1,975 research outputs found

    Novel colour image-hiding scheme using error diffusion technique

    Get PDF
    [[abstract]]A colour image-hiding scheme is presented which can hide multiple colour secret images into one colour host image of the same size imperceptibly. The proposed scheme uses the error diffusion technique to convert colour secret images into colour halftone images. Then the results are encrypted and embedded in the colour host image. In order to provide the embedded image and the extracted image with good visual quality, a bit-adjustment mechanism and a low-pass filter are employed in the embedding and extraction procedures, respectively. The scheme does not need to refer to the original host image. In addition, it satisfies the basic image-hiding requirements: high hiding capacity, imperceptibility and data security. The experimental results demonstrate that the proposed scheme can achieve a better stego-image quality as well as extracted secret image visual quality. In addition, compared with other colour hiding schemes, the scheme can embed more secret colour images

    Traffic agents for improving QoS in mixed infrastructure and ad hoc modes wireless LAN

    Get PDF
    As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET) are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS) requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN), which can offer high data-rate wireless multimedia services to the mobile stations (MSs) in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP) and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs) to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth) of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light

    Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks.

    Get PDF
    The two-dimensional quick response (QR) codes can be misleading due to the difficulty in differentiating a genuine QR code from a malicious one. Since, the vulnerability is practically part of their design, scanning a malicious QR code can direct the user to cloned malicious sites resulting in revealing sensitive information. In order, to evaluate the vulnerabilities and propose subsequent countermeasures, we demonstrate this type of attack through a simulated experiment, where a malicious QR code directs a user to a phishing site. For our experiment, we cloned Google's web page providing access to their email service (Gmail). Since, the URL is masqueraded into the QR code the unsuspecting user who opens the URL is directed to the malicious site. Our results proved that hackers could easily leverage QR codes into phishing attack vectors targeted at smartphone users, even bypassing web browsers safe browsing feature. In addition, the second part of our paper presents adequate countermeasures and introduces QRCS (Quick Response Code Secure). QRCS is a universal efficient and effective solution focusing exclusively on the authenticity of the originator and consequently, the integrity of QR code by using digital signatures

    Modulation of the Disturbed Motor Network in Dystonia by Multisession Suppression of Premotor Cortex

    Get PDF
    Daily sessions of therapeutic transcranial brain stimulation are thought to prolong or amplify the effect of a single intervention. Here we show in patients with focal hand dystonia that additional, new effects build up progressively over time, making it difficult to predict the effect of long term interventions from shorter treatment sessions. In a sham-controlled study, real or sham continuous theta burst stimulation (cTBS) was given once daily for five consecutive days to dorsolateral premotor cortex (PMd). Five days of real, but not sham, premotor cTBS improved intracortical inhibition in primary motor cortex (M1) to a similar extent on day 1 and day 5. However 5 days of cTBS were required to restore the abnormal PMd-M1 interactions observed on day 1. Similarly, excessive M1 plasticity seen at baseline was also significantly reduced by five days of real premotor cTBS. There was only a marginal benefit on writing. The results show that additional, new effects, at sites distant from the point of stimulation, build up progressively over time, making it difficult to predict the effect of long term interventions from shorter treatment sessions. The results indicate that it may take many days of therapeutic intervention to rebalance activity in a complex network

    Predicting Head Pose in Dyadic Conversation

    Get PDF
    Natural movement plays a significant role in realistic speech animation. Numerous studies have demonstrated the contribution visual cues make to the degree we, as human observers, find an animation acceptable. Rigid head motion is one visual mode that universally co-occurs with speech, and so it is a reasonable strategy to seek features from the speech mode to predict the head pose. Several previous authors have shown that prediction is possible, but experiments are typically confined to rigidly produced dialogue. Expressive, emotive and prosodic speech exhibit motion patterns that are far more difficult to predict with considerable variation in expected head pose. People involved in dyadic conversation adapt speech and head motion in response to the others’ speech and head motion. Using Deep Bi-Directional Long Short Term Memory (BLSTM) neural networks, we demonstrate that it is possible to predict not just the head motion of the speaker, but also the head motion of the listener from the speech signal

    Mitochondrial and nuclear genes suggest that stony corals are monophyletic but most families of stony corals are not (Order Scleractinia, Class Anthozoa, Phylum Cnidaria)

