Review Topical Sections

Encapsulation of probiotics: insights into academic and industrial approaches

  • The natural inhabitants of the gastrointestinal tract play a key role in the maintenance of human health. Over the last century, the changes on the behavior of our modern society have impacted the diversity of this gut microbiome. Among the strategies to restore gut microbial homeostasis, the use of probiotics has received a lot of attention. Probiotics are living microorganisms that promote the host health when administered in adequate amounts. Its popularity increase in the marketplace in the last decade draws the interest of scientists in finding suitable methods capable of delivering adequate amounts of viable cells into the gastrointestinal tract. Encapsulation comes into the scene as an approach to enhance the cells survival during processing, storage and consumption.
    This paper provides a comprehensive perspective of the probiotic field at present time focusing on the academia and industry scenarios in the past few years in terms of encapsulation technologies employed and research insights including patents. The analysis of the encapsulation technologies considering food processing costs and payload of viable bacteria reaching the gastrointestinal tract would result into successful market novelties. There is yet a necessity to bridge the gap between academia and industry.

    Citation: Fernanda B Haffner, Roudayna Diab, Andreea Pasc. Encapsulation of probiotics: insights into academic and industrial approaches[J]. AIMS Materials Science, 2016, 3(1): 114-136. doi: 10.3934/matersci.2016.1.114

    Related Papers:

    [1] Rujing Zhao, Xiulan Lai . Evolutionary analysis of replicator dynamics about anti-cancer combination therapy. Mathematical Biosciences and Engineering, 2023, 20(1): 656-682. doi: 10.3934/mbe.2023030
    [2] Abeer S. Alnahdi, Muhammad Idrees . Nonlinear dynamics of estrogen receptor-positive breast cancer integrating experimental data: A novel spatial modeling approach. Mathematical Biosciences and Engineering, 2023, 20(12): 21163-21185. doi: 10.3934/mbe.2023936
    [3] Urszula Ledzewicz, Heinz Schättler, Mostafa Reisi Gahrooi, Siamak Mahmoudian Dehkordi . On the MTD paradigm and optimal control for multi-drug cancer chemotherapy. Mathematical Biosciences and Engineering, 2013, 10(3): 803-819. doi: 10.3934/mbe.2013.10.803
    [4] Yi Liu, Long Cheng, Xiangyang Song, Chao Li, Jiantao Zhang, Lei Wang . A TP53-associated immune prognostic signature for the prediction of the overall survival and therapeutic responses in pancreatic cancer. Mathematical Biosciences and Engineering, 2022, 19(1): 191-208. doi: 10.3934/mbe.2022010
    [5] Samantha L Elliott, Emek Kose, Allison L Lewis, Anna E Steinfeld, Elizabeth A Zollinger . Modeling the stem cell hypothesis: Investigating the effects of cancer stem cells and TGF−β on tumor growth. Mathematical Biosciences and Engineering, 2019, 16(6): 7177-7194. doi: 10.3934/mbe.2019360
    [6] Hongli Yang, Jinzhi Lei . A mathematical model of chromosome recombination-induced drug resistance in cancer therapy. Mathematical Biosciences and Engineering, 2019, 16(6): 7098-7111. doi: 10.3934/mbe.2019356
    [7] Baba Issa Camara, Houda Mokrani, Evans K. Afenya . Mathematical modeling of glioma therapy using oncolytic viruses. Mathematical Biosciences and Engineering, 2013, 10(3): 565-578. doi: 10.3934/mbe.2013.10.565
    [8] Farinaz Forouzannia, Sivabal Sivaloganathan, Mohammad Kohandel . A mathematical study of the impact of cell plasticity on tumour control probability. Mathematical Biosciences and Engineering, 2020, 17(5): 5250-5266. doi: 10.3934/mbe.2020284
    [9] Cassidy K. Buhler, Rebecca S. Terry, Kathryn G. Link, Frederick R. Adler . Do mechanisms matter? Comparing cancer treatment strategies across mathematical models and outcome objectives. Mathematical Biosciences and Engineering, 2021, 18(5): 6305-6327. doi: 10.3934/mbe.2021315
    [10] Erin N. Bodine, K. Lars Monia . A proton therapy model using discrete difference equations with an example of treating hepatocellular carcinoma. Mathematical Biosciences and Engineering, 2017, 14(4): 881-899. doi: 10.3934/mbe.2017047
  • The natural inhabitants of the gastrointestinal tract play a key role in the maintenance of human health. Over the last century, the changes on the behavior of our modern society have impacted the diversity of this gut microbiome. Among the strategies to restore gut microbial homeostasis, the use of probiotics has received a lot of attention. Probiotics are living microorganisms that promote the host health when administered in adequate amounts. Its popularity increase in the marketplace in the last decade draws the interest of scientists in finding suitable methods capable of delivering adequate amounts of viable cells into the gastrointestinal tract. Encapsulation comes into the scene as an approach to enhance the cells survival during processing, storage and consumption.
    This paper provides a comprehensive perspective of the probiotic field at present time focusing on the academia and industry scenarios in the past few years in terms of encapsulation technologies employed and research insights including patents. The analysis of the encapsulation technologies considering food processing costs and payload of viable bacteria reaching the gastrointestinal tract would result into successful market novelties. There is yet a necessity to bridge the gap between academia and industry.


    Information hiding, as an important research direction in the field of network security, has made great progress in recent years. Secret information is usually embedded into various multimedia carriers, such as text, images [1], audio [2] and videos [3]. Since text is the most widely used media, information hiding based on text has great value. Most traditional text steganography methods hide secret information in an existing document by exploiting its typesetting (format-based) and its lexical, syntactical, and semantical features (content-based) of the document. Format-based methods, for example, typically alter letter-spacing [4] and line-spacing [5], change the font attributes [6], and utilize invisible characters [7]. These methods, however, are sensitive to formats, and a slight change of format could cause new errors when extracting secret information. Common content-based methods, on the other hand, may change existing semantics using, e.g., synonym substitution [8,9], and adjust syntactic structures of certain sentences [10]. These traditional methods embed secret information by making some changes to the text, thus they are vulnerable to some steganalysis algorithms [11,12], which lead to poor security.

    In recent years, researchers have started to investigate how to generate text, instead of modifying existing one, to hide information. For example, Yu et al. [13] proposed to use a special style of poetry called "Song Ci", originated in the Song Dynasty in ancient China, to form text steganography. This was the first text steganography algorithm to make use of a Chinese art form. However, their method only selects suitable words from an existing Song-Ci poem to recombines a new Ci-poem. It does not really generate new Ci-poems from scratch, and so may limit its usage. In addition, their method randomly chooses words during the generation process and ignores word collocations and the relationships between lines. Because of these, Ci-poems generated by their algorithms often lack a central theme, which might arouse suspicion and thus reduce security.

    Recently, deep-learning technologies has achieved great success in the field of image generation [14]. Benefiting from this, more attempts of using such technologies have been made to generate a certain type of text form. For example, Zhang and Lapata [15] studied poem generations as a machine- translation problem using the standard encoder-decoder model. Their method compresses all previously generated lines for a poem to be generated into a vector to help generate the next line. Wang et al. [16,17] and Yi et al. [18] presented a method to generate a poem around a central theme using a bidirectional recurrent neural network (RNN) with attention mechanism, which allow them to focus on the most critical components and deep dependencies of lines in a poem.

    Using CNN modeling, researchers have applied text generations to text steganography. For example, Luo et al. [19] presented a method based on Ci-poem generations using a Markov chain model. While their method does produce a better Ci-poem, it has a low embedding capacity for hiding information. They [20] also showed how to use a LSTM model to generate Chinese classic poems and embed secret information into a generated poem during the generation process.

    We note that ancient styles of poetry, although once played an important role in the literature, often have a unique style of expressions that makes it difficult for general readers to comprehend. In particular, secret information embedded in a poem may look odd and thus arouse suspicion, leading to weaker security.

    To overcome this obstacle, we devise a novel text steganography method using a RNN model to generate Chinese pop music lyrics. Compared to the poems written in a stringent style, lyrics are easier to understand and allowed to have a much longer length, yielding better security and a higher embedding capacity. However, if applying neural networks to lyrics generation directly, especially when combining text steganography, the resulting text may not look like lyrics at all. The reason is that lyrics must also follow a certain structure and properly rhyme. Moreover, lyrics should express emotions consistently. To tackle these issues, we analyze a large number of Chinese pop lyrics, summarize three common types, and use them as structure templates to guide lyric generation. We then present thirteen rhymes, similar to the oblique tones of poems, for generating lyrics with pleasant tones.

    Our contributions are the following: First, we devise a RNN-based lyric generator with steganography to offer a much higher embedding capacity than previous steganography methods. Second, we present three structure templates for Chinese pop music and thirteen rhymes to mitigate the lyric-quality decrease incurred during the process of hiding information.

    The rest of the paper is organized as follows: In Section 2 we describe preliminary results. In Section 3 we present a detailed description of our RNN-based lyric-generation model suitable for text steganography. In Section 4 we carry out the construction of dataset, show the generated results, evaluate the proposed method and make comparisons with previous methods. Finally, we conclude the paper in Section 5.

    In this section, we describe our preliminary results on Char-RNN, lyric formats, and rhymes.

    The sequence-to-sequence (S2S) model has been widely used in machine translation, automatic response, text generation, and other fields. S2S may be carried out under the framework of Encoder-Decoder and implemented as a RNN, CNN or GRU. Recurrent Neural Network (RNN) is the most widely used, which has been proved to be the most suitable network model for dealing with sequential tasks. However, a basic RNN model consists of only one hidden state, and the information at the beginning of the sequence is seldom retained in a later stage, there is a severe problem of gradient disappearance [17]. Therefore, basic RNNs are not suitable for generating the long lyrics. To solve these problems, researchers have proposed a number of variants of RNN, including LSTM and GRU.

    As a special kind of RNN network, LSTM [21] adopts four processing methods that interact with each other in a special way to realize the processing of long-term dependence. The LSTM network model is shown in Figure 1. All recurrent neural networks have the form of a chain of repeating modules of neural network. In standard RNNs, this duplicate module has only one very simple structure, such as a single layer. However, LSTM avoids long-term dependency problems through special design. It usually uses a structure called a 'gate' to remove or increase the transmission of information.

    Figure 1.  The specific structure of a node of LSTM.

    In 2014, Karpathy [22] proposed a Char-RNN model, allowing machines to generate text from the dimension of characters. In other words, the model computes the probability of the next character based on the observed ones. In this paper, we devise a Char-RNN model based on LSTM to deal with long-distance dependency problems, Figure 2 shows the execution process of the model.

    Figure 2.  The principle of Char-RNN.

    The Chinese pop music lyrics follow certain formats. After analyzing a large number of them, we found that most of them follow the following three structures: (1) A1 + B, A2 + B, (2) A1 + A2 + A3, (3) A1 + A2 + B1 + B2, where each letter with or without a number represents a lyric component consisting of 3 to 5 lines. Figure 3 shows an example of a classic 4-segment lyric.

    Figure 3.  A 4-segment lyric.

    A good Chinese pop lyric expresses strong emotions that are properly rhymed. To make Chinese pop lyrics rhyme, lyric writers would need to make sure that the pronunciations of the end words of each line rhyme. From the perspective of vocal music, Chinese syllables are divided into thirteen categories, which are called Thirteen-Rhymes [23]. The thirteen rhymes are classified according to the basic principles of the same or similar vowels. Table 1 shows the thirteen rhymes and the common Chinese characters for each rhyme. Figure 4 shows the content of the entire lyric "Deskmate of You", which is popular in mainland China. We can see that the rhyme of this lyric is Yi-Qi (pronunciations). In addition, a lyric may have more than one rhyme, and it is common to have three to five rhymes in a lyric.

    Table 1.  Thirteen rhymes.
    Rhymes Vowels Characters Music
    Fa-Hua a, ia, ua 巴、麻、花、沙 《绒花》
    Suo-Bo o, e, uo 波、多、朵、烁 《我爱你中国》
    Ye-Xie ie, ue, üe 街、谐、月、夜 《娄山关》
    Gu-Su u 出、珠、福、图 《闪光的珍珠》
    Yi-Qi i, ü, er 溪、雨、曲、句 《同桌的你》
    Huai-Lai ai, uai 白、海、爱、来 《四季歌》
    Hui-Dui ei, ui, uei 飞、灰、梅、泪 《大森林的早晨》
    Yao-Tiao ao, iao 高、烧、苗、笑 《绣荷包》
    You-Qiu ou, iu, iou 沟、球、舟、柳 《蝶恋花》
    Yan-Qian an, ian, uan, üan 帆、天、旋、唤 《黄河颂》
    Ren-Chen en, in, un, ün 春、纷、新、云 《兰花花》
    Jiang-Yang ang, iang, uang 芳、霜、香、长 《松花江上》
    Zhong-Dong eng, ing, ueng, ong 风、星 《故乡是北京》

     | Show Table
    DownLoad: CSV
    Figure 4.  Yi-Qi rhyme.

    Information hiding starts when the lyric generator produces a vector Y on the input vector X. We denote the output vector by $Y = y_{1}, y_{2}, \ldots, y_{3}$, where N is the length of input and output sequences. Moreover, $y_{i(i = 1, 2, \ldots, N-1)}$ is equal to ${{x}_{i}}_{(i = 2, 3, \ldots, N)}$; in other words, $Y _{N} $ is obtained from $ y_{i(i = 1, 2, ..., N-1)} $ with the highest probability and the model generates next y based on $y _{i(i = 2, 3, ..., N)} $. Here $Y _{N} $ could be a character or word. Thus, to hide secret information, we will filter out candidate characters or words on selected positions, code them, and select one of the most suitable candidates in accord with the secret information.

    There are three steps: (1) Set parameters. (2) Generate candidates for the next character (or word). (3) Select the most suitable candidate. The whole process of information hiding is shown in Figure 5. In Step 1, we set the following four parameters:

    Figure 5.  The process of the proposed steganography method.

    Structure. This was the underlying structure for the lyric to be generated, which was described in Section 2.2.

    Initialline. It preheats the generator and helps to generate the first few characters, but it is not part of the final lyrics.

    Information. This is a binary stream converted from the secret information, which is hidden, transformed and extracted.

    Size. It is the size of a candidate pool, from which we choose the most probable candidates. It is obvious that is an important factor of the embedding capacity. The larger Size is, the more secret information can be embedded.

    In Step 2, the lyric generator produces $Y _{N} $ = ($p _{1} $, $p _{2} $, ..., $p _{Size} $) based on ($y _{1} $, $y _{2} $, ..., $y _{N-1} $), where $p _{i = 1, 2, ..., Size} $ are the probability of Size candidates.

    Step 3 is the most critical part of our lyric-steganography method. For each $Y _{N} $, we first predict all the possibilities of the next characters based on the previous information. We then select m most likely characters as candidates, where m = Size. We encode these m characters (such as Huffman code). Finally, we choose the most suitable character to hide the secret information. In addition, it should be pointed out that if $Y _{N} $ is space, we need to judge whether the length of the sentence has reached the minimum requirement. If it is, then the sentence is finished. Otherwise, we need to change the order of the candidates so that lines do not end too early.

    In order to improve the quality of generated lyrics, we applied lyrics structures and rhythm table to experiments, which mentioned above, and propose the Word-RNN model. Then, two results are showed, which are generated by two different models respectively. Finally, we illustrate the extraction method of secret information.

    As described in Section 2.2, most Chinese pop lyrics follow three common structures. Thus, we introduce three structure templates to regulate the lyric generations. Taking Structure 3 as an example, we may generate four-verse lyrics with four sentences in each verse. It is common for a line in a verse to contain about 8 to 15 characters. To standardize the structure, it is crucial to control the number of characters per line. Therefore, in the process of creating lyrics, we will make a judgment on the number of characters in each line. If the number of characters has not reached the limit, no space will be generated. If the number of words exceeds the maximum, start a new line.

    In addition, as mentioned in the Section 2.3, the ending character in each line should have proper rhyme. Therefore, during the generation process, we first determine whether the character to be generated is the ending character of the line. If it is, then we need to select the m characters with the highest probability from all the results, and these m characters rhyme properly. We then use the same method in Section 3.1 to choose the most suitable character for $Y _{N} $. If it were not the ending character, then we will choose m highest probable characters directly from all probability as the candidates.

    Directly choosing the most suitable character may incur a severe problem, that is, the chosen character may not have a reasonable meaning with adjacent characters. Thus, the quality of lyric will decrease sharply. To overcome this problem, we improve the Char-RNN model to design a Word-RNN model, which have the same structure as Char-RNN. The only difference is that the smallest unit in the training and generation stage is a word instead of a character. Figure 6 shows the principle of Word-RNN.

    Figure 6.  The pinciple of Word-RNN.

    We present an example to show how to hide the secret information in the process of lyric generations. First, we set the parameters as follows:

    Initial Line:我们手牵手(Your hands in my hands).

    Size: 4 (the size of candidate pool).

    Structure: Classical-16 (that is, four verses with four lines in each verse).

    Information: 100111111100001101.... (converted from '信息隐藏').

    At the beginning, we choose a model from Char-RNN and Word-RNN (here we use Char-RNN as example). Then, the initial line will be fed to preheat the model and converted into $x _{i} $.

    For the first y, we select the most probable top-4 characters as candidates. We then encode the characters using Huffman code (shown in Table 2, Col. 1). When the beginning of the information is 10, then '你' is chosen as the first character.

    Table 2.  The candidates pool.
    Bits Char1 Char2 Char3 Char4 Char5 Char6 Char7 Char8 Char9
    00 space space
    01 space 留(歇)
    10
    11

     | Show Table
    DownLoad: CSV

    To make the ending characters of lines rhyme, we note that the bits of '01' represent character '歇' (shown in Table 2). However, this character does not sound well with the You-Qiu rhyme of the existing lines. Thus, we replace it with another character that rhyme better. Also, it should be noted that the space character in Table 2 is used as the separator between two lines, which can also be used to hide information.

    After a lyric embedded with secret information is generated, the sender may send the lyric to the receiver. Meanwhile, the file about candidate pool should be sent together. When the receivers obtain the lyric, they can extract the binary stream converted from secret information according to the candidate pool. In other words, it is impossible to extract secret information without the file of candidate pool. Thus, the file of candidate pool plays an important role in the process of information extraction, because only the legitimate recipients can get the file and extract the secret information.

    In this section, we first illustrate the construction of dataset and how to set the value for each initial parameter. Then, we present two results, which are generated by Char-RNN and Word-RNN respectively. Finally, the performance evaluations are given.

    We need a large number of high-quality lyrics to train a satisfactory model. Unfortunately, no Chinese pop lyrics data has been published by any authoritative organization. To obtain training data, we use the Scrapy crawler framework to collect a total of 15,000 Chinese pop lyrics from music websites, including 100 Chinese male singers, 100 Chinese female singers, 100 Chinese bands, and 50 popular songs of each singer. Removing all-English songs and duplicates, we finally obtained a dataset of about 13,500 Chinese pop lyrics.

    In the training process, we count all the Chinese characters in the lyric data, and construct a dictionary, to be shared by both inputs and outputs. At the same time, we count the number of Chinese characters as the length of One-Hot Encoding. Finally, we train our model using tensorflow.

    For the Word-RNN model, we use the same methods, parameters, and optimization algorithm as the Char-RNN model. The only difference is that we first carry out word segmentation of the lyric data, expressing each song in terms of phrases. Namely, in the One-Hot Encoding, each position now represents a word, instead of a character.

    Figure 7 depicts two Chinese pop lyrics generated by the proposed method with steganography, where (a) is a lyric generated by Char-RNN and the (b) is a lyric generated by Word-RNN.

    Figure 7.  Two examples of results: (a) Char-RNN, (b) Word-RNN.

    According to their literal meanings, we can consider that Lyric (a) praises the beauty of love, and Lyric (b) describes sorrow of love. Through the analysis of lyrics, we can find that the lyrics generated by Char-RNN model contain repetitive characters (in red) and broken lines, while the lyrics generated by the Word-RNN model do not have these problems.

    We evaluate the proposed steganography method from two important aspects: embedding capacity and security.

    Embedding capacity is a significant measure to evaluate a steganogaphy methods, which represents how much information can hide in a stego-text. Previous steganography methods based on text generations either have low embedding capacities or do not look natural. For example, the poetry-based methods not only generate a poor naturalness genre, but also have lower embedding capacity than the proposed method. The high embedding capacity of the proposed method stems from longer length of lyrics, and we can hide information at each char-position or word-position. Similarly, we can conclude that char-based methods have higher embedding capacities than word-based methods when the generated lyrics length are the same. The embedding capacity calculation formula of two methods are as follows:

    $ E C_{1}=\left(\sum\limits_{i=1}^{n u m} C_{i}+n u m-1\right) * \log _{2} S i z e$ (4.1)
    $ E C_{2}=\left(\sum\limits_{i=1}^{n u m} W_{i}+n u m-1\right) * \log _{2} S i z e$ (4.2)

    Where $EC _{1} $ represents the embedding capacity of a lyric generated by Char-RNN, num is the number of lines, $C _{i} $ is the number of characters in each line, and Size is the number of candidates. Likewise, $EC _{2} $ represents the embedding capacity of a lyric generated by Word-RNN method, where $W _{i} $ is the number of words in each line.

    Figure 8 depicts the comparison results of embedding capacities among different methods, where the value of the embedding capacity is the number of characters embedded in the text carriers. It is easy to see that the proposed methods in this paper have higher embedding capacities than Poem-based steganography method and Ci-based steganography method, and with increase of Size, the capacity will be much higher than these two methods.

    Figure 8.  The comparisons of embedding capacities.

    Security refers to the invisibility and imperceptibility of secret information, and it is one of the important measurements to evaluate a steganography method.

    In modern society, people usually communicate with vernacular. Although poetry is an important achievement in the development of ancient Chinese literature, it is not practical in daily communication in modern society. Therefore, steganography based on poetry generation maybe easily arouses suspicion in the process of text carrier dissemination. Modern popular lyrics have higher naturalness, which means that the lyric text embedded with secret information will not arouses suspicion in the transmission process, thus the security is higher than steganography method based on poetry.

    As shown in the Table 3, the results are generated by previous methods, which are embedded with secret information. Obviously, compared with the two results, the lyrics generated by the proposed method are easier to understand and has higher naturalness. Moreover, the proposed method is based on lyrics generation, which does not modify the text carrier like traditional text steganography methods, so it can effectively resist the detection of traditional steganalysis algorithms. Besides, our method is not based on text format, so it could resist the format-based attacks and steganalysis.

    Table 3.  The results of previous methods.
    Tang Poetry Song Ci
    风窗烟树中, 不知多少, 洞天谁道在, 一笑樽前.
    柔静雨光斑. 底事今年春事早, 回首当日三贤.
    夜里吹生下, 几度春风, 西风明月, 千里倍潸然.
    归人乱浪宽. 断肠风月, 少年无限当年.

     | Show Table
    DownLoad: CSV

    We presented a novel method that uses recurrent neural networks to generate the Chinese pop lyrics, and in the process of generation, we successfully embedded the secret information into the lyrics. We first used Char-RNN to predict the probabilities of the possible next characters based on the observed data. We then selected the most suitable character according to the secret information and added the character to the observed sequence, in order to continue to predict and generate. Directly generating lyrics based on secret information, it is likely that the generated characters can not be combined into words. We improved the Char-RNN model and developed the Word-RNN model, using words as units to train the model. Through experimental comparisons, we found that the proposed method offers higher hiding capacity and can generate more natural text, compared with the previous methods. In the future, we will improve our method to generate lyrics of better quality and clearer theme, with higher embedding capacity and better security and robustness.

    This work was partially supported by National Natural Science Foundation of China (No. 61872134, 61502242), Natural Science Foundation of Hunan Province (No. 2018JJ2062, 2018JJ2301), and National Key Research and Development Program (2017YFC1703306), and Hunan Provincial 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property (2017TP1025).

    The authors declare no conflict of interest.

    [1] FAO W (2001) Health and nutritional properties of probiotics in food including powder milk with live lactic acid bacteria Report of a Joint FAO/WHO Expert Consultation on Evaluation of Health and Nutritional Properties of Probiotics in Food Including Powder Milk with Live Lactic Acid Bacteria: 1–34.
    [2] Kailasapathy K (2002) Microencapsulation of probiotic bacteria: technology and potential applications. Curr Issues Intest Microbiol 3: 39–34.
    [3] Tripathi MK, Giri SK (2014) Probiotic functional foods: survival of probiotics during processing and storage. J Funct Foods 9: 225–24. doi: 10.1016/j.jff.2014.04.030
    [4] Verna EC, Lucak S (2010) Use of probiotics in gastrointestinal disorders: what to recommend? Therap Adv Gastroenterol 3: 307–319. doi: 10.1177/1756283X10373814
    [5] Fuller R (1991) Probiotics in human medicine. Gut 32: 439–442. doi: 10.1136/gut.32.4.439
    [6] Gupta S, Abu-Ghannam N (2012) Probiotic fermentation of plant based products: possibilities and opportunities. Crit Rev Food Sci Nutr 52: 183–199. doi: 10.1080/10408398.2010.499779
    [7] Lavermicocca P, Valerio F, Lonigro SL, et al. (2005) Study of adhesion and survival of lactobacilli and bifidobacteria on table olives with the aim of formulating a new probiotic food. Appl Environ Microbiol 71: 4233–4240. doi: 10.1128/AEM.71.8.4233-4240.2005
    [8] Ying D, Schwander S, Weerakkody R, et al. (2013) Microencapsulated lactobacillus rhamnosus gg in whey protein and resistant starch matrices: probiotic survival in fruit juice. J Funct Foods 5: 98–105. doi: 10.1016/j.jff.2012.08.009
    [9] Ranadheera CS, Evans CA, Adams MC, et al. (2013) Production of probiotic ice cream from goat's milk and effect of packaging materials on product quality. Small Ruminant Res 112: 174–180. doi: 10.1016/j.smallrumres.2012.12.020
    [10] López de Lacey AM, Pérez-Santín E, López-Caballero ME, et al. (2014) Survival and metabolic activity of probiotic bacteria in green tea. Food Sci Technol 55: 314–322.
    [11] González-Sánchez F, Azaola A, Gutiérrez-López GF, et al. (2010) Viability of microencapsulated bifidobacterium animalis ssp. lactis bb12 in kefir during refrigerated storage. Int J Dairy Technol 63: 431–436.
    [12] Noorbakhsh R, Yaghmaee P, Durance T (2013) Radiant energy under vacuum (rev) technology: a novel approach for producing probiotic enriched apple snacks. J Funct Foods 5: 1049–1056. doi: 10.1016/j.jff.2013.02.011
    [13] Sheehan VM, Ross P, Fitzgerald GF (2007) Assessing the acid tolerance and the technological robustness of probiotic cultures for fortification in fruit juices. Innov Food Sci Emerg Technol 8: 279–284. doi: 10.1016/j.ifset.2007.01.007
    [14] Nualkaekul S, Cook MT, Khutoryanskiy VV, et al. (2013) Influence of encapsulation and coating materials on the survival of lactobacillus plantarum and bifidobacterium longum in fruit juices. Food Res Int 53: 304–311. doi: 10.1016/j.foodres.2013.04.019
    [15] Mestry AP, Mujumdar AS, Thorat BN (2011) Optimization of spray drying of an innovative functional food: fermented mixed juice of carrot and watermelon. Dry Technol 29: 1121–1131. doi: 10.1080/07373937.2011.566968
    [16] Alegre I, Viñas I, Usall J, et al. (2011) Microbiological and physicochemical quality of fresh-cut apple enriched with the probiotic strain lactobacillus rhamnosus gg. Food Microbiol 28: 59–66. doi: 10.1016/j.fm.2010.08.006
    [17] Rößle C, Auty MA, Brunton N, et al. (2010) Evaluation of fresh-cut apple slices enriched with probiotic bacteria. Innov Food Sci Emerg Technol 11: 203–209. doi: 10.1016/j.ifset.2009.08.016
    [18] Possemiers S, Marzorati M, Verstraete W, et al. (2010) Bacteria and chocolate: a successful combination for probiotic delivery. Int J Food Microbiol 141: 97–103. doi: 10.1016/j.ijfoodmicro.2010.03.008
    [19] Roopashri AN, Varadaraj MC (2014) Hydrolysis of flatulence causing oligosaccharides by α-d-galactosidase of a probiotic lactobacillus plantarum mtcc 5422 in selected legume flours and elaboration of probiotic attributes in soy-based fermented product. Eur Food Res Technol 239: 99–115. doi: 10.1007/s00217-014-2207-y
    [20] Hugo AA, Pérez PF, Añón MC, et al. (2014) Incorporation of lactobacillus delbrueckii subsp lactis (cidca 133) in cold-set gels made from high pressure-treated soybean proteins. Food Hydrocolloid 37: 34–39. doi: 10.1016/j.foodhyd.2013.10.025
    [21] Agheyisi R (2014) The probiotics market: ingredients, supplements, foods. BCC Research Food, Beverage Report: 1–25.
    [22] Del Piano M, Carmagnola S, Andorno S, et al. (2010) Evaluation of the intestinal colonization by microencapsulated probiotic bacteria in comparison with the same uncoated strains. J Clin Gastroenterol 44 Suppl 1: S42–6.
    [23] Piano MD, Carmagnola S, Ballarè M, et al. (2012) Comparison of the kinetics of intestinal colonization by associating 5 probiotic bacteria assumed either in a microencapsulated or in a traditional, uncoated form. J Clin Gastroenterol 46 Suppl: S85–92.
    [24] Heidebach T, Först P, Kulozik U (2012) Microencapsulation of probiotic cells for food applications. Crit Rev Food Sci Nutr 52: 291–311. doi: 10.1080/10408398.2010.499801
    [25] Cook MT, Tzortzis G, Charalampopoulos D, et al. (2012) Microencapsulation of probiotics for gastrointestinal delivery. J Control Release 162: 56–67. doi: 10.1016/j.jconrel.2012.06.003
    [26] Rodrigues D, Sousa S, Rocha-Santos T, et al. (2011) Influence of l-cysteine, oxygen and relative humidity upon survival throughout storage of probiotic bacteria in whey protein-based microcapsules. Int Dairy J 21: 869–876. doi: 10.1016/j.idairyj.2011.05.005
    [27] Teixeira PC, Castro MH, Malcata FX, et al. (1995) Survival of lactobacillus-delbrueckii ssp. bulgaricus following spray-drying. J Dairy Sci 78: 1025–1031.
    [28] Oxley J (2014) Overview of microencapsulation process technologies, In: Gaonkar AG, Vasisht N, Khare AR, Sobel R (Eds.), Microencapsulation in the food industry, 1 Eds., San Diego: Elsevier, 35–46.
    [29] Burgain J, Gaiani C, Linder M, et al. (2011) Encapsulation of probiotic living cells: from laboratory scale to industrial applications. J Food Eng 104: 467–483. doi: 10.1016/j.jfoodeng.2010.12.031
    [30] Gbassi GK, Vandamme T (2012) Probiotic encapsulation technology: from microencapsulation to release into the gut. Pharmaceutics 4: 149–163. doi: 10.3390/pharmaceutics4010149
    [31] Riaz QUA, Masud T (2013) Recent trends and applications of encapsulating materials for probiotic stability. Crit Rev Food Sci Nutr 53: 231–244. doi: 10.1080/10408398.2010.524953
    [32] Krasaekoopt W, Bhandari B, Deeth H (2003) Evaluation of encapsulation techniques of probiotics for yoghurt. Int Dairy J 13: 3–13.
    [33] Vidhyalakshmi R, Bhakyaraj R, Subhasree RS (2009) Encapsulation "the future of probiotics"-a review. Adv Biol Res 3: 96–103.
    [34] Poncelet D, Dulieu C, Jacquot M (2001) Description of the immobilisation procedures, In: Wijffels RH (Ed.), Immobilized cells, 1 Eds., Heidelbert: Springer, 15–30
    [35] Okuro PK, Junior FE, Favaro-Trindade CS (2013) Technological challenges for spray chilling encapsulation of functional food ingredients. Food Technol Biotechnol : 1–12.
    [36] Pinto SS, Fritzen-Freire CB, Muñoz IB, et al. (2012) Effects of the addition of microencapsulated bifidobacterium bb-12 on the properties of frozen yogurt. J Food Eng 111: 563–569.
    [37] Ying D, Sun J, Sanguansri L, et al. (2012) Enhanced survival of spray-dried microencapsulated lactobacillus rhamnosus gg in the presence of glucose. J Food Eng 109: 597–602. doi: 10.1016/j.jfoodeng.2011.10.017
    [38] Chávez BE, Ledeboer AM (2007) Drying of probiotics: optimization of formulation and process to enhance storage survival. Dry Technol 25: 1193–1201. doi: 10.1080/07373930701438576
    [39] Cheow WS, Kiew TY, Hadinoto K (2014) Controlled release of lactobacillus rhamnosus biofilm probiotics from alginate-locust bean gum microcapsules. Carbohydr Polym 103: 587–595. doi: 10.1016/j.carbpol.2014.01.036
    [40] Behboudi-Jobbehdar S, Soukoulis C, Yonekura L, et al. (2013) Optimization of spray-drying process conditions for the production of maximally viable microencapsulated l. acidophilusncimb 701748 Dry Technol 31: 1274–1283. doi: 10.1080/07373937.2013.788509
    [41] De Castro-Cislaghi FP, Silva CD, Fritzen-Freire CB, et al. (2012) Bifidobacterium bb-12 microencapsulated by spray drying with whey: survival under simulated gastrointestinal conditions, tolerance to nacl, and viability during storage. J Food Eng 113: 186–193. doi: 10.1016/j.jfoodeng.2012.06.006
    [42] Estevinho BN, Rocha F, Santos L, et al. (2013) Microencapsulation with chitosan by spray drying for industry applications – a review. Trends Food Sci Tech 31: 138–155. doi: 10.1016/j.tifs.2013.04.001
    [43] Yonekura L, Sun H, Soukoulis C, et al. (2014) Microencapsulation of lactobacillus acidophilus ncimb 701748 in matrices containing soluble fibre by spray drying: technological characterization, storage stability and survival after in vitro digestion. J Funct Foods 6: 205–214. doi: 10.1016/j.jff.2013.10.008
    [44] Pedroso DL, Dogenski M, Thomazini M, et al. (2014) Microencapsulation of bifidobacterium animalis subsp. lactis and lactobacillus acidophilus in cocoa butter using spray chilling technology. Braz J Microbiol 15: 1–7.
    [45] Okuro PK, Thomazini M, Balieiro JC, et al. (2013) Co- encapsulation of lactobacillus acidophilus with inulin or polydextrose in solid lipid microparticles provides protection and improves stability. Food Res Int 53: 96–103. doi: 10.1016/j.foodres.2013.03.042
    [46] Gouin S (2004) Micro-encapsulation: industrial appraisal of existing technologies and trends. Trends Food Sci Technol 15: 330–347. doi: 10.1016/j.tifs.2003.10.005
    [47] Lahtinen SJ, Ouwehand AC, Salminen SJ, et al. (2007) Effect of starch- and lipid-based encapsulation on the culturability of two bifidobacterium longum strains. Lett Appl Microbiol 44: 500–505. doi: 10.1111/j.1472-765X.2007.02110.x
    [48] Dianawati D, Mishra V, Shah NP (2013) Survival of bifidobacterium longum 1941 microencapsulated with proteins and sugars after freezing and freeze drying. Food Res Int 51: 503–509. doi: 10.1016/j.foodres.2013.01.022
    [49] Shoji AS, Oliveira AC, Balieiro JC, et al. (2013) Viability of l. acidophilus microcapsules and their application to buffalo milk yoghurt. Food Bioprod Process 91: 83–88.
    [50] Mantzouridou F, Spanou A, Kiosseoglou V (2012) An inulin-based dressing emulsion as a potential probiotic food carrier. Food Res Int 46: 260–269. doi: 10.1016/j.foodres.2011.12.016
    [51] Muthukumarasamy P, Allan-Wojtas P, Holley RA (2006) Stability of lactobacillus reuteri in different types of microcapsules. J Food Sci : 1–5.
    [52] Amine KM, Champagne C, Raymond Y, et al. (2014) Survival of microencapsulated bifidobacterium longum in cheddar cheese during production and storage. Food Control 37: 193–199. doi: 10.1016/j.foodcont.2013.09.030
    [53] López de Lacey AM, López-Caballero ME, Gómez-Estaca J, et al. (2012) Functionality of lactobacillus acidophilus and bifidobacterium bifidum incorporated to edible coatings and films. Innov Food Sci Emerg Technol 16: 277–282. doi: 10.1016/j.ifset.2012.07.001
    [54] Sathyabama S, Ranjith kumar M, Bruntha devi P, et al. (2014) Co-encapsulation of probiotics with prebiotics on alginate matrix and its effect on viability in simulated gastric environment. LWT - Food Science and Technology 57: 419–425. doi: 10.1016/j.lwt.2013.12.024
    [55] Doherty SB, Auty MA, Stanton C, et al. (2012) Survival of entrapped lactobacillus rhamnosus gg in whey protein micro-beads during simulated ex vivo gastro-intestinal transit. Int Dairy J 22: 31–43. doi: 10.1016/j.idairyj.2011.06.009
    [56] Jiménez-Pranteda ML, Poncelet D, Náder-Macías ME, et al. (2012) Stability of lactobacilli encapsulated in various microbial polymers. J Biosci Bioeng 113: 179–184. doi: 10.1016/j.jbiosc.2011.10.010
    [57] Brachkova MI, Duarte MA, Pinto JF (2010) Preservation of viability and antibacterial activity of lactobacillus spp. in calcium alginate beads. Eur J Pharm Sci 41: 589–596. doi: 10.1016/j.ejps.2010.08.008
    [58] Khan NH, Korber DR, Low NH, et al. (2013) Development of extrusion-based legume protein isolate–alginate capsules for the protection and delivery of the acid sensitive probiotic, bifidobacterium adolescentis. Food Res Int 54: 730–737. doi: 10.1016/j.foodres.2013.08.017
    [59] Chavarri M, Maranon I, Carmen M (2012) Encapsulation technology to protect probiotic bacteria, In: Rigobelo E (Ed.), Probiotics, 1 Eds, Brazil: Intech, 501–539.
    [60] Baker CG, McKenzie KA (2005) Energy consumption of industrial spray dryers. Dry Technol 23: 365–386. doi: 10.1081/DRT-200047665
    [61] Rodríguez-Huezo ME, Durán-Lugo R, Prado-Barragán LA, et al. (2007) Pre-selection of protective colloids for enhanced viability of bifidobacterium bifidum following spray-drying and storage, and evaluation of aguamiel as thermoprotective prebiotic. Food Res Int 40: 1299–1306. doi: 10.1016/j.foodres.2007.09.001
    [62] Corcoran BM, Ross RP, Fitzgerald GF, et al. (2004) Comparative survival of probiotic lactobacilli spray-dried in the presence of prebiotic substances. J Appl Microbiol 96: 1024–1039. doi: 10.1111/j.1365-2672.2004.02219.x
    [63] Conrad PB, Miller DP, Cielenski PR, et al. (2000) Stabilization and preservation of lactobacillus acidophilus in saccharide matrices. Cryobiology 41: 17–24. doi: 10.1006/cryo.2000.2260
    [64] Selmer-Olsen E, Sorhaug T, Birkeland S, et al. (1999) Survival of lactobacillus helveticus entrapped in ca-alginate inrelation to water content, storage and rehydration. J Ind Microbiol Biot 23: 1–7.
    [65] Dong Q, Chen M, Xin Y, et al. (2013) Alginate-based and protein-based materials for probiotics encapsulation: a review. Int J Food Sci Technol 48: 1339–1351. doi: 10.1111/ijfs.12078
    [66] Ananta E, Birkeland S, Corcoran B, et al. (2004) Processing effects on the nutritional advancement of probiotics and prebiotics. Microb Ecol Health D 16: 113–124. doi: 10.1080/08910600410032277
    [67] Simpson PJ, Stanton C, Fitzgerald GF, et al. (2005) Intrinsic tolerance of bifidobacterium species to heat and oxygen and survival following spray drying and storage. J Appl Microbiol 99: 493–501. doi: 10.1111/j.1365-2672.2005.02648.x
    [68] Ananta E, Volkert M, Knorr D (2005) Cellular injuries and storage stability of spray-dried lactobacillus rhamnosus gg. Int Dairy J 15: 399–409. doi: 10.1016/j.idairyj.2004.08.004
    [69] Wang Y, Yu R, Chou C (2004) Viability of lactic acid bacteria and bifidobacteria in fermented soymilk after drying, subsequent rehydration and storage. Int J Food Microbiol 93: 209–217. doi: 10.1016/j.ijfoodmicro.2003.12.001
    [70] Champagne C, Gardner N, Brochu E, et al. (1991) The freeze-drying of lactic acid bacteria. a review. Canadian Institute of Food Science and Technology : 1–11.
    [71] De Vos P, Faas MM, Spasojevic M, et al. (2010) Encapsulation for preservation of functionality and targeted delivery of bioactive food components. Int Dairy J 20: 292–302. doi: 10.1016/j.idairyj.2009.11.008
    [72] Rutherford WM, Allen JE, Schlameus HW, et al. (1994) Process for preparing rotary disc fatty acid microspheres of microorganisms. United States Patent 5,292,657.
    [73] Seo JK, Kim S, Kim M, et al. (2010) Direct-fed microbials for ruminant animals. Asian-Aust J Anim Sci 23: 1657–67. doi: 10.5713/ajas.2010.r.08
    [74] European Food Safety Authority (EFSA) (2012) Scientific opinion on the efficacy of bactocell (pediococcus acidilactici) when used as a feed additive for fish. EFSA Journal 10: 2886. doi: 10.2903/j.efsa.2012.2886
    [75] Harel M, Kohari-Beck K (2007) A delivery vehicle for probiotic bacteria comprising a dry matrix of polysaccharides, saccharides and polyols in a glass form and methods of making same. WO 2007079147 A2.
    [76] Nguyen HT, Razafindralambo H, Blecker C, et al. (2014) Stochastic exposure to sub-lethal high temperature enhances exopolysaccharides (eps) excretion and improves bifidobacterium bifidum cell survival to freeze–drying. Biochem Eng J 88: 85–94. doi: 10.1016/j.bej.2014.04.005
    [77] Basholli-Salihu M, Mueller M, Salar-Behzadi S, et al. (2014) Effect of lyoprotectants on β-glucosidase activity and viability of bifidobacterium infantis after freeze-drying and storage in milk and low ph juices. Food Sci Technol 57: 276–282.
    [78] Champagne CP, Fustier P (2007) Microencapsulation for the improved delivery of bioactive compounds into foods. Curr Opin Biotechnol 18: 184–190. doi: 10.1016/j.copbio.2007.03.001
    [79] Schell D, Beermann C (2014) Fluidized bed microencapsulation of lactobacillus reuteri with sweet whey and shellac for improved acid resistance and in-vitro gastro-intestinal surviva. Food Res Int 62: 308–314. doi: 10.1016/j.foodres.2014.03.016
    [80] Semyonov D, Ramon O, Kovacs A, et al. (2012) Air-suspension fluidized-bed microencapsulation of probiotics. Dry Technol 30: 1918–1930. doi: 10.1080/07373937.2012.708692
    [81] Bensch G, Rüger M, Wassermann M, et al. (2014) Flow cytometric viability assessment of lactic acid bacteria starter cultures produced by fluidized bed drying. Appl Microbiol Biot 98: 4897–4909. doi: 10.1007/s00253-014-5592-z
    [82] Champagne C, Raymond Y, Tompkins TA (2010) The determination of viable counts in probiotic cultures microencapsulated by spray-coating. Food Microbiol 27: 1104–1111. doi: 10.1016/j.fm.2010.07.017
    [83] Wu WH, Roe WS, Gimino VG, et al. (2000) Low melt encapsulation with high laurate canola oil. United States Patent 61,532,36 A.
    [84] Ubbink JB, Schaer-Zammaretti P, Cavadini C (2012) Probiotic delivery system. United States Application 2005/0,153,018 A1.
    [85] Durand H, Panes J (2001) Particles coated with a homogeneous, hydrophobic protective layer for use in pharmaceuticals, dietic or feed compositions, comprise agglomerates of microorganisms. WO200168808-A1.
    [86] Beck NT, Franch G, Geneau DL (2002) Edible emulsion comprising live micro-organisms and dressings or side sauces comprising said edible emulsion. WO 2002030211 A1.
    [87] Vos H, Poortinga AT (2010) Double emulsion and method to produce such. WO 2010039036 A1.
    [88] Mazer T, Kessler T (2014) Methods for extruding powered nutritional products using a high shear element. WO 2014093832 A1.
    [89] Frenken LG, Hammarstroem LG, Ledeboer AM (2007) Food products comprising probiotic micro-organisms and antibodies. WO 2007019901 A1.
    [90] Gregoriadis G, Antimisiaris SG, Gursel I (2001) Liposomes containing particulate materials. US 6451338 B1.
    [91] Gerez CL, Font de Valdez G, Gigante ML, et al. (2012) Whey protein coating bead improves the survival of the probiotic lactobacillus rhamnosus crl 1505 to low ph. Lett Appl Microbiol 54: 552–556. doi: 10.1111/j.1472-765X.2012.03247.x
    [92] Agüeros BM, Esparza CI, Gamazo DL, et al. (2014) Microparticles for encapsulating probiotics, production and uses thereof. WO 2014006261 A2.
    [93] Bhushani JA, Anandharamakrishnan C (2014) Electrospinning and electrospraying techniques: potential food based applications. Trends Food Sci Technol 38 : 21–33.
    [94] Borges S, Barbosa J, Camilo R, et al. (2011) Effects of encapsulation on the viability of probiotic strains exposed to lethal conditions. Int J Food Sci Technol 47: 416–421.
    [95] Paques J, van der Linden E, van Rijn CJM, et al. (2013) Alginate submicron beads prepared through w/o emulsion and gelation with cacl2 nanoparticles. Food Hydrocolloid 31: 428–434. doi: 10.1016/j.foodhyd.2012.11.012
    [96] Laelorspoen N, Wongsasulak S, Yoovidhya T, et al. (2014) Microencapsulation of lactobacillus acidophilus in zein–alginate core–shell microcapsules via electrospraying. J Funct Foods 7: 342–349. doi: 10.1016/j.jff.2014.01.026
    [97] De Prisco A, Maresca D, Ongeng D, et al. (2015) Microencapsulation by vibrating technology of the probiotic strain lactobacillus reuteri dsm 17938 to enhance its survival in foods and in gastrointestinal environment. LWT-Food Sci Technol 61: 452–62.
    [98] Graff S, Hussain S, Chaumeil J, et al. (2008) Increased intestinal delivery of viable saccharomyces boulardii by encapsulation in microspheres. Pharm Res 25: 1290–1296. doi: 10.1007/s11095-007-9528-5
    [99] Alisch G, Brauneis E, Pirstadt B, et al. (1995) Process and plant for the production of spherical alginate pellets. US 5,472,648.
    [100] Van LBH (2001) Encapsulation of sensitive components into a matrix to obtain discrete shelf-stable particles. WO 2001025414.
    [101] Asada M, Hatano Y, Kamaguchi R, et al. (2003) Capsules containing vital cells or tissues. WO 2003001927 A1.
    [102] Doherty S, Brodkorb A (2010) Production of microbeads e.g. used in vehicle for the delivering active agent to lower intestine of subject by providing suspension of denatured whey protein and active component, and treating suspension to generate microbeads. WO2010119041 A2.
    [103] Shah NP (1999) Probiotic bacteria: selective enumeration and survival in dairy foods. J Dairy Sci : 894–907.
    [104] Rokka S, Rantamäki P (2010) Protecting probiotic bacteria by microencapsulation: challenges for industrial applications. Eur Food Res Technol 231: 1–12. doi: 10.1007/s00217-010-1246-2
    [105] Foster JA, McVey Neufeld K (2013) Gut-brain axis: how the microbiome influences anxiety and depression. Trends Neurosci 36: 305–312. doi: 10.1016/j.tins.2013.01.005
  • This article has been cited by:

    1. Dengyong Zhang, Haixin Tong, Feng Li, Lingyun Xiang, Xiangling Ding, An Ultra-Short-Term Electrical Load Forecasting Method Based on Temperature-Factor-Weight and LSTM Model, 2020, 13, 1996-1073, 4875, 10.3390/en13184875
    2. Lingyun Xiang, Shuanghui Yang, Yuhang Liu, Qian Li, Chengzhang Zhu, Novel Linguistic Steganography Based on Character-Level Text Generation, 2020, 8, 2227-7390, 1558, 10.3390/math8091558
    3. Nan Pan, Jiaohua Qin, Yun Tan, Xuyu Xiang, Guimin Hou, A video coverless information hiding algorithm based on semantic segmentation, 2020, 2020, 1687-5281, 10.1186/s13640-020-00512-8
    4. Yun Tan, Jiaohua Qin, Xuyu Xiang, Chunhu Zhang, Zhangdong Wang, Beijing Chen, Coverless Steganography Based on Motion Analysis of Video, 2021, 2021, 1939-0122, 1, 10.1155/2021/5554058
    5. Peng Liu, Songbin Li, Qiandong Yan, Jingang Wang, Cheng Zhang, General Steganalysis Method of Compressed Speech Under Different Standards, 2021, 68, 1546-2226, 1565, 10.32604/cmc.2021.016635
    6. Merve Varol Arısoy, LZW-CIE: a high-capacity linguistic steganography based on LZW char index encoding, 2022, 34, 0941-0643, 19117, 10.1007/s00521-022-07499-5
    7. Youssef Mourdi, Mohammed Sadgal, Hasna Elalaoui Elabdallaoui, Hamada El Kabtane, Hanane Allioui, A recurrent neural networks based framework for at‐risk learners' early prediction and MOOC tutor's decision support, 2023, 31, 1061-3773, 270, 10.1002/cae.22582
    8. Cuilin Wang, Yuling Liu, Yongju Tong, Jingwen Wang, GAN-GLS: Generative Lyric Steganography Based on Generative Adversarial Networks, 2021, 69, 1546-2226, 1375, 10.32604/cmc.2021.017950
    9. Qiong Jia, Ying Zhu, Rui Xu, Yubin Zhang, Yihua Zhao, Making the hospital smart: using a deep long short-term memory model to predict hospital performance metrics, 2022, 122, 0263-5577, 2151, 10.1108/IMDS-12-2021-0769
    10. Rui Yu, Wenpeng Lu, Huimin Lu, Shoujin Wang, Fangfang Li, Xu Zhang, Jiguo Yu, Sentence pair modeling based on semantic feature map for human interaction with IoT devices, 2021, 12, 1868-8071, 3081, 10.1007/s13042-021-01349-x
    11. Noura A. Mawla, Hussein K. Khafaji, Roberto Natella, Protein Motifs to Hide GA-Based Encrypted Data, 2022, 2022, 1875-919X, 1, 10.1155/2022/1846788
    12. Emır Öztürk, Andaç Şahın Mesut, Özlem Aydin Fıdan, A Character Based Steganography Using Masked Language Modeling, 2024, 12, 2169-3536, 14248, 10.1109/ACCESS.2024.3354710
    13. Aarthi Dhandapani, N. Ilakiyaselvan, Satyaki Mandal, Sandipta Bhadra, V. Viswanathan, 2023, Chapter 24, 978-981-99-1050-2, 371, 10.1007/978-981-99-1051-9_24
    14. M. V. Namitha, G. R. Manjula, Manjula C. Belavagi, StegAbb: A Cover-Generating Text Steganographic Tool Using GPT-3 Language Modeling for Covert Communication Across SDRs, 2024, 12, 2169-3536, 82057, 10.1109/ACCESS.2024.3411288
    15. Lingling Tan, Junkai Yi, Expert System for Extracting Hidden Information from Electronic Documents during Outgoing Control, 2024, 13, 2079-9292, 2924, 10.3390/electronics13152924
  • Reader Comments
  • © 2016 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(20015) PDF downloads(3062) Cited by(71)

Figures and Tables

Figures(2)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog