Results 61 to 70 of about 14,204 (271)
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network.
Chitra A. Dhawale, Naveen D. Jambhekar
openaire +1 more source
The images with non-fungible token (NFT) are employed as the digital artistic works in metaverse for creation, transaction, sharing, and collection.Being different from natural images, the content of NFT images is defined by user and distributed in the digital space widely.It is convenient for the hidden of secret data.In this case, covert ...
Zichi WANG, Guorui FENG,Xinpeng ZHANG
openaire +3 more sources
Recent Advances of Image Steganography With Generative Adversarial Networks
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu +6 more
doaj +1 more source
This study reveals how the mitochondrial protein Slm35 is regulated in Saccharomyces cerevisiae. The authors identify stress‐responsive DNA elements and two upstream open reading frames (uORFs) in the 5′ untranslated region of SLM35. One uORF restricts translation, and its mutation increases Slm35 protein levels and mitophagy.
Hernán Romo‐Casanueva +5 more
wiley +1 more source
Conventional steganalysis detects the presence of steganography within single objects. In the real-world, we may face a complex scenario that one or some of multiple users called actors are guilty of using steganography, which is typically defined as the
Breunig +46 more
core +1 more source
In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka +11 more
wiley +1 more source
An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms
In stenography, embedding data within an image has a trade-off between image quality and embedding capacity. Specifically, the more data are concealed within a carrier image, the further distortion the image suffers, causing a decline in the resultant ...
Ranyiah Wazirali +3 more
doaj +1 more source
One of the container media that is available and popular is the Joint Photographic Experts Group (JPEG) format image. This article aims to determine the effect of Quality Factor on the secret message capacity of JPEG image steganography and stego image ...
Dian Hafidh Zulfikar
doaj +1 more source
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source