    Get PDF
    Modern hard corals (Class Hexacorallia; Order Scleractinia) are widely studied because of their fundamental role in reef building and their superb fossil record extending back to the Triassic. Nevertheless, interpretations of their evolutionary relationships have been in flux for over a decade. Recent analyses undermine the legitimacy of traditional suborders, families and genera, and suggest that a non-skeletal sister clade (Order Corallimorpharia) might be imbedded within the stony corals. However, these studies either sampled a relatively limited array of taxa or assembled trees from heterogeneous data sets. Here we provide a more comprehensive analysis of Scleractinia (127 species, 75 genera, 17 families) and various outgroups, based on two mitochondrial genes (cytochrome oxidase I, cytochrome b), with analyses of nuclear genes (ßtubulin, ribosomal DNA) of a subset of taxa to test unexpected relationships. Eleven of 16 families were found to be polyphyletic. Strikingly, over one third of all families as conventionally defined contain representatives from the highly divergent "robust" and "complex" clades. However, the recent suggestion that corallimorpharians are true corals that have lost their skeletons was not upheld. Relationships were supported not only by mitochondrial and nuclear genes, but also often by morphological characters which had been ignored or never noted previously. The concordance of molecular characters and more carefully examined morphological characters suggests a future of greater taxonomic stability, as well as the potential to trace the evolutionary history of this ecologically important group using fossils

    Unacylated ghrelin promotes adipogenesis in rodent bone marrow via ghrelin O-acyl transferase and GHS-R1a activity: evidence for target cell-induced acylation

    Get PDF
    Despite being unable to activate the cognate ghrelin receptor (GHS-R), unacylated ghrelin (UAG) possesses a unique activity spectrum that includes promoting bone marrow adipogenesis. Since a receptor mediating this action has not been identified, we re-appraised the potential interaction of UAG with GHS-R in the regulation of bone marrow adiposity. Surprisingly, the adipogenic effects of intra-bone marrow (ibm)-infused acylated ghrelin (AG) and UAG were abolished in male GHS-R-null mice. Gas chromatography showed that isolated tibial marrow adipocytes contain the medium-chain fatty acids utilised in the acylation of UAG, including octanoic acid. Additionally, immunohistochemistry and immunogold electron microscopy revealed that tibial marrow adipocytes show prominent expression of the UAG-activating enzyme ghrelin O-acyl transferase (GOAT), which is located in the membranes of lipid trafficking vesicles and in the plasma membrane. Finally, the adipogenic effect of ibm-infused UAG was completely abolished in GOAT-KO mice. Thus, the adipogenic action of exogenous UAG in tibial marrow is dependent upon acylation by GOAT and activation of GHS-R. This suggests that UAG is subject to target cell-mediated activation – a novel mechanism for manipulating hormone activity

    Branch Mode Selection during Early Lung Development

    Get PDF
    Many organs of higher organisms, such as the vascular system, lung, kidney, pancreas, liver and glands, are heavily branched structures. The branching process during lung development has been studied in great detail and is remarkably stereotyped. The branched tree is generated by the sequential, non-random use of three geometrically simple modes of branching (domain branching, planar and orthogonal bifurcation). While many regulatory components and local interactions have been defined an integrated understanding of the regulatory network that controls the branching process is lacking. We have developed a deterministic, spatio-temporal differential-equation based model of the core signaling network that governs lung branching morphogenesis. The model focuses on the two key signaling factors that have been identified in experiments, fibroblast growth factor (FGF10) and sonic hedgehog (SHH) as well as the SHH receptor patched (Ptc). We show that the reported biochemical interactions give rise to a Schnakenberg-type Turing patterning mechanisms that allows us to reproduce experimental observations in wildtype and mutant mice. The kinetic parameters as well as the domain shape are based on experimental data where available. The developed model is robust to small absolute and large relative changes in the parameter values. At the same time there is a strong regulatory potential in that the switching between branching modes can be achieved by targeted changes in the parameter values. We note that the sequence of different branching events may also be the result of different growth speeds: fast growth triggers lateral branching while slow growth favours bifurcations in our model. We conclude that the FGF10-SHH-Ptc1 module is sufficient to generate pattern that correspond to the observed branching modesComment: Initially published at PLoS Comput Bio
    corecore