Results 61 to 70 of about 9,721,388 (323)

Efficient Quantum Information Hiding for Remote Medical Image Sharing

open access: yesIEEE Access, 2018
Information hiding aims to embed secret data into the multimedia, such as image, audio, video, and text. In this paper, two new quantum information hiding approaches are put forward.
A. A. Abd El-Latif   +5 more
semanticscholar   +1 more source

Anonymity and information hiding in multiagent systems [PDF]

open access: yes16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 2004
Replacement. 36 pages. Full version of CSFW '03 paper, submitted to JCS.
Joseph Y. Halpern, Kevin Ross O'Neill
openaire   +4 more sources

Improved information hiding algorithm based on twice positioning in coding channel

open access: yesTongxin xuebao, 2013
Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice ...
Li-quan CHEN   +3 more
doaj   +2 more sources

Information hiding using matroid theory

open access: yesAdvances in Applied Mathematics, 2021
Inspired by problems in Private Information Retrieval, we consider the setting where two users need to establish a communication protocol to transmit a secret without revealing it to external observers. This is a question of how large a linear code can be, when it is required to agree with a prescribed code on a collection of coordinate sets.
Kuznetsova, Olga, Freij-Hollanti, Ragnar
openaire   +5 more sources

The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum

open access: yesFEBS Letters, EarlyView.
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti   +3 more
wiley   +1 more source

Information Hiding Using Geographic Information System (GIS) Vector File [PDF]

open access: yesEngineering and Technology Journal, 2017
There are different techniques for securing data like cryptography and information hiding (steganography and watermarking) which has received more attention and faced many challenges.
R.F. Hassan, M.S. Mohammed
doaj   +1 more source

Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells

open access: yesMolecular Oncology, EarlyView.
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi   +3 more
wiley   +1 more source

CircCCNB1 inhibits vasculogenic mimicry by sequestering NF90 to promote miR‐15b‐5p and miR‐7‐1‐3p processing in nasopharyngeal carcinoma

open access: yesMolecular Oncology, EarlyView.
CircCCNB1 expression is down‐regulated in nasopharyngeal carcinoma (NPC); thus, less NF90 protein is bound to circCCNB1 and more binds to pri‐miRNAs, blocking their (pri‐miRNAs) binding to DGCR8 and inhibiting the processing and generation of miR‐15b‐5p/miR‐7‐1‐3p. Furthermore, decreased miR‐15b‐5p/miR‐7‐1‐3p promotes the expression of the target genes
Chunmei Fan   +6 more
wiley   +1 more source

Research on Influencing Factors of Knowledge Hiding Behavior in Socialized Q&A Communities: Taking Zhihu as an Example

open access: yesComplexity, 2022
With the normalization of epidemic prevention and control, the expression of the public’s demand for health information on online platforms continues to increase, while knowledge hiding behavior has seriously hindered the communication and dissemination ...
Wen-Zhu Li   +3 more
doaj   +1 more source

Genre-Based Information Hiding [PDF]

open access: yes, 2012
While data encryption is an effective means of keeping data private it does not conceal the presence of 'hidden' information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place
Ogilvie, Russell, Weir, George R.S.
openaire   +3 more sources

Home - About - Disclaimer - Privacy