A novel and efficient digital image steganography technique using least significant bit substitution. [PDF]
Rahman S+8 more
europepmc +1 more source
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Key Cryptosystem [PDF]
Herman Kabetta
openalex +1 more source
Possible role of human ribonuclease dicer in the regulation of R loops
R loops play an important role in regulating key cellular processes such as replication, transcription, centromere stabilization, or control of telomere length. However, the unscheduled accumulation of R loops can cause many diseases, including cancer, and neurodegenerative or inflammatory disorders. Interestingly, accumulating data indicate a possible
Klaudia Wojcik+2 more
wiley +1 more source
A Model and Quantitative Framework for Evaluating Iterative Steganography. [PDF]
Pery M, Waszkowski R.
europepmc +1 more source
A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image. [PDF]
Rahman S+7 more
europepmc +1 more source
Advanced Steganography Algorithm using Encrypted secret message [PDF]
Joyshree Nath, Asoke Nath
openalex +1 more source
Comparative study of adenosine 3′‐pyrophosphokinase domains of MuF polymorphic toxins
With the ultimate goal of understanding the association of toxin‐immunity modules to temperate phages, we characterized toxins from three prophages and examined cross‐protection from immunity proteins. The toxins exhibit adenosine 3′‐pyrophosphokinase activity and are toxic in Escherichia coli.
Eloïse M. Paulet+6 more
wiley +1 more source
Separable reversible data hiding by vacating room after encryption using encrypted pixel difference. [PDF]
Venkatesh V+4 more
europepmc +1 more source
Author Correction: Upcycling fish scales through heating for steganography and Rhodamine B adsorption application. [PDF]
Sow MMG, Zhang Z, Sow CH, Lim SX.
europepmc +1 more source