CML system. Removing the first 100 iterations of the output can effectively avoid the degradation of chaotic performance caused by transients and perform the following operations ψ on the P generated by each lattice.

    ψ:Pn(i)=pn(i)×108floor[pn(i)×108] (11)

    n represents the number of iterations (n101), i represents the position of the lattice, and the floor function represents the rounding down operation.

    Step 3: Pn(i) is a real number in the interval (0, 1), which is operated on ϑ to form a byte integer Kn(i).

    ϑ:Kn(i)=floor[Pn(i)×1013]mod28 (12)

    Step 4: After performing operation ν on the results generated by each lattice, combine them to generate the final pseudorandom sequence k.

    ν:k=Kn(1)mod2Kn(2)mod2Kn(32)mod2 (13)

    In this way, a binary key stream k is generated from the hyperchaotic Lorenz system.

    The most secure encryption method is to directly encrypt the binary data of the video file using a cryptographic algorithm. However, this complete encryption algorithm destroys the syntax and semantic format of the video, making the encrypted video file unable to be played, and destroys the real-time attributes of the video, so this encryption algorithm has a narrow application range. Selective encryption is an improvement to complete encryption. The purpose of protecting video content is achieved by encrypting some key syntax elements, and a video encryption method that combines the encryption process with video compression coding.

    In the process of HEVC encoding, context-based adaptive binary arithmetic coding (CABAC) is an entropy coding method for most syntax elements, and entropy coding is utilized for lossless data compression. As shown in Figure 7, in the CABAC encoding process, both binarization and context modeling will constantly update the context model, which is not conducive to encryption. Therefore, the syntax elements of the bypass mode are selected for encryption during the binary arithmetic encoding process. In addition to the conditions for entropy coding through the bypass mode, the conditions that should be met are binarized syntax elements through fixed-length coding or k-order Exp-Golomb coding [19]. Satisfying the above conditions can ensure the compatibility of the code stream and the constant compression rate in HEVC. Therefore, the syntax element of encryption is selected as follows: MVD sign and value, DCT transform coefficient sign and suffix, QP sign and suffix. Next, the pseudorandom cipher stream generated in the previous section is used to encrypt these syntax elements, and the specific encryption scheme and flowchart are shown in Eq (3) and Figure 8.

    ep_MVDHorSign=MVDHorSignki (14)
    ep_MVDVerSign=MVDVerSignki (15)
    ep_MVDsuffix=MVDsuffixki (16)
    ep_CoeffSign=CoeffSignki (17)
    ep_CoeffSuffix=CoeffSuffixki (18)
    ep_DeltaQP=DeltaQPki (19)
    ep_QPDeltaSuffix=QPDeltaSuffixki (20)
    Figure 7.  The block diagram of CABAC.
    Figure 8.  Encryption scheme flow diagram.

    Where ep represents the encrypted syntax element and k represents the chaotic pseudorandom key stream.

    Experiments were performed by laptop computer with an Intel (R) Core (TM) i7-9750H CPU @ 2.60 GHz, 16 GB memory, Windows 10, Microsoft Visual Studio 2017, MATLAB 2017b. The reference software model HM 16.20 is implemented for the proposed scheme. The profile used in HM 16.20 is encoder_lowdelay_main, and group of pictures (GOP) is 4. QP is set to 22. Table 1 shows 5 video sequences with different resolutions selected in this experiment. These video test sequences reflect video attributes such as resolution, quantization parameters, motion, color, texture, contrast, foreground and background transformations, and can cover most of the video features. Another scheme that utilizes a hyperchaotic system to generate a key stream is given for comparison [22]. Except for the generation of pseudorandom key streams, the syntax elements of selective encryption are the same.

    Table 1.  Video test sequence.
    Test sequence Resolution Frame rate
    PeopleOnStreet 2560ⅹ1600 60
    BQTerrace 1920ⅹ1080 50
    FourPeople 1280ⅹ720 60
    ChinaSpeed 832ⅹ480 30
    RaceHorses 416ⅹ240 30

     | Show Table
    DownLoad: CSV

    In this part, the NIST SP800-22 test standard is utilized to test the randomness of the generated pseudorandom sequence. The test item produces Pvalue, which represents the probability that, given a nonrandom evaluation test, the sequence generated by a perfect random number generator is less random than the sequence being tested. If Pvalue > 0.01, then the sequence under test is considered to be uniformly distributed. SP800-22 Revla suggests that the length of the bit sequence to be tested is 103 to 107, and this algorithm utilizes the test sequence with a length of 106 bits. Table 2 shows the test results. In Table 2, we can conclude that the cipher generated by the L-ICMIC-CML is random.

    Table 2.  SP800-22 Revla test result of cipher.
    Method P-value Result
    The Frequency Test 0.8842 Pass
    Frequency Test within a Block 0.7984 Pass
    The Runs Test 0.6874 Pass
    Tests for the Longest-Run-of-Ones in a Block 0.2269 Pass
    The Binary Matrix Rank Test 0.1731 Pass
    The Discrete Fourier Transform Test 0.8011 Pass
    The Non-overlapping Template Matching Test 0.4687 Pass
    The Overlapping Template Matching Test 0.5523 Pass
    Maurer's "Universal Statistical" Test 0.6812 Pass
    The Linear Complexity Test 0.5947 Pass
    The Serial Test 0.7298 Pass
    The Approximate Entropy Test 0.1695 Pass
    The Cumulative Sums Test 0.6321 Pass
    The Random Excursions Test
    x = −4 0.3574 Pass
    x = −3 0.7045 Pass
    x = −2 0.3708 Pass
    x = −1 0.8654 Pass
    x = 1 0.4967 Pass
    x = 2 0.8953 Pass
    x = 3 0.6701 Pass
    x = 4 0.9567 Pass
    The Random Excursions Variant Test
    x = −9 0.6983 Pass
    x = −8 0.2087 Pass
    x = −7 0.7762 Pass
    x = −6 0.8539 Pass
    x = −5 0.9064 Pass
    x = −4 0.8871 Pass
    x = −3 0.6007 Pass
    x = −2 0.4235 Pass
    x = −1 0.5748 Pass
    x = 1 0.9335 Pass
    x = 2 0.6446 Pass
    x = 3 0.3754 Pass
    x = 4 0.3328 Pass
    x = 5 0.2649 Pass
    x = 6 0.3687 Pass
    x = 7 0.4773 Pass
    x = 8 0.4510 Pass
    x = 9 0.3308 Pass

