Learn More
Filamentous fungi grow as a multicellular, multinuclear network of filament-shaped cells called hyphae. A fungal individual can be viewed as a fluid, dynamic system that is characterized by hyphal tip growth, branching, and hyphal fusion (anastomosis). Hyphal anastomosis is especially important in such nonlinear systems for the purposes of communication and(More)
The mating-type locus in the haploid filamentous fungus, Neurospora crassa, controls mating and sexual development. The fusion of reproductive structures of opposite mating type, A and a, is required to initiate sexual reproduction. However, the fusion of hyphae of opposite mating type during vegetative growth results in growth inhibition and cell death, a(More)
Sexual development in filamentous ascomycetes requires mating-type genes to mediate recognition of compatible cell and nuclear types. Characterization of mating-type genes from various fungi shows that they primarily encode transcriptional regulators. Recent studies on mating-type-specific pheromones and internuclear recognition have shed light on how(More)
To enhance the hiding capacity of Chang et al.'s reversible DCT-based data hiding scheme, in this paper we propose another method called a layer-1 data embedding strategy. Our proposed layer-1 strategy considers some areas not used by Chang et al.'s scheme, which we call layer-2 data embedding. To achieve our objective, we applied Tian's pixel expansion(More)
Research in the field of watermarking is flourishing providing techniques to protect copyright of intellectual property. Among the various methods that exploit the characteristics of the Human Visual System (HVS) for more secure and effective data hiding, wavelet-based watermarking techniques showed to be immune to attacks; adding the quality of robustness(More)
In 2008 Lin et al. proposed a reversible steganographic method with a high payload for JPEG images. Because modifying the quantized DCT coefficients may lead to serious image distortion, Lin et al. embedded the secrets into the middle frequency of the quantized DCT coefficients. Moreover, they limited the number of nonzero values of the quantized DCT(More)
In this paper, we combine absolute moment block truncation coding (AMBTC) and Shamir's secret sharing scheme to propose a verifiable secret sharing scheme. Shares construction is based on the compression codes generated by AMBTC; therefore, the shadow size is about one third of the original secret image. During the shares construction phase, the compression(More)
  • 1