Results 101 to 110 of about 53,608 (389)
We present the cellular transcription‐coupled Flp‐nick system allowing the introduction of a Top1‐mimicking cleavage complex (Flpcc) at a Flp recognition target site within a controllable LacZ gene. LacZ transcription leads to the collision of RNA polymerase II (RNAPII) with Flpcc, and this causes RNAPII stalling, ubiquitination, and degradation.
Petra Herring+6 more
wiley +1 more source
Steganograhy in Images by Using Intersecting Planes [PDF]
Steganography is the art of hiding, and transmitting information using apparently innocent carrier without expose any suspicion. In this paper the proposed system is an implementation of image steganography techniques.
Esraa Jaffar Baker
doaj +1 more source
Computationally secure steganography based on speech synthesis
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography ...
Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
doaj +1 more source
Ion channel function of polycystin‐2/polycystin‐1 heteromer revealed by structure‐guided mutagenesis
Mutations in polycystin‐1 (PC1) or polycystin‐2 (PC2) cause autosomal‐dominant polycystic kidney disease (ADPKD). We generated a novel gain‐of‐function PC2/PC1 heteromeric ion channel by mutating pore‐blocking residues. Moreover, we demonstrated that PC2 will preferentially assemble with PC1 to form heteromeric complexes when PC1 is co‐expressed ...
Tobias Staudner+7 more
wiley +1 more source
Principles and Perspectives of Steganography in Error Correction Codes
The main preference of a steganography in ECC with other types of steganography are listed. Opportunity and relevance of strict mathematical researches for this type of steganography are explained. The goals of a steganography in ECC are listed.
Pavel Vladimirovich Slipenchuk
doaj
A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264
Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the research about mapping rules and distortion functions while ignoring the fact that ...
Mingyuan Cao, Lihua Tian, Chen Li
doaj +1 more source
MoveSteg: A Method of Network Steganography Detection [PDF]
This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that
arxiv
Neural Linguistic Steganography [PDF]
Whereas traditional cryptography encrypts a secret message into an unintelligible form, steganography conceals that communication is taking place by encoding a secret message into a cover signal. Language is a particularly pragmatic cover signal due to its benign occurrence and independence from any one medium.
Zachary M. Ziegler+2 more
openaire +3 more sources
Decoding the dual role of autophagy in cancer through transcriptional and epigenetic regulation
Transcriptional and epigenetic regulation controls autophagy, which exerts context‐dependent effects on cancer: Autophagy suppresses tumorigenesis by maintaining cellular homeostasis or promotes tumor progression by supporting survival under stress. In this “In a Nutshell” article, we explore the intricate mechanisms of the dual function of autophagy ...
Young Suk Yu, Ik Soo Kim, Sung Hee Baek
wiley +1 more source
COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS
Steganography is a method of hiding information in other information of different format (container). There are many steganography techniques with various types of container.
S. A. Seyyedi, R. Kh. Sadykhov
doaj