Results 51 to 60 of about 14,780 (307)

Applications of Deep Learning in Image Steganography [PDF]

open access: yesAnnals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics
The current paper presents the concept of steganography, with a focus on image steganography. It outlines a few relevant techniques for image steganography. Provides implementation details and a comparative evaluation of design and results.
Adrian Doroiman
doaj   +1 more source

A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264

open access: yesSensors, 2020
Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the research about mapping rules and distortion functions while ignoring the fact that ...
Mingyuan Cao, Lihua Tian, Chen Li
doaj   +1 more source

Molecular bases of circadian magnesium rhythms across eukaryotes

open access: yesFEBS Letters, EarlyView.
Circadian rhythms in intracellular [Mg2+] exist across eukaryotic kingdoms. Central roles for Mg2+ in metabolism suggest that Mg2+ rhythms could regulate daily cellular energy and metabolism. In this Perspective paper, we propose that ancestral prokaryotic transport proteins could be responsible for mediating Mg2+ rhythms and posit a feedback model ...
Helen K. Feord, Gerben van Ooijen
wiley   +1 more source

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

Principles and Perspectives of Steganography in Error Correction Codes

open access: yesБезопасность информационных технологий, 2014
The main preference of a steganography in ECC with other types of steganography are listed. Opportunity and relevance of strict mathematical researches for this type of steganography are explained. The goals of a steganography in ECC are listed.
Pavel Vladimirovich Slipenchuk
doaj  

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS

open access: yesInformatika, 2016
Steganography is a method of hiding information in other information of different format (container). There are many steganography techniques with various types of container.
S. A. Seyyedi, R. Kh. Sadykhov
doaj  

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

A Novel LSB Steganography Technique Using Image Segmentation [PDF]

open access: yesJournal of Universal Computer Science
Steganography is a process to hide data inside a cover file mostly used in media files like image, video, and audio files. Least significant bit (LSB) steganography is a technique where the least significant bits of pixels are used for information hiding.
Yasir Yakup Demircan, Serhat Ozekes
doaj   +3 more sources

Home - About - Disclaimer - Privacy