Results 151 to 160 of about 53,608 (389)

An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)

open access: yesJISR on Computing
Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and ...
Kisakye Diana Michelle   +2 more
doaj   +1 more source

Circulating tumor DNA (ctDNA) trajectories predict survival in trifluridine/tipiracil‐treated metastatic colorectal cancer patients

open access: yesMolecular Oncology, EarlyView.
The authors applied joint/mixed models that predict mortality of trifluridine/tipiracil‐treated metastatic colorectal cancer patients based on circulating tumor DNA (ctDNA) trajectories. Patients at high risk of death could be spared aggressive therapy with the prospect of a higher quality of life in their remaining lifetime, whereas patients with a ...
Matthias Unseld   +7 more
wiley   +1 more source

Steganographically Encoded Data [PDF]

open access: yesInformatică economică, 2007
Steganography is the art of hiding information in ways that prevent its detection. Though steganography is an ancient craft, the onset of computer technology has given it new life.
doaj  

Crosstalk between gut microbiota and tumor: tumors could cause gut dysbiosis and metabolic imbalance

open access: yesMolecular Oncology, EarlyView.
In this research, we analyzed the relationship between gut microbiota and tumor. We discovered that both subcutaneous and metastatic tumors would alter the composition and metabolic function of gut microbiota. Meanwhile, fecal microbiota transplantation also indicated the anti‐tumor role of the gut microbiota, revealing the crosstalk between tumor and ...
Siyuan Zhang   +8 more
wiley   +1 more source

BPCS steganography using EZW lossy compressed images [PDF]

open access: green, 2002
Jeremiah Spaulding   +3 more
openalex   +1 more source

Obesity alters the fitness of peritumoral adipose tissue, exacerbating tumor invasiveness in renal cancer through the induction of ADAM12 and CYP1B1

open access: yesMolecular Oncology, EarlyView.
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad   +13 more
wiley   +1 more source

Significance of steganography on data security [PDF]

open access: green, 2004
VenkatramanS   +2 more
openalex   +1 more source

Addressing persistent challenges in digital image analysis of cancer tissue: resources developed from a hackathon

open access: yesMolecular Oncology, EarlyView.
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran   +16 more
wiley   +1 more source

Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

open access: yesEngineering Science and Technology, an International Journal, 2021
In all forms of confidential communication, the most significant element is security. Cryptography can be used to secure the information, but it discloses the presence of covert communication. Hence, steganography was invented; steganography is an art of
Pratik D. Shah, Rajankumar S. Bichkar
doaj  

Home - About - Disclaimer - Privacy