Results 71 to 80 of about 24,642,685 (320)
RNA profiling of circulating extracellular vesicles (EVs) from blood samples of men undergoing prostate biopsy identifies transcripts associated with clinically significant prostate cancer. Integrative analysis with public tumor datasets links EV‐derived gene signatures to tumor stage and progression‐free survival, highlighting CASP3, XRCC2, and RIT1 ...
Stefan Werner +14 more
wiley +1 more source
Survey on Data Hiding Based on Block Truncation Coding
Data hiding technology has achieved many technological developments through continuous research over the past 20 years along with the development of Internet technology and is one of the research fields that are still receiving attention.
Cheonshik Kim +3 more
doaj +1 more source
Steganalytic Methods for the Detection of Histogram Shifting Data Hiding Schemes [PDF]
Peer-reviewedIn this paper, several steganalytic techniques designed to detect the existence of hidden messages using histogram shifting schemes are presented.
Lerch Hostalot, Daniel +1 more
core
Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries
This work introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly.
Kristensen, Mads Ruben Burgdorff +1 more
core +1 more source
Dormant cancer cells can hide in distant organs for years, evading treatment and the immune system. This review highlights how signals from the surrounding tissue and immune environment keep these cells inactive or trigger their reawakening. Understanding these mechanisms may help develop therapies to eliminate or control dormant cells and prevent ...
Kanishka Tiwary +1 more
wiley +1 more source
The rapid growth of Information and communication technology not only has positive impacts but also unveils opportunities for data and information security threats.
Aulia Arham, Hanung Adi Nugroho
doaj +1 more source
Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding
This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data.
Shi, Yun-Qing +2 more
core +1 more source
An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling [PDF]
This work proposes an improved reversible data hiding scheme in encrypted images using parametric binary tree labeling(IPBTL-RDHEI), which takes advantage of the spatial correlation in the entire original image but not in small image blocks to reserve ...
Youqing Wu +4 more
semanticscholar +1 more source
Radiotherapy (RT) response depends on the DNA repair capacity of tumor and host cells. We show that circulating tumor cell (CTC) counts and apoptosis rates before and after RT predict treatment response and outcome, which can be accessed via easily accessible liquid biopsy approaches. Created in BioRender. Wikman, H.
Yvonne Goy +10 more
wiley +1 more source
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression [PDF]
Reversible data hiding in encrypted images (RDHEI) receives growing attention because it protects the content of the original image while the embedded data can be accurately extracted and the original image can be reconstructed losslessly.
Z. Yin, Yinyin Peng, Youzhi Xiang
semanticscholar +1 more source

