Results 41 to 50 of about 320,607 (275)

Hiding data in halftone image using modified data hiding error diffusion [PDF]

open access: yesSPIE Proceedings, 2000
With the ease of distribution of digital images, there is a growing concern for copyright control and authentication. While there are many existing watermarking and data hiding methods for natural images, almost none can be applied to halftone images. In this paper, we proposed a novel data hiding method, Modified Data Hiding Ordered Dithering (MDHED ...
Ming S. Fu, Oscar C. L. Au
openaire   +1 more source

Reduction of the Accompanying Noise when Hidding in an Audio File [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2008
The stereography which used to hide certain information using a host file is a science and an art. Such practice is usually done to keep away any thought in the presence of a hidden message in the host.
Radwan Al-Jawadi, Adel Issa
doaj   +1 more source

Data hiding by using AES Algorithm

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Data hiding is the art of hiding data for various purposes such as; to maintain private data, secure confidential data and so on. Securely exchange the data over the internet network is very important issue. So, in order to transfer the data securely to
Prof. Dr.Rafidah Mohamad
doaj   +1 more source

Hiding Quantum Data

open access: yesFoundations of Physics, 2003
Recent work has shown how to use the laws of quantum mechanics to keep classical and quantum bits secret in a number of different circumstances. Among the examples are private quantum channels, quantum secret sharing and quantum data hiding. In this paper we show that a method for keeping two classical bits hidden in any such scenario can be used to ...
DiVincenzo, David P.   +2 more
openaire   +2 more sources

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Survey on Data Hiding Based on Block Truncation Coding

open access: yesApplied Sciences, 2021
Data hiding technology has achieved many technological developments through continuous research over the past 20 years along with the development of Internet technology and is one of the research fields that are still receiving attention.
Cheonshik Kim   +3 more
doaj   +1 more source

Overview of molecular signatures of senescence and associated resources: pros and cons

open access: yesFEBS Open Bio, EarlyView.
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas   +6 more
wiley   +1 more source

Improving random number generators by chaotic iterations. Application in data hiding

open access: yes, 2010
In this paper, a new pseudo-random number generator (PRNG) based on chaotic iterations is proposed. This method also combines the digits of two XORshifts PRNGs.
Bahi, Jacques M.   +2 more
core   +2 more sources

BMI‐1 modulation and trafficking during M phase in diffuse intrinsic pontine glioma

open access: yesFEBS Open Bio, EarlyView.
The schematic illustrates BMI‐1 phosphorylation during M phase, which triggers its translocation from the nucleus to the cytoplasm. In cycling cells, BMI‐1 functions within the PRC1 complex to mediate H2A K119 monoubiquitination. Following PTC596‐induced M phase arrest, phosphorylated BMI‐1 dissociates from PRC1 and is exported to the cytoplasm via its
Banlanjo Umaru   +6 more
wiley   +1 more source

A light‐triggered Time‐Resolved X‐ray Solution Scattering (TR‐XSS) workflow with application to protein conformational dynamics

open access: yesFEBS Open Bio, EarlyView.
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy