Pei-Feng Shiu

Learn More
Filamentous fungi grow as a multicellular, multinuclear network of filament-shaped cells called hyphae. A fungal individual can be viewed as a fluid, dynamic system that is characterized by hyphal tip growth, branching, and hyphal fusion (anastomosis). Hyphal anastomosis is especially important in such nonlinear systems for the purposes of communication and(More)
Sexual development in filamentous ascomycetes requires mating-type genes to mediate recognition of compatible cell and nuclear types. Characterization of mating-type genes from various fungi shows that they primarily encode transcriptional regulators. Recent studies on mating-type-specific pheromones and internuclear recognition have shed light on how(More)
The mating-type locus in the haploid filamentous fungus, Neurospora crassa, controls mating and sexual development. The fusion of reproductive structures of opposite mating type, A and a, is required to initiate sexual reproduction. However, the fusion of hyphae of opposite mating type during vegetative growth results in growth inhibition and cell death, a(More)
To enhance the hiding capacity of Chang et al.'s reversible DCT-based data hiding scheme, in this paper we propose another method called a layer-1 data embedding strategy. Our proposed layer-1 strategy considers some areas not used by Chang et al.'s scheme, which we call layer-2 data embedding. To achieve our objective, we applied Tian's pixel expansion(More)
Research in the field of watermarking is flourishing providing techniques to protect copyright of intellectual property. Among the various methods that exploit the characteristics of the Human Visual System (HVS) for more secure and effective data hiding, wavelet-based watermarking techniques showed to be immune to attacks; adding the quality of robustness(More)
In this paper, we combine absolute moment block truncation coding (AMBTC) and Shamir's secret sharing scheme to propose a verifiable secret sharing scheme. Shares construction is based on the compression codes generated by AMBTC; therefore, the shadow size is about one third of the original secret image. During the shares construction phase, the compression(More)
Data security and data integrity are the two challenging areas for research. So many research is progressing on the field like internet security. The requirement of secure transmission of data is important in our life. The transmission should be more secure when channel/network is too noisy/fraudulent. Image transmission is one of the application that must(More)
  • 1