Results 61 to 70 of about 14,292 (271)
Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network.
Chitra A. Dhawale, Naveen D. Jambhekar
openaire +1 more source
Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang +8 more
wiley +1 more source
The images with non-fungible token (NFT) are employed as the digital artistic works in metaverse for creation, transaction, sharing, and collection.Being different from natural images, the content of NFT images is defined by user and distributed in the digital space widely.It is convenient for the hidden of secret data.In this case, covert ...
Zichi WANG, Guorui FENG,Xinpeng ZHANG
openaire +3 more sources
Recent Advances of Image Steganography With Generative Adversarial Networks
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu +6 more
doaj +1 more source
Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe +3 more
wiley +1 more source
Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf +6 more
wiley +1 more source
An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms
In stenography, embedding data within an image has a trade-off between image quality and embedding capacity. Specifically, the more data are concealed within a carrier image, the further distortion the image suffers, causing a decline in the resultant ...
Ranyiah Wazirali +3 more
doaj +1 more source
One of the container media that is available and popular is the Joint Photographic Experts Group (JPEG) format image. This article aims to determine the effect of Quality Factor on the secret message capacity of JPEG image steganography and stego image ...
Dian Hafidh Zulfikar
doaj +1 more source
Conventional steganalysis detects the presence of steganography within single objects. In the real-world, we may face a complex scenario that one or some of multiple users called actors are guilty of using steganography, which is typically defined as the
Breunig +46 more
core +1 more source
Image-based jpeg steganography [PDF]
ABSTRACT This paper deals with the steganographic algorithm LSB (modification of the Least Significant Bits) in JPEG images. The focus is on minimizing of the number of modified DCT coefficients using (2k − 1, 2k − k − 1) Hamming codes. Experimental part of the paper examines the dependencies between the coding, efficiency and saturation.
Matúš Jókay, Tomáš Moravćík
openaire +1 more source

