Results 71 to 80 of about 14,204 (271)
Image-based jpeg steganography [PDF]
ABSTRACT This paper deals with the steganographic algorithm LSB (modification of the Least Significant Bits) in JPEG images. The focus is on minimizing of the number of modified DCT coefficients using (2k − 1, 2k − k − 1) Hamming codes. Experimental part of the paper examines the dependencies between the coding, efficiency and saturation.
Matúš Jókay, Tomáš Moravćík
openaire +1 more source
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
High-capacity image steganography algorithm combining image encryption and deep learning
Aiming at the problem that the residual image of cover image and carrier image in the high-capacity image steganography scheme based on deep learning will expose the secret image, a high-capacity image steganography scheme combining image encryption and ...
Xiaoyuan YANG +3 more
doaj +2 more sources
A Secret-Key Image Steganography Technique using Random Chain Codes
With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission.
Mohammed Abbas Fadhil Al-Husainy +1 more
doaj +1 more source
PARP inhibitors are used to treat a small subset of prostate cancer patients. These studies reveal that PARP1 activity and expression are different between European American and African American prostate cancer tissue samples. Additionally, different PARP inhibitors cause unique and overlapping transcriptional changes, notably, p53 pathway upregulation.
Moriah L. Cunningham +21 more
wiley +1 more source
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan +9 more
wiley +1 more source
Abstract: The internet's expansion and technological advancements have facilitated rapid access to multimedia information, yet they have also heightened concerns regarding privacy and security. This has led researchers to explore digital image steganography as a means of securely storing sensitive data within images.
Mrs. Bharti Sahu +4 more
openaire +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Transparent authentication methodology in electronic education
In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for ...
Argles, David +3 more
core
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira +14 more
wiley +1 more source

