Results 51 to 60 of about 8,564 (282)

High-Capacity Image Steganography Based on Improved FC-DenseNet

open access: yesIEEE Access, 2020
Aiming at the problem that the traditional steganography based on carrier modification has the low steganographic capacity, a steganographic scheme based on Fully Convolutional Dense Connection Network (FC-DenseNet) is proposed.
Xintao Duan   +6 more
doaj   +1 more source

A Novel Steganography Method for Infrared Image Based on Smooth Wavelet Transform and Convolutional Neural Network

open access: yesSensors, 2023
Infrared images have been widely used in many research areas, such as target detection and scene monitoring. Therefore, the copyright protection of infrared images is very important.
Yu Bai   +4 more
doaj   +1 more source

An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots

open access: yesFEBS Letters, EarlyView.
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino   +7 more
wiley   +1 more source

Efficient Non-Linear Covert Channel Detection in TCP Data Streams

open access: yesIEEE Access, 2020
Cyber-attacks are causing losses amounted to billions of dollars every year due to data breaches and Vulnerabilities. The existing tools for data leakage prevention and detection are often bypassed by using various different types of sophisticated ...
Hanaa Nafea   +4 more
doaj   +1 more source

Unified Description for Network Information Hiding Methods

open access: yes, 2016
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech   +2 more
core   +2 more sources

Molecular bases of circadian magnesium rhythms across eukaryotes

open access: yesFEBS Letters, EarlyView.
Circadian rhythms in intracellular [Mg2+] exist across eukaryotic kingdoms. Central roles for Mg2+ in metabolism suggest that Mg2+ rhythms could regulate daily cellular energy and metabolism. In this Perspective paper, we propose that ancestral prokaryotic transport proteins could be responsible for mediating Mg2+ rhythms and posit a feedback model ...
Helen K. Feord, Gerben van Ooijen
wiley   +1 more source

Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection

open access: yesEntropy, 2022
The DICOM (Digital Imaging and COmmunication in Medicine) standard provides a framework for a diagnostically-accurate representation, processing, transfer, storage and display of medical imaging data.
Aleksandra Mileva   +4 more
doaj   +1 more source

Covert Channels in SIP for VoIP signalling

open access: yes, 2008
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson   +3 more
core   +1 more source

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

DNA Steganalysis Using Deep Recurrent Neural Networks

open access: yes, 2018
Recent advances in next-generation sequencing technologies have facilitated the use of deoxyribonucleic acid (DNA) as a novel covert channels in steganography.
Bae, Ho   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy