Results 131 to 140 of about 53,608 (389)
A Survey on Crypto-Steganographic Schemes and A Use Case in Healthcare System
Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks.
Mei Ling Phang, Swee Huay Heng
doaj +1 more source
Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography [PDF]
Steganography is the discipline that deals with concealing the existence of secret communications. Existing research already provided several fundamentals for defining steganography and presented a multitude of hiding methods and countermeasures for this research discipline.
arxiv
Most MmpLs transport lipids and glycolipids of the complex mycomembrane of mycobacteria. This study shows that MmpL10 from Mycobacterium smegmatis, the transporter of the trehalose polyphosphate precursor, harbors a coiled‐coil‐like extension. Biochemical and electron microscopy studies demonstrate that the coiled‐coil enables MmpL10 to trimerize.
Julie Couston+7 more
wiley +1 more source
PIXEL PATTERN BASED STEGANOGRAPHY ON IMAGES [PDF]
One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography.
R. Rejani, D. Murugan, Deepu V. Krishnan
doaj
Transparent authentication methodology in electronic education
In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for ...
Argles, David+3 more
core
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever+1 more
wiley +1 more source
Provably Secure Public-Key Steganography Based on Admissible Encoding [PDF]
The technique of hiding secret messages within seemingly harmless covertext to evade examination by censors with rigorous security proofs is known as provably secure steganography (PSS). PSS evolves from symmetric key steganography to public-key steganography, functioning without the requirement of a pre-shared key and enabling the extension to multi ...
arxiv +1 more source
Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren+16 more
wiley +1 more source
LSB Steganography using Dual Layer for Text Crypto-Stego [PDF]
Cryptography and Steganography are two main components of information security. Utilizing encryption and Steganography to establish many layers of protection is a commendable approach.
Abd Zaid Mustafa M.+2 more
doaj +1 more source
Steganography and Broadcasting
Informally, steganography is the process of exchanging a secret message between two communicating entities so that an eavesdropper may not know that a message has been sent. After a review of some steganographic systems, we found that these systems have some defects.
Tachago, Fabrice P.+2 more
openaire +2 more sources