Results 121 to 130 of about 53,608 (389)
Detecting fingerprints of audio steganography software
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong+5 more
doaj
Multi-Image Steganography Using Deep Neural Networks [PDF]
Steganography is the science of hiding a secret message within an ordinary public message. Over the years, steganography has been used to encode a lower resolution image into a higher resolution image by simple methods like LSB manipulation. We aim to utilize deep neural networks for the encoding and decoding of multiple secret images inside a single ...
arxiv
The enzyme 5‐lipoxygenase (5‐LOX) catalyzes the first step in the biosynthesis of leukotrienes (LTs) involved in inflammatory pathophysiology. After cellular stimulation, 5‐LOX translocates to the nucleus, interacting with the 5‐LOX‐activating protein (FLAP) to form LTA4 from arachidonic acid (AA).
Erik Romp+5 more
wiley +1 more source
Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains [PDF]
Steganography is one of the methods used for secret communication. Steganography attempts to hide the existence of the information. The object used to hide the secret information is called as cover object. Images are the most popular cover objects used for steganography.
arxiv
Review and Test of Steganography Techniques [PDF]
Steganography is the art of concealing a secret message within an appropriate-multimedia carrier such as images, audio, video files, and even network packets. Steganographic techniques have been used since ancient times to hide the message from third-parties deemed to be enemies. On one hand, Steganography is a useful technique that has been applied in
arxiv
Brucella NyxA and NyxB dimerization enhances effector function during infection
Brucella abortus thrives inside cells thanks to the translocation of effector proteins that fine‐tune cellular functions. NyxA and NyxB are two effectors that destabilize the nucleolar localization of their host target, SENP3. We show that the Nyx proteins directly interact with each other and that their dimerization is essential for their function ...
Lison Cancade‐Veyre+4 more
wiley +1 more source
A Novel LSB Steganography Technique Using Image Segmentation [PDF]
Steganography is a process to hide data inside a cover file mostly used in media files like image, video, and audio files. Least significant bit (LSB) steganography is a technique where the least significant bits of pixels are used for information hiding.
Yasir Yakup Demircan, Serhat Ozekes
doaj +3 more sources
Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks [PDF]
In recent years, due to the powerful abilities to deal with highly complex tasks, the artificial neural networks (ANNs) have been studied in the hope of achieving human-like performance in many applications. Since the ANNs have the ability to approximate complex functions from observations, it is straightforward to consider the ANNs for steganography ...
arxiv
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques.
Krzysztof Szczypiorski+1 more
openaire +3 more sources
Dimeric pyruvate formate‐lyase cleaves pyruvate using a radical‐based mechanism. G734 serves as a radical storage location, and the radical is transferred to the catalytic C419 residue. Mutation of the C418‐C419 pair causes loss of enzyme activity, but does not impede radical introduction onto G734. Therefore, cis‐ but not trans‐radical transfer occurs
Michelle Kammel+2 more
wiley +1 more source