Learn More
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted(More)
Due to the existence of security threats in the cloud, many mechanisms have been proposed to allow a user to audit data integrity with the public key of the data owner before utilizing cloud data. The correctness of choosing the right public key in previous mechanisms depends on the security of Public Key Infrastructure (PKI) and certificates. Although(More)
Saxitoxin (STX) and tetrodotoxin (TTX) are frequently used to selectively block sodium channels. In this study, we provide evidence that commercial STX also inhibits L-type Ca2+ currents (I(Ca,L)) in adult mouse ventricular myocytes (VMs) and tsA-201 cells that were transiently cotransfected with three calcium channel subunits. We measured inhibition of(More)
BACKGROUND The development of hyperalgesia and allodynia after chronic constrictive injury (CCI) is associated with significantly increased tumor necrosis factor (TNF)-α and interleukin (IL)-1β. Theoretically, if the production of TNF-α and/or IL-1β could be reduced, neuropathic pain syndrome may be alleviated. Recently, a beneficial effect of hyperbaric(More)
Throughput of Concurrent Multipath Transfer varies with different path selection schemes. As the number of path increases, the path selection solution space increases exponentially while receiving buffer efficiency decreases. To solve this problem, we model the throughput of Concurrent Multipath Transfer and find that it may be limited by the receiving(More)
The eye is an ideal target organ for gene therapy as it is easily accessible and immune‑privileged. With the increasing insight into the underlying molecular mechanisms of ocular diseases, gene therapy has been proposed as an effective approach. Successful gene therapy depends on efficient gene transfer to targeted cells to prove stable and prolonged gene(More)
Recently, code construction approaching the rate-distortion bound of reversible data hiding has been proposed by Lin , in which the coding/decoding process needs the optimal probability distribution of marked-signals as parameters. Therefore, the efficiency and accuracy of estimating the optimal marked-signal distribution will greatly influence the speeds(More)