Results 81 to 90 of about 5,924 (276)

An Overview of Image Steganography Techniques: Historical Development, Methodologies, and Evaluation Criteria

open access: yesShifra
This paper provides a detailed overview of image steganography, tracing its historical roots and examining the development of modern techniques. Steganography, derived from the Greek words "stegos" (cover) and "graphia" (writing), refers to the practice
Omar Mejbel Hammad   +3 more
doaj   +1 more source

A video coverless information hiding algorithm based on semantic segmentation

open access: yesEURASIP Journal on Image and Video Processing, 2020
Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding.
Nan Pan   +4 more
doaj   +1 more source

Cytoplasmic p21 promotes stemness of colon cancer cells via activation of the NFκB pathway

open access: yesMolecular Oncology, EarlyView.
Cytoplasmic p21 promotes colorectal cancer stem cell (CSC) features by destabilizing the NFκB–IκB complex, activating NFκB signaling, and upregulating BCL‐xL and COX2. In contrast to nuclear p21, cytoplasmic p21 enhances spheroid formation and stemness transcription factor CD133.
Arnatchai Maiuthed   +10 more
wiley   +1 more source

Using Concatenated Steganography for Visual Analysis in GIS SOA

open access: yesApplied Computer Systems, 2012
Geographic Information Systems (GIS) perform the computational processing of geographic data and store the geometry and the attributes of data that are geo-referenced, that is, situated on the earth surface and represented in a cartographic projection ...
Yershov Andrew   +2 more
doaj   +1 more source

Cis‐regulatory and long noncoding RNA alterations in breast cancer – current insights, biomarker utility, and the critical need for functional validation

open access: yesMolecular Oncology, EarlyView.
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués   +3 more
wiley   +1 more source

Efficient Non-Linear Covert Channel Detection in TCP Data Streams

open access: yesIEEE Access, 2020
Cyber-attacks are causing losses amounted to billions of dollars every year due to data breaches and Vulnerabilities. The existing tools for data leakage prevention and detection are often bypassed by using various different types of sophisticated ...
Hanaa Nafea   +4 more
doaj   +1 more source

StegExpose - A Tool for Detecting LSB Steganography

open access: yes, 2014
Steganalysis tools play an important part in saving time and providing new angles of attack for forensic analysts. StegExpose is a solution designed for use in the real world, and is able to analyse images for LSB steganography in bulk using proven attacks in a time efficient manner.
openaire   +2 more sources

Methylation biomarkers can distinguish pleural mesothelioma from healthy pleura and other pleural pathologies

open access: yesMolecular Oncology, EarlyView.
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck   +12 more
wiley   +1 more source

Next‐generation proteomics improves lung cancer risk prediction

open access: yesMolecular Oncology, EarlyView.
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj   +4 more
wiley   +1 more source

Application of Steganography for Anonymity through the Internet [PDF]

open access: yes, 2012
In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too.
Bahi, Jacques M.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy