Results 61 to 70 of about 9,721,388 (323)
Efficient Quantum Information Hiding for Remote Medical Image Sharing
Information hiding aims to embed secret data into the multimedia, such as image, audio, video, and text. In this paper, two new quantum information hiding approaches are put forward.
A. A. Abd El-Latif+5 more
semanticscholar +1 more source
Anonymity and information hiding in multiagent systems [PDF]
Replacement. 36 pages. Full version of CSFW '03 paper, submitted to JCS.
Joseph Y. Halpern, Kevin Ross O'Neill
openaire +4 more sources
Improved information hiding algorithm based on twice positioning in coding channel
Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice ...
Li-quan CHEN+3 more
doaj +2 more sources
Information hiding using matroid theory
Inspired by problems in Private Information Retrieval, we consider the setting where two users need to establish a communication protocol to transmit a secret without revealing it to external observers. This is a question of how large a linear code can be, when it is required to agree with a prescribed code on a collection of coordinate sets.
Kuznetsova, Olga, Freij-Hollanti, Ragnar
openaire +5 more sources
The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti+3 more
wiley +1 more source
Information Hiding Using Geographic Information System (GIS) Vector File [PDF]
There are different techniques for securing data like cryptography and information hiding (steganography and watermarking) which has received more attention and faced many challenges.
R.F. Hassan, M.S. Mohammed
doaj +1 more source
Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi+3 more
wiley +1 more source
CircCCNB1 expression is down‐regulated in nasopharyngeal carcinoma (NPC); thus, less NF90 protein is bound to circCCNB1 and more binds to pri‐miRNAs, blocking their (pri‐miRNAs) binding to DGCR8 and inhibiting the processing and generation of miR‐15b‐5p/miR‐7‐1‐3p. Furthermore, decreased miR‐15b‐5p/miR‐7‐1‐3p promotes the expression of the target genes
Chunmei Fan+6 more
wiley +1 more source
With the normalization of epidemic prevention and control, the expression of the public’s demand for health information on online platforms continues to increase, while knowledge hiding behavior has seriously hindered the communication and dissemination ...
Wen-Zhu Li+3 more
doaj +1 more source
Genre-Based Information Hiding [PDF]
While data encryption is an effective means of keeping data private it does not conceal the presence of 'hidden' information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place
Ogilvie, Russell, Weir, George R.S.
openaire +3 more sources