Background: Prostate cancer (PCa) ranks as the second most common disease among men and the fourth most prevalent cancer worldwide. Enhanced glycolysis and excessive lactate secretion are recognized as critical factors driving the progression of various cancers. This study systematically investigated the research trends associated with glycolysis in PCa through bibliometric analysis.
View Article and Find Full Text PDFIn this article, a visual security image encryption algorithm based on compressed sensing is proposed. The algorithm consists of two stages: the compression and encryption stage and the embedding stage. The key streams in the compression and encryption stage are generated by a newly constructed four-dimensional discrete chaotic map, while the Gaussian measurement matrix is generated by a Chebyshev map, and both of their generations are related to the feature code of the carrier image, which enhances the security of the ciphertext.
View Article and Find Full Text PDFBackground: Prostate cancer (PCa) incidence and mortality rates are rising. Our previous research has shown that the combination of icariin (ICA) and curcumol (CUR) induced autophagy and ferroptosis in PCa cells, and altered lipid metabolism. We aimed to further explore the effects of the combination of ICA and CUR on gut microbiota, metabolism, and immunity in PCa.
View Article and Find Full Text PDFFerroptosis is a form of regulatory cell death that relies on iron and reactive oxygen species (ROS) to inhibit tumors. The present study aimed to investigate whether icariin-curcumol could be a novel ferroptosis inducer in tumor inhibition. Various concentrations of icariin-curcumol were used to stimulate prostate cell lines (RWPE-2, PC-3, VCAP and DU145).
View Article and Find Full Text PDFThis study aims to explore the influence of Polygonati Rhizoma on the pyroptosis in the rat model of diabetic macroangiopathy via the NOD-like receptor thermal protein domain associated protein 3(NLRP3)/cysteinyl aspartate specific proteinase-1(caspase-1)/gasdermin D(GSDMD) pathway. The rat model of diabetes was established by intraperitoneal injection of streptozotocin(STZ) combined with a high-fat, high-sugar diet. The blood glucose meter, fully automated biochemical analyzer, hematoxylin-eosin(HE) staining, enzyme-linked immunosorbent assay, immunofluorescence, immunohistochemistry, and Western blot were employed to measure blood glucose levels, lipid levels, vascular thickness, inflammatory cytokine levels, and expression levels of pyroptosis-related proteins.
View Article and Find Full Text PDFBackground: Docetaxel (DTX) resistance reduces therapeutic efficacy in prostate cancer (PCa). Accumulating reports support the role of phytochemicals in the reversal of DTX resistance. This study aimed to determine whether Epimedium brevicornu and Curcuma zedoaria extracts (ECe), specially icariin-curcumol, attenuates DTX resistance and explore their potential mechanisms.
View Article and Find Full Text PDFImage encryption techniques protect private images from unauthorized access while they are being transmitted. Previously used confusion and diffusion processes are risky and time-consuming. Therefore, finding a solution to this problem has become necessary.
View Article and Find Full Text PDFAn image encryption algorithm for the double scrambling of the pixel position and bit was cryptanalyzed. In the original image encryption algorithm, the positions of pixels were shuffled totally with the chaotic sequence. Then, the 0 and 1-bit positions of image pixels were scrambled through the use of another chaotic sequence generated by the input key.
View Article and Find Full Text PDFThis paper proposes a more efficient attack method on an image fusion encryption algorithm based on DNA operation and hyperchaos. Although several references have reported some methods to crack the image encryption algorithm, they are not the most efficient. The proposed chosen-plaintext attack method can break the encryption scheme with (4×/+1) or (/(4×)+1) chosen-plaintext images, which is much less than the number of chosen-plaintext images used in the previous cracking algorithms, where and represent the height and width of the target ciphertext image, respectively.
View Article and Find Full Text PDFThis paper analyzes the security of image encryption systems based on bit plane extraction and multi chaos. It includes a bit-level permutation for high, 4-bit planes and bit-wise XOR diffusion, and finds that the key streams in the permutation and diffusion phases are independent of the plaintext image. Therefore, the equivalent diffusion key and the equivalent permutation key can be recovered by the chosen-plaintext attack method, in which only two special plaintext images and their corresponding cipher images are used.
View Article and Find Full Text PDFEntropy (Basel)
July 2020
In this paper, we construct a five dimensional continuous hyperchaotic system and propose an image encryption scheme based on the hyperchaotic system, which adopts DNA dynamic coding mechanism and classical scrambling diffusion encryption structure. In the diffusion stage, two rounds of diffusion are adopted and the rules of DNA encoding (DNA decoding) are dynamically changed according to the pixel value of the plaintext image, that is, the rules of DNA encoding (DNA decoding) used to encrypt different images are different, which makes the algorithm can resist chosen-plaintext attack. The encryption (decryption) key is only the initial value of the chaotic system, which overcomes the difficulty of key management in the "one time pad" encryption system.
View Article and Find Full Text PDFEntropy (Basel)
August 2019
In order to improve the security and efficiency of image encryption systems comprehensively, a novel chaotic S-box based image encryption scheme is proposed. Firstly, a new compound chaotic system, Sine-Tent map, is proposed to widen the chaotic range and improve the chaotic performance of 1D discrete chaotic maps. As a result, the new compound chaotic system is more suitable for cryptosystem.
View Article and Find Full Text PDFThis paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process. It was found that the equivalent key streams and all the unknown parameters of the cryptosystem can be recovered by our chosen-plaintext attack algorithm. Both a theoretical analysis and an experimental validation are given in detail.
View Article and Find Full Text PDFEntropy (Basel)
September 2018
In order to overcome the difficulty of key management in "one time pad" encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture of confusion and diffusion is adopted. Firstly, the surrounding of a plaintext image is surrounded by a sequence generated from the SHA-256 hash value of the plaintext to ensure that each encrypted result is different.
View Article and Find Full Text PDFAdvanced hetero-nanostructured materials for electrochemical devices, such as Li-ion batteries (LiBs), dramatically depend on each functional component and their interfaces to transport and storage charges, where the bottleneck is the sluggish one in series. In this work, we prepare Ni(OH)2@C hybrids through a continuous feeding in reflux and followed by a hydrothermal treatment. The as-prepared Ni(OH)2@C can be further converted into NiO@C hybrids after thermal annealing.
View Article and Find Full Text PDFScientificWorldJournal
September 2014
An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion.
View Article and Find Full Text PDF