Results 101 to 110 of about 53,608 (389)

A cellular system to study responses to a collision between the transcription complex and a protein‐bound nick in the DNA template

open access: yesFEBS Letters, EarlyView.
We present the cellular transcription‐coupled Flp‐nick system allowing the introduction of a Top1‐mimicking cleavage complex (Flpcc) at a Flp recognition target site within a controllable LacZ gene. LacZ transcription leads to the collision of RNA polymerase II (RNAPII) with Flpcc, and this causes RNAPII stalling, ubiquitination, and degradation.
Petra Herring   +6 more
wiley   +1 more source

Steganograhy in Images by Using Intersecting Planes [PDF]

open access: yesEngineering and Technology Journal, 2011
Steganography is the art of hiding, and transmitting information using apparently innocent carrier without expose any suspicion. In this paper the proposed system is an implementation of image steganography techniques.
Esraa Jaffar Baker
doaj   +1 more source

Computationally secure steganography based on speech synthesis

open access: yes网络与信息安全学报, 2022
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography ...
Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
doaj   +1 more source

Ion channel function of polycystin‐2/polycystin‐1 heteromer revealed by structure‐guided mutagenesis

open access: yesFEBS Letters, EarlyView.
Mutations in polycystin‐1 (PC1) or polycystin‐2 (PC2) cause autosomal‐dominant polycystic kidney disease (ADPKD). We generated a novel gain‐of‐function PC2/PC1 heteromeric ion channel by mutating pore‐blocking residues. Moreover, we demonstrated that PC2 will preferentially assemble with PC1 to form heteromeric complexes when PC1 is co‐expressed ...
Tobias Staudner   +7 more
wiley   +1 more source

Principles and Perspectives of Steganography in Error Correction Codes

open access: yesБезопасность информационных технологий, 2014
The main preference of a steganography in ECC with other types of steganography are listed. Opportunity and relevance of strict mathematical researches for this type of steganography are explained. The goals of a steganography in ECC are listed.
Pavel Vladimirovich Slipenchuk
doaj  

A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264

open access: yesSensors, 2020
Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the research about mapping rules and distortion functions while ignoring the fact that ...
Mingyuan Cao, Lihua Tian, Chen Li
doaj   +1 more source

MoveSteg: A Method of Network Steganography Detection [PDF]

open access: yesarXiv, 2016
This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that
arxiv  

Neural Linguistic Steganography [PDF]

open access: yesProceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), 2019
Whereas traditional cryptography encrypts a secret message into an unintelligible form, steganography conceals that communication is taking place by encoding a secret message into a cover signal. Language is a particularly pragmatic cover signal due to its benign occurrence and independence from any one medium.
Zachary M. Ziegler   +2 more
openaire   +3 more sources

Decoding the dual role of autophagy in cancer through transcriptional and epigenetic regulation

open access: yesFEBS Letters, EarlyView.
Transcriptional and epigenetic regulation controls autophagy, which exerts context‐dependent effects on cancer: Autophagy suppresses tumorigenesis by maintaining cellular homeostasis or promotes tumor progression by supporting survival under stress. In this “In a Nutshell” article, we explore the intricate mechanisms of the dual function of autophagy ...
Young Suk Yu, Ik Soo Kim, Sung Hee Baek
wiley   +1 more source

COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS

open access: yesInformatika, 2016
Steganography is a method of hiding information in other information of different format (container). There are many steganography techniques with various types of container.
S. A. Seyyedi, R. Kh. Sadykhov
doaj  

Home - About - Disclaimer - Privacy