     | Show Table
    DownLoad: CSV

    The peak signal-to-noise ratio (PSNR) [20] and structural similarity index metric (SSIM) [21] are reference image quality evaluation indexes that are utilized to analyze the image quality of the video before and after encryption from an objective perspective. Table 4-6 lists the average PSNR values of the first 100 frames of the eight test video sequences.

    Table 3.  PSNR for original and encrypted videos sequences.
    Sequence PSNR (dB)
    Original Hyperchaotic system L-ICMIC-CML system
    PeopleOnStreet 42.31 13.95 13.23
    BQTerrace 40.57 12.81 11.42
    FourPeople 42.43 14.55 12.49
    BasketballDrillText 40.69 9.09 10.23
    RaceHorses 39.94 11.91 11.54

     | Show Table
    DownLoad: CSV
    Table 4.  SSIM for original and encrypted videos sequences.
    Sequence SSIM
    Original Hyperchaotic system L-ICMIC-CML system
    PeopleOnStreet 0.944 0.4636 0.3824
    BQTerrace 0.973 0.5430 0.5056
    FourPeople 0.965 0.6263 0.5741
    BasketballDrillText 0.921 0.2710 0.3029
    RaceHorses 0.958 0.2355 0.1986

     | Show Table
    DownLoad: CSV
    Table 5.  Encoding time and video data size of original video and encrypted video.
    Sequence Encoding time(s) Video data size(byte)
    Original Encrypted Original Encrypted
    PeopleOnStreet 9488.33 9578.47 15089138 15203211
    BQTerrace 5172.34 5217.33 10367701 10414977
    FourPeople 1297.69 1317.15 492159 495801
    ChinaSpeed 1929.41 1883.10 2213147 2227377
    RaceHorses 325.74 331.60 618658 624615

     | Show Table
    DownLoad: CSV
    Table 6.  The EDR of encrypted sequences.
    Sequence Original Encrypted
    PeopleOnStreet 0.189 0.947
    BQTerrace 0.148 0.922
    FourPeople 0.137 0.934
    ChinaSpeed 0.163 0.911
    RaceHorses 0.144 0.933

     | Show Table
    DownLoad: CSV

    It can be seen from Tables 3 and 4 that the PSNR and SSIM values of the encrypted images have significantly decreased, and L-ICMIC-CML is more advantageous than hyperchaotic system.

    The key space is the value range of the seed key, and it is another important factor that determines the security of the password. The key space must be large enough to resist brute force attacks. It is generally believed that the key space must be at least greater than 2128. The length of the algorithm seed key proposed in this paper is 256 bits, indicating that the key space can reach at least 2256, which fully meets the conditions of resistance to brute force cracking.

    Through the previous analysis of PSNR and SSIM, the image quality of video frames decreases significantly after encryption. Figures 913 reflect the effect of subjective visual disturbance. The left side of each figure is the original video frame, the middle is the encrypted video frame of hyperchaotic system [14], and the right side is the encrypted video frame of the proposed scheme. It can be clearly seen in the comparison figure that the encrypted video frames have a significant subjective disturbance effect and are almost unrecognizable. The visual disturbance effect of the proposed scheme is better than that of the hyperchaotic system.

    Figure 9.  Encrypted frame of PeopleOnStreet.
    Figure 10.  Encrypted frame of BQTerrace.
    Figure 11.  Encrypted frame of FourPeople.
    Figure 12.  Encrypted frame of ChinaSpeed.
    Figure 13.  Encrypted frame of RaceHorses.

    The selective encryption algorithm must strictly control the encryption speed, and cannot cause a significant increase in video encoding time. Additionally, the encryption operation cannot affect the original video compression performance, resulting in a significant increase in bit rate. Table 5 shows the encoding time and video file size of 5 video sequences.

    From the data in Table 5, it can be concluded that the video compression encoding time of the selective encryption algorithm has no significant change compared with the unencrypted encoding time. The encoding time of videos with strong motion attributes is only slightly increased, and the encoding time of videos with more complex textures is slightly reduced after the encryption operation. This is caused by the encryption operation that flattens the complex textures. The size of the video file does not change greatly before and after encryption. The video with strong motion attributes has a large motion vector difference. The encryption process changes the original motion compensation mode, which makes the encrypted file slightly larger. In summary, the selective encryption algorithm based on L-ICMIC-CML has no negative impact on the video encoding time and compression efficiency.

    The key sensitivity in video encryption refers to using a value close to the correct key to decrypt the video file. If the wrong key is extremely similar to the correct key, valuable video plaintext information cannot be recovered. The video encryption algorithm has high key sensitivity, otherwise the key sensitivity is not strong, and the security is low. In Figure14, the RaceHorses video sequence is taken as an example, and the original image is on the left. Keeping the initial key S unchanged, the video image decrypted by it is shown in the middle, and the wrong decryption key is modified by 1 bit, and the corresponding decrypted video image is shown on the right. Obviously, it can be seen that although only a very slight modification of the key has been made, the video image decrypted by the wrong key is still completely confused and unrecognizable.

    Figure 14.  Test of key sensitivity for RaceHorses.

    The edge is the boundary of the region where the gray level changes sharply in the image. Therefore, the edge detection first converts the color image to the gray image, and then detects the edge information in the image according to a certain detection algorithm, and finds the coordinates where the gray value changes sharply. Is the edge of the image. The edge detection attack is to perform gray-scale processing on the ciphertext image of the video, and then detect the residual edge information in it, and draw the edge detection map. If the video encryption effect is not good, some edge information will be detected in the ciphertext, thereby revealing the contour and texture characteristics of the plaintext. In order to analyze the video encryption algorithm's resistance to edge detection attacks from a quantitative perspective, this paper uses Sobel operator to perform edge detection on the image. The edge difference ratio (EDR) is calculated to measure the ability to resist edge detection attacks. The calculation method of EDR is shown in Eq (21).

    EDR=Nm,n=1|P(m,n)¯P(m,n)|Nm,n=1|P(m,n)+¯P(m,n)| (21)

    where P(m,n) is the edge pixel value of the original video frame and ¯P(m,n) is the edge pixel value of the encrypted video frame. The closer the EDR is to 1, the stronger the encryption of the algorithm on the edge structure is, and the closer the EDR is to 0, the more similar the edge structure of the two images is. Table 6 shows the EDR of 5 video sequences, all of which are above 0.9. This means that the algorithm can resist edge detection attack well. In addition, Figure 15 shows the edge detection images before and after encryption of the football video.

    Figure 15.  Edge detection of BQTerrace.

    This paper proposes a new chaotic system L-ICMIC-CML based on coupled map lattice. The chaotic dynamic characteristics of the system are analyzed in terms of Lyapunov exponent, bifurcation and ergodicity, and the results show that all indicators are significantly better than traditional chaotic systems. The obtained pseudo-random chaotic sequence perfectly passed the key sensitivity test, key space analysis, linear complexity test, differential attack test, periodic analysis, correlation analysis, spatial distribution test and other security and randomness evaluations, the test results It shows that the binary sequence generated by this method has the characteristics of security, stability, and high efficiency, and is suitable for use as a stream cipher, thereby solving the security and efficiency problems of constructing a stream cipher with a low-dimensional nonlinear system. Through the analysis of the HEVC coding structure, a more suitable encryption scheme is proposed to perform encryption operations on the syntax elements of MVD sign and value, DCT transform coefficient sign and suffix, QP sign and suffix. The test results show that the selective video encryption algorithm solves the problems of security, real-time and bit rate retention while maintaining the video format. Chaos theory research has been carried out for many years, and there have been relatively mature systems and results. However, the research of chaotic cipher basically draws on classical cipher theory and numerical simulation technology, and there is no complete chaotic cipher theory system. Therefore, the construction of chaotic cryptanalysis theory is worthy of further study.

    This work was supported by the National Natural Science Foundation of China under Grant No. 61672531. And the authors would like to acknowledge the Department of Information Security for providing assistance.

    The authors declare that they have no conflicts of interest.


    Acknowledgments



    This work was supported by the National Natural Science Foundation of China (No. 32100020 and 32370188), the Guangdong Basic and Applied Basic Research Foundation (No. 2022A1515010194 and 2023A1515012775) and the Guangzhou Basic and Applied Basic Research Foundation (No. 202201010613)

    Conflict of interest



    The authors declare no conflict of interest.

    Author contributions



    Z. X. conceptualized the review topic, and S. C., W. W. and Y. W. performed the literature search. S. C. drafted the manuscript, and Z. X. and H. C. revised the manuscript. All authors read and approved the final manuscript.

