Results 131 to 140 of about 53,608 (389)

A Survey on Crypto-Steganographic Schemes and A Use Case in Healthcare System

open access: yesJournal of Engineering Technology and Applied Physics, 2019
Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks.
Mei Ling Phang, Swee Huay Heng
doaj   +1 more source

Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography [PDF]

open access: yesarXiv, 2016
Steganography is the discipline that deals with concealing the existence of secret communications. Existing research already provided several fundamentals for defining steganography and presented a multitude of hiding methods and countermeasures for this research discipline.
arxiv  

A coiled‐coil domain triggers oligomerization of MmpL10, the mycobacterial transporter of trehalose polyphleate precursor

open access: yesFEBS Letters, EarlyView.
Most MmpLs transport lipids and glycolipids of the complex mycomembrane of mycobacteria. This study shows that MmpL10 from Mycobacterium smegmatis, the transporter of the trehalose polyphosphate precursor, harbors a coiled‐coil‐like extension. Biochemical and electron microscopy studies demonstrate that the coiled‐coil enables MmpL10 to trimerize.
Julie Couston   +7 more
wiley   +1 more source

PIXEL PATTERN BASED STEGANOGRAPHY ON IMAGES [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2015
One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography.
R. Rejani, D. Murugan, Deepu V. Krishnan
doaj  

Transparent authentication methodology in electronic education

open access: yes, 2014
In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for ...
Argles, David   +3 more
core  

Unlocking the potential of tumor‐derived DNA in urine for cancer detection: methodological challenges and opportunities

open access: yesMolecular Oncology, EarlyView.
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever   +1 more
wiley   +1 more source

Provably Secure Public-Key Steganography Based on Admissible Encoding [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, vol. 20, pp. 3161-3175, 2025
The technique of hiding secret messages within seemingly harmless covertext to evade examination by censors with rigorous security proofs is known as provably secure steganography (PSS). PSS evolves from symmetric key steganography to public-key steganography, functioning without the requirement of a pre-shared key and enabling the extension to multi ...
arxiv   +1 more source

Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren   +16 more
wiley   +1 more source

LSB Steganography using Dual Layer for Text Crypto-Stego [PDF]

open access: yesBIO Web of Conferences
Cryptography and Steganography are two main components of information security. Utilizing encryption and Steganography to establish many layers of protection is a commendable approach.
Abd Zaid Mustafa M.   +2 more
doaj   +1 more source

Steganography and Broadcasting

open access: yes, 2015
Informally, steganography is the process of exchanging a secret message between two communicating entities so that an eavesdropper may not know that a message has been sent. After a review of some steganographic systems, we found that these systems have some defects.
Tachago, Fabrice P.   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy