These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

193 related articles for article (PubMed ID: 12653368)

  • 21. Security-enhanced optical voice encryption in various domains and comparative analysis.
    Rajput SK; Matoba O
    Appl Opt; 2019 Apr; 58(11):3013-3022. PubMed ID: 31044906
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis.
    Su Y; Xu W; Zhao J; Chen L; Tian X
    Appl Opt; 2020 Jan; 59(2):474-483. PubMed ID: 32225334
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Simultaneous transmission for an encrypted image and a double random-phase encryption key.
    Yuan S; Zhou X; Li DH; Zhou DF
    Appl Opt; 2007 Jun; 46(18):3747-53. PubMed ID: 17538671
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms.
    Chen L; Zhao D
    Opt Express; 2006 Sep; 14(19):8552-60. PubMed ID: 19529234
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Optical scanning cryptography for secure wireless transmission.
    Poon TC; Kim T; Doh K
    Appl Opt; 2003 Nov; 42(32):6496-503. PubMed ID: 14650492
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Color image hiding based on the phase retrieval technique and Arnold transform.
    Shi X; Zhao D
    Appl Opt; 2011 May; 50(14):2134-9. PubMed ID: 21556114
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Lensless multiple-image optical encryption based on improved phase retrieval algorithm.
    Huang JJ; Hwang HE; Chen CY; Chen CM
    Appl Opt; 2012 May; 51(13):2388-94. PubMed ID: 22614416
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Optical interference-based multiple-image encryption using spherical wave illumination and gyrator transform.
    Abuturab MR
    Appl Opt; 2014 Oct; 53(29):6719-28. PubMed ID: 25322374
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Random fractional Fourier transform.
    Liu Z; Liu S
    Opt Lett; 2007 Aug; 32(15):2088-90. PubMed ID: 17671545
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Fractional fourier domain encrypted holographic memory by use of an anamorphic optical system.
    Unnikrishnan G; Joseph J; Singh K
    Appl Opt; 2001 Jan; 40(2):299-306. PubMed ID: 18357002
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Optoelectronic information encryption with phase-shifting interferometry.
    Tajahuerce E; Matoba O; Verrall SC; Javidi B
    Appl Opt; 2000 May; 39(14):2313-20. PubMed ID: 18345139
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm.
    Rajput SK; Nishchal NK
    Appl Opt; 2014 Jan; 53(3):418-25. PubMed ID: 24514127
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Encrypted optical storage with wavelength-key and random phase codes.
    Matoba O; Javidi B
    Appl Opt; 1999 Nov; 38(32):6785-90. PubMed ID: 18324218
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Role of phase key in the double random phase encoding technique: an error analysis.
    Monaghan DS; Situ G; Gopinathan U; Naughton TJ; Sheridan JT
    Appl Opt; 2008 Jul; 47(21):3808-16. PubMed ID: 18641750
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Key-space analysis of double random phase encryption technique.
    Monaghan DS; Gopinathan U; Naughton TJ; Sheridan JT
    Appl Opt; 2007 Sep; 46(26):6641-7. PubMed ID: 17846658
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Encrypted optical memory system using three-dimensional keys in the Fresnel domain.
    Matoba O; Javidi B
    Opt Lett; 1999 Jun; 24(11):762-4. PubMed ID: 18073847
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Asymmetric double-image encryption based on chaotic random phase encoding.
    Su Y; Xue X; Deng R; Wang Y; Zhao Q; Li T; Li Y; Liu S; Zhao J
    Appl Opt; 2022 Sep; 61(26):7608-7617. PubMed ID: 36256360
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform.
    Wang X; Chen Y; Dai C; Zhao D
    Appl Opt; 2014 Jan; 53(2):208-13. PubMed ID: 24514051
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics.
    Wang X; Zhao D; Jing F; Wei X
    Opt Express; 2006 Feb; 14(4):1476-86. PubMed ID: 19503472
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 10.