    [1] Chandrasegaran S, Carroll D (2016) Origins of programmable nucleases for genome engineering. J Mol Biol 428: 963-989. https://doi.org/10.1016/j.jmb.2015.10.014
    [2] Fagerlund RD, Staals RHJ, Fineran PC (2015) The Cpf1 CRISPR-Cas protein expands genome-editing tools. Genome Biol 16: 251. https://doi.org/10.1186/s13059-015-0824-9
    [3] Sternberg SH, Doudna JA (2015) Expanding the biologist's toolkit with CRISPR-Cas9. Mol Cell 58: 568-574. https://doi.org/10.1016/j.molcel.2015.02.032
    [4] Barrangou R, Doudna JA (2016) Applications of CRISPR technologies in research and beyond. Nat Biotechnol 34: 933-941. https://doi.org/10.1038/nbt.3659
    [5] Zheng Y, Li J, Wang B, et al. (2020) Endogenous type I CRISPR-Cas: From foreign DNA defense to prokaryotic engineering. Front Bioeng Biotechnol 8: 62. https://doi.org/10.3389/fbioe.2020.00062
    [6] Marraffini LA, Sontheimer EJ (2008) CRISPR interference limits horizontal gene transfer in Staphylococci by targeting DNA. Science 322: 1843-1845. https://doi:10.1126/science.1165771
    [7] Barrangou R, Fremaux C, Deveau H, et al. (2007) CRISPR provides acquired resistance against viruses in prokaryotes. Science 315: 1709-1712. https://doi:10.1126/science.1138140
    [8] Nussenzweig PM, Marraffini LA (2020) Molecular mechanisms of CRISPR-Cas immunity in bacteria. Annu Rev Genet 54: 93-120. https://doi.org/10.1146/annurev-genet-022120-112523
    [9] Amitai G, Sorek R (2016) CRISPR-Cas adaptation: insights into the mechanism of action. Nat Rev Microbiol 14: 67-76. https://doi.org/10.1038/nrmicro.2015.14
    [10] Carte J, Wang R, Li H, et al. (2008) Cas6 is an endoribonuclease that generates guide RNAs for invader defense in prokaryotes. Genes Dev 22: 3489-3496. https://doi.org/10.1101/gad.1742908
    [11] Deltcheva E, Chylinski K, Sharma CM, et al. (2011) CRISPR RNA maturation by trans-encoded small RNA and host factor RNase III. Nature 471: 602-607. https://doi:10.1038/nature09886
    [12] Jore MM, Lundgren M, van Duijn E, et al. (2011) Structural basis for CRISPR RNA-guided DNA recognition by Cascade. Nat Struct Mol Bio 18: 529-536. https://doi.org/10.1038/nsmb.2019
    [13] Leenay RT, Beisel CL (2017) Deciphering, communicating, and engineering the CRISPR PAM. J Mol Biol 429: 177-191. https://doi.org/10.1016/j.jmb.2016.11.024
    [14] van der Oost J, Jore MM, Westra ER, et al. (2009) CRISPR-based adaptive and heritable immunity in prokaryotes. Trends Biochem Sci 34: 401-407. https://doi.org/10.1016/j.tibs.2009.05.002
    [15] Gasiunas G, Barrangou R, Horvath P, et al. (2012) Cas9-crRNA ribonucleoprotein complex mediates specific DNA cleavage for adaptive immunity in bacteria. Proc Natl Acad Sci U S A 109: E2579-E2586. https://doi.org/10.1073/pnas.1208507109
    [16] Westra ER, van Erp PBG, Künne T, et al. (2012) CRISPR immunity relies on the consecutive binding and degradation of negatively supercoiled invader dna by Cascade and Cas3. Mol Cell 46: 595-605. https://doi.org/10.1016/j.molcel.2012.03.018
    [17] Makarova KS, Wolf YI, Iranzo J, et al. (2020) Evolutionary classification of CRISPR-Cas systems: a burst of class 2 and derived variants. Nat Rev Microbiol 18: 67-83. https://doi.org/10.1038/s41579-019-0299-x
    [18] Makarova KS, Aravind L, Wolf YI, et al. (2011) Unification of Cas protein families and a simple scenario for the origin and evolution of CRISPR-Cas systems. Biol Direct 6: 38. https://doi.org/10.1186/1745-6150-6-38
    [19] Makarova KS, Wolf YI, Alkhnbashi OS, et al. (2015) An updated evolutionary classification of CRISPR-Cas systems. Nat Rev Microbiol 13: 722-736. https://doi.org/10.1038/nrmicro3569
    [20] Makarova KS, Wolf YI, Koonin EV (2018) Classification and nomenclature of CRISPR-Cas systems: Where from here?. CRISPR J 1: 325-336. https://doi.org/10.1089/crispr.2018.0033
    [21] Koonin EV, Makarova KS, Zhang F (2017) Diversity, classification and evolution of CRISPR-Cas systems. Curr Opin Microbiol 37: 67-78. https://doi.org/10.1016/j.mib.2017.05.008
    [22] Liu Z, Dong H, Cui Y, et al. (2020) Application of different types of CRISPR/Cas-based systems in bacteria. Microb Cell Factories 19: 172. https://doi.org/10.1186/s12934-020-01431-z
    [23] Wang Y, Huang C, Zhao W (2022) Recent advances of the biological and biomedical applications of CRISPR/Cas systems. Mol Biol Rep 49: 7087-7100. https://doi.org/10.1007/s11033-022-07519-6
    [24] Mustafa MI, Makhawi AM (2021) SHERLOCK and DETECTR: CRISPR-Cas Systems as potential rapid diagnostic tools for emerging infectious diseases. J Clin Microbiol 59: e00745-00720. https://doi.org/10.1128/jcm.00745-20
    [25] Hidalgo-Cantabrana C, Barrangou R (2020) Characterization and applications of Type I CRISPR-Cas systems. Biochem Soc Trans 48: 15-23. https://doi.org/10.1042/BST20190119
    [26] Huo Y, Nam KH, Ding F, et al. (2014) Structures of CRISPR Cas3 offer mechanistic insights into Cascade-activated DNA unwinding and degradation. Nat Struct Mol Biol 21: 771-777. https://doi.org/10.1038/nsmb.2875
    [27] Brouns SJJ, Jore MM, Lundgren M, et al. (2008) Small CRISPR RNAs guide antiviral defense in prokaryotes. Science 321: 960-964. https://doi:10.1126/science.1159689
    [28] Sinkunas T, Gasiunas G, Fremaux C, et al. (2011) Cas3 is a single-stranded DNA nuclease and ATP-dependent helicase in the CRISPR/Cas immune system. EMBO J 30: 1335-1342. https://doi.org/10.1038/emboj.2011.41
    [29] Bhatia S, Pooja, Yadav SK (2023) CRISPR-Cas for genome editing: Classification, mechanism, designing and applications. Int J Biol Macromol 238: 124054. https://doi.org/10.1016/j.ijbiomac.2023.124054
    [30] Li H (2015) Structural principles of CRISPR RNA processing. Structure 23: 13-20. https://doi.org/10.1016/j.str.2014.09.006
    [31] Wang R, Preamplume G, Terns MP, et al. (2011) Interaction of the Cas6 Riboendonuclease with CRISPR RNAs: recognition and cleavage. Structure 19: 257-264. https://doi.org/10.1016/j.str.2010.11.014
    [32] Xiao Y, Luo M, Dolan AE, et al. (2018) Structure basis for RNA-guided DNA degradation by Cascade and Cas3. Science 361: eaat0839. https://doi:10.1126/science.aat0839
    [33] Xiao Y, Luo M, Hayes RP, et al. (2017) Structure basis for directional r-loop formation and substrate handover mechanisms in type I CRISPR-Cas system. Cell 170: 48-60.e11. https://doi.org/10.1016/j.cell.2017.06.012
    [34] Semenova E, Jore MM, Datsenko KA, et al. (2011) Interference by clustered regularly interspaced short palindromic repeat (CRISPR) RNA is governed by a seed sequence. Proc Natl Acad Sci U.S.A 108: 10098-10103. https://doi.org/10.1073/pnas.1104144108
    [35] Almendros C, Nobrega FL, McKenzie RE, et al. (2019) Cas4-Cas1 fusions drive efficient PAM selection and control CRISPR adaptation. Nucleic Acids Res 47: 5223-5230. https://doi.org/10.1093/nar/gkz217
    [36] Shangguan Q, Graham S, Sundaramoorthy R, et al. (2022) Structure and mechanism of the type I-G CRISPR effector. Nucleic Acids Res 50: 11214-11228. https://doi.org/10.1093/nar/gkac925
    [37] Peters JE, Makarova KS, Shmakov S, et al. (2017) Recruitment of CRISPR-Cas systems by Tn7-like transposons. Proc Natl Acad Sci U.S.A 114: E7358-E7366. https://doi.org/10.1073/pnas.1709035114
    [38] Faure G, Shmakov SA, Yan WX, et al. (2019) CRISPR-Cas in mobile genetic elements: counter-defence and beyond. Nat Rev Microbiol 17: 513-525. https://doi.org/10.1038/s41579-019-0204-7
    [39] Hsieh SC, Peters JE (2023) Discovery and characterization of novel type I-D CRISPR-guided transposons identified among diverse Tn7-like elements in cyanobacteria. Nucleic Acids Res 51: 765-782. https://doi.org/10.1093/nar/gkac1216
    [40] Li Y, Peng N (2019) Endogenous CRISPR-Cas system-based genome editing and antimicrobials: review and prospects. Front Microbiol 10: 2471. https://doi.org/10.3389/fmicb.2019.02471
    [41] Cameron P, Coons MM, Klompe SE, et al. (2019) Harnessing type I CRISPR-Cas systems for genome engineering in human cells. Nat Biotechnol 37: 1471-1477. https://doi.org/10.1038/s41587-019-0310-0
    [42] Osakabe K, Wada N, Miyaji T, et al. (2020) Genome editing in plants using CRISPR type I-D nuclease. Commun Biol 3: 648. https://doi.org/10.1038/s42003-020-01366-6
    [43] Tan R, Krueger RK, Gramelspacher MJ, et al. (2022) Cas11 enables genome engineering in human cells with compact CRISPR-Cas3 systems. Mol Cell 82: 852-867. https://doi.org/10.1016/j.molcel.2021.12.032
    [44] Yoshimi K, Mashimo T (2022) Genome editing technology and applications with the type I CRISPR system. Gene and Genome Editing 3-4: 100013. https://doi.org/10.1016/j.ggedit.2022.100013
    [45] Osakabe K, Wada N, Murakami E, et al. (2021) Genome editing in mammalian cells using the CRISPR type I-D nuclease. Nucleic Acids Res 49: 6347-6363. https://doi.org/10.1093/nar/gkab348
    [46] Xu Z, Li Y, Li M, et al. (2021) Harnessing the type I CRISPR-Cas systems for genome editing in prokaryotes. Environ Microbiol 23: 542-558. https://doi.org/10.1111/1462-2920.15116
    [47] Hidalgo-Cantabrana C, Goh YJ, Barrangou, R (2019) Characterization and repurposing of type I and Type II CRISPR-Cas systems in bacteria. J Mol Biol 431: 21-33. https://doi.org/10.1016/j.jmb.2018.09.013
    [48] Hidalgo-Cantabrana C, Crawley AB, Sanchez B, et al. (2017) Characterization and exploitation of CRISPR Loci in Bifidobacterium longum. Front Microbiol 8: 1851. https://doi.org/10.3389/fmicb.2017.01851
    [49] Hidalgo-Cantabrana C, Goh YJ, Pan M, et al. (2019) Genome editing using the endogenous type I CRISPR-Cas system in Lactobacillus crispatus. Proc Natl Acad Sci U S A 116: 15774-15783. https://doi.org/10.1073/pnas.1905421116
    [50] Xu Z, Li Y, Yan A (2020) Repurposing the native type I-F CRISPR-Cas system in Pseudomonas aeruginosa for genome editing. STAR Protocols 1: 100039. https://doi.org/10.1016/j.xpro.2020.100039
    [51] Li Y, Pan S, Zhang Y, et al. (2016) Harnessing type I and type III CRISPR-Cas systems for genome editing. Nucleic Acids Res 44: e34. https://doi.org/10.1093/nar/gkv1044
    [52] Atmadjaja AN, Holby V, Harding AJ, et al. (2019) CRISPR-Cas, a highly effective tool for genome editing in Clostridium saccharoperbutylacetonicum N1-4(HMT). FEMS Microbiol Lett 366: fnz059. https://doi.org/10.1093/femsle/fnz059
    [53] Baker PL, Orf GS, Kevershan K, et al. (2019) Using the endogenous CRISPR-Cas system of Heliobacterium modesticaldum to delete the photochemical reaction center core subunit gene. Appl Environ Microbiol 85: e01644-01619. https://doi.org/10.1128/AEM.01644-19
    [54] Papoutsakis ET (2008) Engineering solventogenic clostridia. Curr Opin Biotechnol 19: 420-429. https://doi.org/10.1016/j.copbio.2008.08.003
    [55] McAllister KN, Sorg JA (2019) CRISPR Genome editing systems in the genus Clostridium: a timely advancement. J Bacteriol 201: e00219-00219. https://doi.org/10.1128/jb.00219-19
    [56] Pyne ME, Bruder MR, Moo-Young M, et al. (2016) Harnessing heterologous and endogenous CRISPR-Cas machineries for efficient markerless genome editing in Clostridium. Sci Rep 6: 25666. https://doi.org/10.1038/srep25666
    [57] Johnson DT, Taconi KA (2007) The glycerin glut: Options for the value-added conversion of crude glycerol resulting from biodiesel production. Environmental Progress 26: 338-348. https://doi.org/10.1002/ep.10225
    [58] Tian L, Conway PM, Cervenka ND, et al. (2019) Metabolic engineering of Clostridium thermocellum for n-butanol production from cellulose. Biotechnol Biofuels 12: 186. https://doi.org/10.1186/s13068-019-1524-6
    [59] Oka K, Osaki T, Hanawa T, et al. (2018) Establishment of an endogenous Clostridium difficile rat infection model and evaluation of the effects of Clostridium butyricum MIYAIRI 588 probiotic strain. Front Microbiol 9: 1264. https://doi.org/10.3389/fmicb.2018.01264
    [60] Hagihara M, Yamashita R, Matsumoto A, et al. (2019) The impact of probiotic Clostridium butyricum MIYAIRI 588 on murine gut metabolic alterations. J Infect Chemother 25: 571-577. https://doi.org/10.1016/j.jiac.2019.02.008
    [61] Walker JE, Lanahan AA, Zheng T, et al. (2020) Development of both type I-B and type II CRISPR/Cas genome editing systems in the cellulolytic bacterium Clostridium thermocellum. Metab Eng Commun 10: e00116. https://doi.org/10.1016/j.mec.2019.e00116
    [62] Zhou X, Wang X, Luo H, et al. (2021) Exploiting heterologous and endogenous CRISPR-Cas systems for genome editing in the probiotic Clostridium butyricum. Biotechnol Bioeng 118: 2448-2459. https://doi.org/10.1002/bit.27753
    [63] Zhang J, Zong W, Hong W, et al. (2018) Exploiting endogenous CRISPR-Cas system for multiplex genome editing in Clostridium tyrobutyricum and engineer the strain for high-level butanol production. Metab Eng 47: 49-59. https://doi.org/10.1016/j.ymben.2018.03.007
    [64] Maikova A, Kreis V, Boutserin A, et al. (2019) Using an endogenous CRISPR-Cas System for genome editing in the human pathogen Clostridium difficile. Appl Environ Microbiol 85: e01416-01419. https://doi.org/10.1128/AEM.01416-19
    [65] Dai K, Fu H, Guo X, et al. (2022) Exploiting the Type I-B CRISPR genome editing system in Thermoanaerobacterium aotearoense SCUT27 and engineering the strain for enhanced ethanol production. Appl Environ Microbiol 88: e00751-00722. https://doi.org/10.1128/aem.00751-22
    [66] Du K, Gong L, Li M, et al. (2022) Reprogramming the endogenous type I CRISPR-Cas system for simultaneous gene regulation and editing in Haloarcula hispanica. mLife 1: 40-50. https://doi.org/10.1002/mlf2.12010
    [67] Cheng F, Gong L, Zhao D, et al. (2017) Harnessing the native type I-B CRISPR-Cas for genome editing in a polyploid archaeon. J Genet Genomics 44: 541-548. https://doi.org/10.1016/j.jgg.2017.09.010
    [68] Joshi JB, Arul L, Ramalingam J, et al. (2020) Advances in the Xoo-rice pathosystem interaction and its exploitation in disease management. J Biosci 45: 112. https://doi.org/10.1007/s12038–020-00085-8
    [69] Liu Q, Wang S, Long J, et al. (2021) Functional identification of the Xanthomonas oryzae pv. oryzae Type I-C CRISPR-Cas system and its potential in gene editing application. Front Microbiol 12: 686715. https://doi.org/10.3389/fmicb.2021.686715
    [70] Jiang D, Zhang D, Li S, et al. (2022) Highly efficient genome editing in Xanthomonas oryzae pv. oryzae through repurposing the endogenous type I-C CRISPR-Cas system. Mol Plant Pathol 23: 583-594. https://doi.org/10.1111/mpp.13178
    [71] Makarova KS, Wolf YI, Koonin EV (2013) The basic building blocks and evolution of CRISPR-Cas systems. Biochem Soc Trans 41: 1392-1400. https://doi.org/10.1042/BST20130038
    [72] McBride TM, Cameron SC, Fineran PC, et al. (2023) The biology and type I/III hybrid nature of type I-D CRISPR-Cas systems. Biochem J 480: 471-488. https://doi.org/10.1042/BCJ20220073
    [73] Manav MC, Van LB, Lin J, et al. (2020) Structural basis for inhibition of an archaeal CRISPR-Cas type I-D large subunit by an anti-CRISPR protein. Nat Commun 11: 5993. https://doi.org/10.1038/s41467-020-19847-x
    [74] Bost J, Recalde A, Waßmer B, et al. (2023) Application of the endogenous CRISPR-Cas type I-D system for genetic engineering in the thermoacidophilic archaeon Sulfolobus acidocaldarius. Front Microbiol 14. https://doi.org/10.3389/fmicb.2023.1254891
    [75] Wei S, Morrison M, Yu Z (2013) Bacterial census of poultry intestinal microbiome. Poult Sci 92: 671-683. https://doi.org/10.3382/ps.2012-02822
    [76] Ravel J, Gajer P, Abdo Z, et al. (2011) Vaginal microbiome of reproductive-age women. Proc Natl Acad Sci U S A 108: 4680-4687. https://doi.org/10.1073/pnas.1002611107
    [77] Vercoe RB, Chang JT, Dy RL, et al. (2013) Cytotoxic chromosomal targeting by CRISPR/Cas systems can reshape bacterial genomes and expel or remodel pathogenicity islands. PLoS Genet 9: e1003454. https://doi.org/10.1371/journal.pgen.1003454
    [78] Hampton HG, McNeil MB, Paterson TJ, et al. (2016) CRISPR-Cas gene-editing reveals RsmA and RsmC act through FlhDC to repress the SdhE flavinylation factor and control motility and prodigiosin production in Serratia. Microbiology 162: 1047-1058. https://doi.org/10.1099/mic.0.000283
    [79] Xu Z, Li M, Li Y, et al. (2019) Native CRISPR-Cas-Mediated genome editing enables dissecting and sensitizing clinical multidrug-resistant P. aeruginosa. Cell Rep 29: 1707-1717.e1703. https://doi.org/10.1016/j.celrep.2019.10.006
    [80] Zheng Y, Han J, Wang B, et al. (2019) Characterization and repurposing of the endogenous Type I-F CRISPR-Cas system of Zymomonas mobilis for genome engineering. Nucleic Acids Res 47: 11461-11475. https://doi.org/10.1093/nar/gkz940
    [81] Hao Y, Wang Q, Li J, et al. (2022) Double nicking by RNA-directed Cascade-nCas3 for high-efficiency large-scale genome engineering. Open Biol 12: 210241. https://doi.org/10.1098/rsob.210241
    [82] Pan M, Morovic W, Hidalgo-Cantabrana C, et al. (2022) Genomic and epigenetic landscapes drive CRISPR-based genome editing in Bifidobacterium. Proc Natl Acad Sci U S A 119: e2205068119. https://doi.org/10.1073/pnas.2205068119
    [83] Marino ND, Zhang JY, Borges AL, et al. (2018) Discovery of widespread type I and type V CRISPR-Cas inhibitors. Science 362: 240-242. https://doi: 10.1126/science.aau5174
    [84] Csörgő B, León LM, Chau-Ly IJ, et al. (2020) A compact Cascade-Cas3 system for targeted genome engineering. Nat Methods 17: 1183-1190. https://doi.org/10.1038/s41592-020-00980-w
    [85] Xu Z, Li Y, Cao H, et al. (2021) A transferrable and integrative type I-F Cascade for heterologous genome editing and transcription modulation. Nucleic Acids Res 49: e94. https://doi.org/10.1093/nar/gkab521
    [86] Klompe SE, Vo PLH, Halpin-Healy TS, et al. (2019) Transposon-encoded CRISPR–Cas systems direct RNA-guided DNA integration. Nature 571: 219-225. https://doi.org/10.1038/s41586-019-1323-z
    [87] Halpin-Healy TS, Klompe SE, Sternberg SH, et al. (2020) Structural basis of DNA targeting by a transposon-encoded CRISPR-Cas system. Nature 577: 271-274. https://doi.org/10.1038/s41586-019-1849-0
    [88] Vo PLH, Ronda C, Klompe SE, et al. (2021) CRISPR RNA-guided integrases for high-efficiency, multiplexed bacterial genome engineering. Nat Biotechnol 39: 480-489. https://doi.org/10.1038/s41587-020-00745-y
    [89] Roberts A, Nethery MA, Barrangou R (2022) Functional characterization of diverse type I-F CRISPR-associated transposons. Nucleic Acids Res 50: 11670-11681. https://doi.org/10.1093/nar/gkac985
    [90] Rubin BE, Diamond S, Cress BF, et al. (2022) Species- and site-specific genome editing in complex bacterial communities. Nat Microbiol 7: 34-47. https://doi.org/10.1038/s41564-021-01014-7
    [91] Shangguan Q, White MF (2023) Repurposing the atypical type I-G CRISPR system for bacterial genome engineering. Microbiology 169. https://doi.org/10.1099/mic.0.001373
    [92] Qi LS, Larson MH, Gilbert LA, et al. (2013) Repurposing CRISPR as an rna-guided platform for sequence-specific control of gene expression. Cell 152: 1173-1183. https://doi.org/10.1016/j.cell.2013.02.022
    [93] Bikard D, Jiang W, Samai P, et al. (2013) Programmable repression and activation of bacterial gene expression using an engineered CRISPR-Cas system. Nucleic Acids Res 41: 7429-7437. https://doi.org/10.1093/nar/gkt520
    [94] Wang J, Teng Y, Zhang R, et al. (2021) Engineering a PAM-flexible SpdCas9 variant as a universal gene repressor. Nat Commun 12: 6916. https://doi.org/10.1038/s41467-021-27290-9
    [95] Luo ML, Mullis AS, Leenay RT, et al. (2015) Repurposing endogenous type I CRISPR-Cas systems for programmable gene repression. Nucleic Acids Res 43: 674-681. https://doi.org/10.1093/nar/gku971
    [96] Rath D, Amlinger L, Hoekzema M, et al. (2015) Efficient programmable gene silencing by Cascade. Nucleic Acids Res 43: 237-246. https://doi.org/10.1093/nar/gku1257
    [97] Chang Y, Su T, Qi Q, et al. (2016) Easy regulation of metabolic flux in Escherichia coli using an endogenous type I-E CRISPR-Cas system. Microb Cell Factories 15: 195. https://doi.org/10.1186/s12934-016-0594-4
    [98] Tarasava K, Liu R, Garst A, et al. (2018) Combinatorial pathway engineering using type I-E CRISPR interference. Biotechnol Bioeng 115: 1878-1883. https://doi.org/10.1002/bit.26589
    [99] Qin Z, Yang Y, Yu S, et al. (2021) Repurposing the endogenous type I-E CRISPR/Cas system for gene repression in Gluconobacter oxydans WSH-003. ACS Synth Biol 10: 84-93. https://pubs.acs.org/doi/10.1021/acssynbio.0c00456
    [100] Stachler AE, Schwarz TS, Schreiber S, et al. (2020) CRISPRi as an efficient tool for gene repression in archaea. Methods 172: 76-85. https://doi.org/10.1016/j.ymeth.2019.05.023
    [101] Maier LK, Stachler AE, Saunders SJ, et al. (2015) An active immune defense with a minimal crispr (clustered regularly interspaced short palindromic repeats) RNA and without the Cas6 protein. J Biol Chem 290: 4192-4201. https://doi.org/10.1074/jbc.M114.617506
    [102] Stachler AE, Marchfelder A (2016) Gene repression in haloarchaea using the CRISPR (clustered regularly interspaced short palindromic repeats)-Cas I-B system. J Biol Chem 291: 15226-15242. https://doi.org/10.1074/jbc.M116.724062
    [103] Chen Y, Cheng M, Song H, et al. (2022) Type I-F CRISPR-PAIR platform for multi-mode regulation to boost extracellular electron transfer in Shewanella oneidensis. iScience 25. https://doi:10.1016/j.isci.2022.104491
    [104] Marino ND, Pinilla-Redondo R, Csörgő B, et al. (2020) Anti-CRISPR protein applications: natural brakes for CRISPR-Cas technologies. Nat Methods 17: 471-479. https://doi.org/10.1038/s41592-020-0771-6
    [105] Davidson AR, Lu WT, Stanley SY, et al. (2020) Anti-CRISPRs: Protein inhibitors of CRISPR-Cas systems. Annu Rev Biochem 89: 309-332. https://doi.org/10.1146/annurev-biochem-011420-111224
    [106] Pawluk A, Shah M, Mejdani M, et al. (2017) Disabling a Type I-E CRISPR-Cas nuclease with a bacteriophage-encoded anti-crispr protein. mBio 8: 01751-01717. https://doi.org/10.1128/mbio.01751-18
    [107] Ren J, Wang H, Yang L, et al. (2022) Structural and mechanistic insights into the inhibition of type I-F CRISPR-Cas system by anti-CRISPR protein AcrIF23. J Biol Chem 298. https://doi.org/10.1016/j.jbc.2022.102124
    [108] Rollins MF, Chowdhury S, Carter J, et al. (2019) Structure reveals a mechanism of crispr-rna-guided nuclease recruitment and anti-crispr viral mimicry. Mol Cell 74: 132-142. https://doi.org/10.1016/j.molcel.2019.02.001
    [109] Chen S, Cao H, Xu Z, et al. (2023) A type I-F CRISPRi system unveils the novel role of CzcR in modulating multidrug resistance of Pseudomonas aeruginosa. Microbiol Spectr 11: e0112323. https://doi.org/10.1128/spectrum.01123-23
    [110] Li M, Gong L, Cheng F, et al. (2021) Toxin-antitoxin RNA pairs safeguard CRISPR-Cas systems. Science 372: eabe5601. https://doi:10.1126/science.abe5601
    [111] Cooper LA, Stringer AM, Wade JT (2018) Determining the specificity of cascade binding, interference, and primed adaptation in vivo in the Escherichia coli type I-E CRISPR-Cas system. mBio 9: 02100-02117. https://doi.org/10.1128/mbio.02100-18
  • This article has been cited by:

    1. Carles Barril, Àngel Calsina, Sílvia Cuadrado, Jordi Ripoll, On the basic reproduction number in continuously structured populations, 2021, 44, 0170-4214, 799, 10.1002/mma.6787
    2. Horst R. Thieme, Discrete-time dynamics of structured populations via Feller kernels, 2021, 0, 1553-524X, 0, 10.3934/dcdsb.2021082
    3. Horst R. Thieme, 2020, Chapter 4, 978-3-030-60106-5, 59, 10.1007/978-3-030-60107-2_4
    4. Suli Liu, Michael Y. Li, Epidemic models with discrete state structures, 2021, 01672789, 132903, 10.1016/j.physd.2021.132903
    5. Eugenia Franco, Mats Gyllenberg, Odo Diekmann, One Dimensional Reduction of a Renewal Equation for a Measure-Valued Function of Time Describing Population Dynamics, 2021, 175, 0167-8019, 10.1007/s10440-021-00440-3
    6. Horst R. Thieme, Discrete-time population dynamics of spatially distributed semelparous two-sex populations, 2021, 83, 0303-6812, 10.1007/s00285-021-01649-4
    7. Horst R. Thieme, 2023, Chapter 23, 978-3-031-25224-2, 495, 10.1007/978-3-031-25225-9_23
    8. Horst R. Thieme, Continuity of the spectral radius, applied to structured semelparous two-sex population models, 2024, 30, 1023-6198, 967, 10.1080/10236198.2023.2249129
    9. Christian Düll, Piotr Gwiazda, Anna Marciniak-Czochra, Jakub Skrzeczkowski, Structured population models on Polish spaces: A unified approach including graphs, Riemannian manifolds and measure spaces to describe dynamics of heterogeneous populations, 2024, 34, 0218-2025, 109, 10.1142/S0218202524400037
    10. Eugenia Franco, Odo Diekmann, Mats Gyllenberg, Modelling physiologically structured populations: renewal equations and partial differential equations, 2023, 23, 1424-3199, 10.1007/s00028-023-00880-4
    11. B. Boldin, O. Diekmann, J. A. J. Metz, Population growth in discrete time: a renewal equation oriented survey, 2024, 30, 1023-6198, 1062, 10.1080/10236198.2023.2265499
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(3147) PDF downloads(159) Cited by(5)

Figures and Tables

Figures(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog