In this paper, a robust blind watermarking technique, based on block-based DCT coefficient modification is proposed. The difference between two DCT coefficients of the adjacent blocks at the same ...position is calculated. Depending upon the watermark bit to be embedded; this difference is brought in a particular predefined range which is achieved by modifying one of the two DCT coefficients. The amount of modification to a DCT coefficient of a block depends upon the scaling variable, DC coefficient and median of certain zig-zag ordered AC coefficients of that block. The robustness of the proposed scheme has been examined for various singular and hybrid attacks. Comparison results reveal that the proposed technique has a higher degree of robustness against various singular and hybrid attacks. Further a watermark of good quality is extracted even after various simultaneous attacks on the system.
In the current multimedia networked infrastructure, privacy breaches due to cyber-attacks result in huge economic losses. Despite these threats there is ever increasing demand to share data over ...various insecure networks for accomplishment of numerous tasks. In such a scenario there is a greater need to develop new algorithms for strengthening the existing cybersecurity frameworks, ensure security, privacy, copyright protection and authentication of data. In this paper a new technique for copyright protection, data security and content authentication of multimedia images is presented. The copyright protection of the media is taken care of by embedding a robust watermark using an efficient inter-block coefficient differencing algorithm and is proposed as Scheme I. Scheme II has been utilized to ensure both copyright protection, and content authentication. The authentication of the content has been ensured by embedding a fragile watermark in spatial domain while as copyright protection has been taken care of utilizing a robust watermark. In order to thwart an adversary and ensure that it has no access to actual embedded data, we make use of a novel encryption algorithm in conjunction with Arnold transform to encrypt data prior to its embedding. The experimental results reveal that the proposed framework offers high degree of robustness against single/dual/triple attacks; with Normalized Correlation (NCC), more than or equal to 0.95. Besides, the fragile watermark embedding makes the system capable of tamper detection and localization with average BER more than 45% for all signal processing/geometric attacks. The average PSNR achieved for both schemes is greater than 41 dB. A comparison of the proposed framework with various state-of-the-art techniques demonstrate its effectiveness and superiority.
•Dual watermarking based system for privacy protection and content authentication of multimedia.•High robustness, offering threat identification and localization.•Preservation of stego image’s quality via strong coefficient correlation between two selected neighborhood blocks.•Highly robust to both singular and hybrid attacks.
The advancement of the Internet of Things (IoT) has transfigured the overlay of the physical world by superimposing digital information in various sectors, including smart cities, industry, ...healthcare, etc. Among the various shared information, visual data are an insensible part of smart cities, especially in healthcare. As a result, visual-IoT research is gathering momentum. In visual-IoT, visual sensors, such as cameras, collect critical multimedia information about industries, healthcare, shopping, autonomous vehicles, crowd management, etc. In healthcare, patient-related data are captured and then transmitted via insecure transmission lines. The security of this data are of paramount importance. Besides the fact that visual data requires a large bandwidth, the gap between communication and computation is an additional challenge for visual IoT system development. In this paper, we present SVIoT, a Secure Visual-IoT framework, which addresses the issues of both data security and resource constraints in IoT-based healthcare. This was achieved by proposing a novel reversible data hiding (RDH) scheme based on One Dimensional Neighborhood Mean Interpolation (ODNMI). The use of ODNMI reduces the computational complexity and storage/bandwidth requirements by 50 percent. We upscaled the original image from M × N to M ± 2N, dissimilar to conventional interpolation methods, wherein images are upscaled to 2M × 2N. We made use of an innovative mechanism, Left Data Shifting (LDS), before embedding data in the cover image. Before embedding the data, we encrypted it using an AES-128 encryption algorithm to offer additional security. The use of LDS ensures better perceptual quality at a relatively high payload. We achieved an average PSNR of 43 dB for a payload of 1.5 bpp (bits per pixel). In addition, we embedded a fragile watermark in the cover image to ensure authentication of the received content.
Infections are known to cause tumours though more attributed to viruses. Strong epidemiological links suggest association between bacterial infections and cancers as exemplified by Helicobacter ...pylori and Salmonella spp. Infection with Mycobacterium tuberculosis (M. tb), the etiological agent of tuberculosis (TB), has been reported to predispose patients to lung cancers and possibly in other organs as well. While this etiopathogenesis warrant inclusion of M. tb in IARC’s (International Agency for Research on Cancer) classified carcinogenic agents, the lack of well-defined literature and direct experimental studies have barred the research community from accepting the role of M. tb as a carcinogen. The background research, case studies, and experimental data extensively reviewed in Roy et al., 2021; provoke the debate for elucidating carcinogenic properties of M. tb. Moreover, proper, timely and correct diagnosis of both diseases (which often mimic each other) will save millions of lives that are misdiagnosed. In addition, use of Anti Tubercular therapy (ATT) in misdiagnosed non-TB patients contributes to drug resistance in population thereby severely impacting TB disease control measures. Research in this arena can further aid in saving billions of dollars by preventing the superfluous use of cancer drugs. In order to achieve these goals, it is imperative to identify the underlying mechanism of M. tb infection acting as major risk factor for cancer.
Silicon (Si) being considered as a non-essential element for plant growth and development finds its role in providing several benefits to the plant, especially under stress conditions. Thus, Si can ...be regarded as “multi-talented” quasi-essential element. It is the most abundant element present in the earth’s crust after oxygen predominantly as a silicon dioxide (SiO
2
), a form plants cannot utilize. Plants take up Si into their root from the soil in the plant-available forms (PAF) such as silicic acid or mono silicic acid Si(OH)
4
or H
4
SiO
4
. Nevertheless, besides being abundantly available, the PAF of Si in the soil is mostly a limiting factor. To improve Si-uptake and derived benefits therein in plants, understanding the molecular basis of Si-uptake and transport within the tissues has great importance. Numerous Si-transporters (influx and efflux) have been identified in both monocot and dicot plants. A difference in the root anatomy of both monocot and dicot plants leads to a difference in the Si-uptake mechanism. In the present review, Si-transporters identified in different species, their evolution and the Si-uptake mechanism have been addressed. Further, the role of Si in biotic and abiotic stress tolerance has been discussed. The information provided here will help to plan the research in a better way to develop more sustainable cropping system by harnessing Si-derived benefits.
(
) is an intracellular pathogen that exploits moonlighting functions of its proteins to interfere with host cell functions. PE/PPE proteins utilize host inflammatory signaling and cell death ...pathways to promote pathogenesis. We report that
PE6 protein (Rv0335c) is a secretory protein effector that interacts with innate immune toll-like receptor TLR4 on the macrophage cell surface and promotes activation of the canonical NFĸB signaling pathway to stimulate secretion of proinflammatory cytokines TNF-α, IL-12, and IL-6. Using mouse macrophage TLRs knockout cell lines, we demonstrate that PE6 induced secretion of proinflammatory cytokines dependent on TLR4 and adaptor Myd88. PE6 possesses nuclear and mitochondrial targeting sequences and displayed time-dependent differential localization into nucleus/nucleolus and mitochondria, and exhibited strong Nucleolin activation. PE6 strongly induces apoptosis
increased production of pro-apoptotic molecules Bax, Cytochrome C, and pcMyc. Mechanistic details revealed that PE6 activates Caspases 3 and 9 and induces endoplasmic reticulum-associated unfolded protein response pathways to induce apoptosis through increased production of ATF6, Chop, BIP, eIF2α, IRE1α, and Calnexin. Despite being a potent inducer of apoptosis, PE6 suppresses innate immune defense strategy autophagy by inducing inhibitory phosphorylation of autophagy initiating kinase ULK1. Inversely, PE6 induces activatory phosphorylation of autophagy master regulator MtorC1, which is reflected by lower conversion of autophagy markers LC3BI to LC3BII and increased accumulation of autophagy substrate p62 which is also dependent on innate immune receptor TLR4. The use of pharmacological agents, rapamycin and bafilomycin A1, confirms the inhibitory effect of PE6 on autophagy, evidenced by the reduced conversion of LC3BI to LC3BII and increased accumulation of p62 in the presence of rapamycin and bafilomycin A1. We also observed that PE6 binds DNA, which could have significant implications in virulence. Furthermore, our analyses reveal that PE6 efficiently binds iron to likely aid in intracellular survival. Recombinant
(
) containing
displayed robust growth in iron chelated media compared to vector alone transformed cells, which suggests a role of PE6 in iron acquisition. These findings unravel novel mechanisms exploited by PE6 protein to subdue host immunity, thereby providing insights relevant to a better understanding of host-pathogen interaction during
infection.
Reductive evolution has endowed
(
) with moonlighting in protein functions. We demonstrate that RipA (Rv1477), a peptidoglycan hydrolase, activates the NFκB signaling pathway and elicits the ...production of pro-inflammatory cytokines, TNF-α, IL-6, and IL-12, through the activation of an innate immune-receptor, toll-like receptor (TLR)4. RipA also induces an enhanced expression of macrophage activation markers MHC-II, CD80, and CD86, suggestive of M1 polarization. RipA harbors LC3 (Microtubule-associated protein 1A/1B-light chain 3) motifs known to be involved in autophagy regulation and indeed alters the levels of autophagy markers LC3BII and P62/SQSTM1 (Sequestosome-1), along with an increase in the ratio of P62/Beclin1, a hallmark of autophagy inhibition. The use of pharmacological agents, rapamycin and bafilomycin A1, reveals that RipA activates PI3K-AKT-mTORC1 signaling cascade that ultimately culminates in the inhibition of autophagy initiating kinase ULK1 (Unc-51 like autophagy activating kinase). This inhibition of autophagy translates into efficient intracellular survival, within macrophages, of recombinant
expressing
RipA. RipA, which also localizes into mitochondria, inhibits the production of oxidative phosphorylation enzymes to promote a Warburg-like phenotype in macrophages that favors bacterial replication. Furthermore, RipA also inhibited caspase-dependent programed cell death in macrophages, thus hindering an efficient innate antibacterial response. Collectively, our results highlight the role of an endopeptidase to create a permissive replication niche in host cells by inducing the repression of autophagy and apoptosis, along with metabolic reprogramming, and pointing to the role of RipA in disease pathogenesis.
Intracellular pathogens have evolved various efficient molecular armaments to subvert innate defenses. Cellular ubiquitination, a normal physiological process to maintain homeostasis, is emerging one ...such exploited mechanism. Ubiquitin (Ub), a small protein modifier, is conjugated to diverse protein substrates to regulate many functions. Structurally diverse linkages of poly-Ub to target proteins allow enormous functional diversity with specificity being governed by evolutionarily conserved enzymes (E3-Ub ligases). The Ub-binding domain (UBD) and LC3-interacting region (LIR) are critical features of macroautophagy/autophagy receptors that recognize Ub-conjugated on protein substrates. Emerging evidence suggests that E3-Ub ligases unexpectedly protect against intracellular pathogens by tagging poly-Ub on their surfaces and targeting them to phagophores. Two E3-Ub ligases, PRKN and SMURF1, provide immunity against Mycobacterium tuberculosis (M. tb). Both enzymes conjugate K63 and K48-linked poly-Ub to M. tb for successful delivery to phagophores. Intriguingly, M. tb exploits virulence factors to effectively dampen host-directed autophagy utilizing diverse mechanisms. Autophagy receptors contain LIR-motifs that interact with conserved Atg8-family proteins to modulate phagophore biogenesis and fusion to the lysosome. Intracellular pathogens have evolved a vast repertoire of virulence effectors to subdue host-immunity via hijacking the host ubiquitination process. This review highlights the xenophagy-mediated clearance of M. tb involving host E3-Ub ligases and counter-strategy of autophagy inhibition by M. tb using virulence factors. The role of Ub-binding receptors and their mode of autophagy regulation is also explained. We also discuss the co-opting and utilization of the host Ub system by M. tb for its survival and virulence.
Abbreviations: APC: anaphase promoting complex/cyclosome; ATG5: autophagy related 5; BCG: bacille Calmette-Guerin; C2: Ca
2+
-binding motif; CALCOCO2: calcium binding and coiled-coil domain 2; CUE: coupling of ubiquitin conjugation to ER degradation domains; DUB: deubiquitinating enzyme; GABARAP: GABA type A receptor-associated protein; HECT: homologous to the E6-AP carboxyl terminus; IBR: in-between-ring fingers; IFN: interferon; IL1B: interleukin 1 beta; KEAP1: kelch like ECH associated protein 1; LAMP1: lysosomal associated membrane protein 1; LGALS: galectin; LIR: LC3-interacting region; MAPK11/p38: mitogen-activated protein kinase 11; MAP1LC3/LC3: microtubule associated protein 1 light chain 3; MAP3K7/TAK1: mitogen-activated protein kinase kinase kinase 7; MAPK8/JNK: mitogen-activated protein kinase 8; MHC-II: major histocompatibility complex-II; MTOR: mechanistic target of rapamycin kinase; NBR1: NBR1 autophagy cargo receptor; NFKB1/p50: nuclear factor kappa B subunit 1; OPTN: optineurin; PB1: phox and bem 1; PE/PPE: proline-glutamic acid/proline-proline-glutamic acid; PknG: serine/threonine-protein kinase PknG; PRKN: parkin RBR E3 ubiquitin protein ligase; RBR: RING-in between RING; RING: really interesting new gene; RNF166: RING finger protein 166; ROS: reactive oxygen species; SMURF1: SMAD specific E3 ubiquitin protein ligase 1; SQSTM1: sequestosome 1; STING1: stimulator of interferon response cGAMP interactor 1; TAX1BP1: Tax1 binding protein 1; TBK1: TANK binding kinase 1; TNF: tumor necrosis factor; TRAF6: TNF receptor associated factor 6; Ub: ubiquitin; UBA: ubiquitin-associated; UBAN: ubiquitin-binding domain in ABIN proteins and NEMO; UBD: ubiquitin-binding domain; UBL: ubiquitin-like; ULK1: unc-51 like autophagy activating kinase 1.
Electronic transmission of the medical images is one of the primary requirements in a typical Electronic-Healthcare (E-Healthcare) system. However this transmission could be liable to hackers who may ...modify the whole medical image or only a part of it during transit. To guarantee the integrity of a medical image, digital watermarking is being used. This paper presents two different watermarking algorithms for medical images in transform domain. In first technique, a digital watermark and Electronic Patients Record (EPR) have been embedded in both regions; Region of Interest (ROI) and Region of Non-Interest (RONI). In second technique, Region of Interest (ROI) is kept untouched for tele-diagnosis purpose and Region of Non-Interest (RONI) is used to hide the digital watermark and EPR. In either algorithm 8 × 8 block based Discrete Cosine Transform (DCT) has been used. In each 8 × 8 block two DCT coefficients are selected and their magnitudes are compared for embedding the watermark/EPR. The selected coefficients are modified by using a threshold for embedding bit a ‘0’ or bit ‘1’ of the watermark/EPR. The proposed techniques have been found robust not only to singular attacks but also to hybrid attacks. Comparison results viz-a - viz payload and robustness show that the proposed techniques perform better than some existing state of art techniques. As such the proposed algorithms could be useful for e-healthcare systems.
Polyamines (PAs) and nitric oxide (NO) are crucial signalling molecules that exhibit a promising role in improving stress tolerance in plants, maintaining their growth and development. They act as ...protecting agents for plants through activation of stress adaptation strategies such as membrane stabilisation, acid neutralisation and suppression of ROS generation. NO interacts with PAs during several developmental processes and stress responses. External supplementation of PAs to plants is also reported to cause an increase in NO content. However, it is unclear whether PAs promote synthesis of NO by either as substrates, cofactors, or signals. Impact of NO on synthesis of PAs has been also reported in some studies, yet the exact governing mechanisms of the interrelation between NO and PAs is currently obscure. Understanding the crosstalk between PAs and NO during growth and stress condition in plants can aid in providing better tolerance to plants against stressful environment.