BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

320 related articles for article (PubMed ID: 14650492)

  • 1. Optical scanning cryptography for secure wireless transmission.
    Poon TC; Kim T; Doh K
    Appl Opt; 2003 Nov; 42(32):6496-503. PubMed ID: 14650492
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Novel optical scanning cryptography using Fresnel telescope imaging.
    Yan A; Sun J; Hu Z; Zhang J; Liu L
    Opt Express; 2015 Jul; 23(14):18428-34. PubMed ID: 26191901
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Simultaneous transmission for an encrypted image and a double random-phase encryption key.
    Yuan S; Zhou X; Li DH; Zhou DF
    Appl Opt; 2007 Jun; 46(18):3747-53. PubMed ID: 17538671
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Optical retrieval of encrypted digital holograms for secure real-time display.
    Matoba O; Javidi B
    Opt Lett; 2002 Mar; 27(5):321-3. PubMed ID: 18007790
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm.
    Chang X; Li W; Yan A; Tsang PWM; Poon TC
    Sci Rep; 2022 May; 12(1):7722. PubMed ID: 35545658
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Optical cryptography with biometrics for multi-depth objects.
    Yan A; Wei Y; Hu Z; Zhang J; Tsang PWM; Poon TC
    Sci Rep; 2017 Oct; 7(1):12933. PubMed ID: 29021574
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Analytical Study of Hybrid Techniques for Image Encryption and Decryption.
    Chowdhary CL; Patel PV; Kathrotia KJ; Attique M; P K; Ijaz MF
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927714
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Complex entropy based encryption and decryption technique for securing medical images.
    Kumar V; Pathak V; Badal N; Pandey PS; Mishra R; Gupta SK
    Multimed Tools Appl; 2022; 81(26):37441-37459. PubMed ID: 35912061
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Practical image encryption and decryption by phase-coding technique for optical security systems.
    Ohtsubo J; Fujimoto A
    Appl Opt; 2002 Aug; 41(23):4848-55. PubMed ID: 12197652
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain.
    Wang Q; Guo Q; Zhou J
    Appl Opt; 2013 Dec; 52(36):8854-63. PubMed ID: 24513953
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Affine cryptosystem of double-random-phase encryption based on the fractional Fourier transform.
    Xin Z; Sheng Y; Sheng-wei W; Jian X
    Appl Opt; 2006 Nov; 45(33):8434-9. PubMed ID: 17086252
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm.
    Rajput SK; Nishchal NK
    Appl Opt; 2014 Jan; 53(3):418-25. PubMed ID: 24514127
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Key-space analysis of double random phase encryption technique.
    Monaghan DS; Gopinathan U; Naughton TJ; Sheridan JT
    Appl Opt; 2007 Sep; 46(26):6641-7. PubMed ID: 17846658
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Double-random-phase encryption with photon counting for image authentication using only the amplitude of the encrypted image.
    Wang Y; Markman A; Quan C; Javidi B
    J Opt Soc Am A Opt Image Sci Vis; 2016 Nov; 33(11):2158-2165. PubMed ID: 27857432
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Optical security and encryption with totally incoherent light.
    Tajahuerce E; Lancis J; Javidi B; Andrés P
    Opt Lett; 2001 May; 26(10):678-80. PubMed ID: 18040417
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Image encryption by encoding with a nonuniform optical beam in gyrator transform domains.
    Liu Z; Xu L; Lin C; Liu S
    Appl Opt; 2010 Oct; 49(29):5632-7. PubMed ID: 20935710
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram.
    Xi S; Wang X; Song L; Zhu Z; Zhu B; Huang S; Yu N; Wang H
    Opt Express; 2017 Apr; 25(7):8212-8222. PubMed ID: 28380936
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications.
    Yasser I; Mohamed MA; Samra AS; Khalifa F
    Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287021
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Optical image encryption with spatially incoherent illumination.
    Zang J; Xie Z; Zhang Y
    Opt Lett; 2013 Apr; 38(8):1289-91. PubMed ID: 23595461
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Communicating with noise: How chaos and noise combine to generate secure encryption keys.
    Minai AA; Pandian TD
    Chaos; 1998 Sep; 8(3):621-628. PubMed ID: 12779766
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 16.