Results 61 to 70 of about 14,292 (271)

Digital Image Steganography

open access: yes, 2017
Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network.
Chitra A. Dhawale, Naveen D. Jambhekar
openaire   +1 more source

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

Steganography in NFT images

open access: yes网络与信息安全学报, 2022
The images with non-fungible token (NFT) are employed as the digital artistic works in metaverse for creation, transaction, sharing, and collection.Being different from natural images, the content of NFT images is defined by user and distributed in the digital space widely.It is convenient for the hidden of secret data.In this case, covert ...
Zichi WANG, Guorui FENG,Xinpeng ZHANG
openaire   +3 more sources

Recent Advances of Image Steganography With Generative Adversarial Networks

open access: yesIEEE Access, 2020
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu   +6 more
doaj   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms

open access: yesIEEE Access, 2019
In stenography, embedding data within an image has a trade-off between image quality and embedding capacity. Specifically, the more data are concealed within a carrier image, the further distortion the image suffers, causing a decline in the resultant ...
Ranyiah Wazirali   +3 more
doaj   +1 more source

Quality Factor terhadap Kapasitas Pesan Rahasia pada Steganografi Citra JPEG dan Kualitas Citra Stego

open access: yesJurnal Sistem Informasi, 2020
One of the container media that is available and popular is the Joint Photographic Experts Group (JPEG) format image. This article aims to determine the effect of Quality Factor on the secret message capacity of JPEG image steganography and stego image ...
Dian Hafidh Zulfikar
doaj   +1 more source

Steganographer Identification

open access: yes, 2019
Conventional steganalysis detects the presence of steganography within single objects. In the real-world, we may face a complex scenario that one or some of multiple users called actors are guilty of using steganography, which is typically defined as the
Breunig   +46 more
core   +1 more source

Image-based jpeg steganography [PDF]

open access: yesTatra Mountains Mathematical Publications, 2010
ABSTRACT This paper deals with the steganographic algorithm LSB (modification of the Least Significant Bits) in JPEG images. The focus is on minimizing of the number of modified DCT coefficients using (2k − 1, 2k − k − 1) Hamming codes. Experimental part of the paper examines the dependencies between the coding, efficiency and saturation.
Matúš Jókay, Tomáš Moravćík
openaire   +1 more source

Home - About - Disclaimer - Privacy