These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

172 related articles for article (PubMed ID: 15700530)

  • 1. Lossless generalized-lSB data embedding.
    Celik MU; Sharma G; Tekalp AM; Saber E
    IEEE Trans Image Process; 2005 Feb; 14(2):253-66. PubMed ID: 15700530
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Lossless watermarking for image authentication: a new framework and an implementation.
    Celik MU; Sharma G; Tekalp AM
    IEEE Trans Image Process; 2006 Apr; 15(4):1042-9. PubMed ID: 16579388
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A novel high-capacity data-embedding system.
    Lan TH; Tewfik AH
    IEEE Trans Image Process; 2006 Aug; 15(8):2431-40. PubMed ID: 16900696
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Expansion embedding techniques for reversible watermarking.
    Thodi DM; Rodríguez JJ
    IEEE Trans Image Process; 2007 Mar; 16(3):721-30. PubMed ID: 17357732
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Watermarking polygonal lines using Fourier descriptors.
    Solachidis V; Pitas I
    IEEE Comput Graph Appl; 2004; 24(3):44-51. PubMed ID: 15628072
    [No Abstract]   [Full Text] [Related]  

  • 6. Applying informed coding and embedding to design a robust high-capacity watermark.
    Miller ML; Doërr GJ; Cox IJ
    IEEE Trans Image Process; 2004 Jun; 13(6):792-807. PubMed ID: 15648870
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain.
    Wang Y; Pearmain A
    IEEE Trans Image Process; 2006 Jun; 15(6):1536-43. PubMed ID: 16764278
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Perceptually lossless medical image coding.
    Wu D; Tan DM; Baird M; DeCampo J; White C; Wu HR
    IEEE Trans Med Imaging; 2006 Mar; 25(3):335-44. PubMed ID: 16524089
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A comment on "Asymptotically optimal detection for additive watermarking in the DCT AND DWT domains".
    Nadarajah S; Kotz S
    IEEE Trans Image Process; 2007 Apr; 16(4):1182-3. PubMed ID: 17405447
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Generic lossless visible watermarking--a new approach.
    Liu TY; Tsai WH
    IEEE Trans Image Process; 2010 May; 19(5):1224-35. PubMed ID: 20089476
    [TBL] [Abstract][Full Text] [Related]  

  • 11. High-capacity data hiding in halftone images using minimal-error bit searching and least-mean square filter.
    Pei SC; Guo JM
    IEEE Trans Image Process; 2006 Jun; 15(6):1665-79. PubMed ID: 16764290
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Multiscale fragile watermarking based on the Gaussian mixture model.
    Yuan H; Zhang XP
    IEEE Trans Image Process; 2006 Oct; 15(10):3189-200. PubMed ID: 17022280
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Ergodic chaotic parameter modulation with application to digital image watermarking.
    Chen S; Leung H
    IEEE Trans Image Process; 2005 Oct; 14(10):1590-602. PubMed ID: 16238064
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An optimal detector structure for the fourier descriptors domain watermarking of 2D vector graphics.
    Doncel VR; Nikolaidis N; Pitas I
    IEEE Trans Vis Comput Graph; 2007; 13(5):851-63. PubMed ID: 17622672
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A new approach to image copy detection based on extended feature sets.
    Hsiao JH; Chen CS; Chien LF; Chen MS
    IEEE Trans Image Process; 2007 Aug; 16(8):2069-79. PubMed ID: 17688212
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Robust image watermarking based on multiband wavelets and empirical mode decomposition.
    Bi N; Sun Q; Huang D; Yang Z; Huang J
    IEEE Trans Image Process; 2007 Aug; 16(8):1956-66. PubMed ID: 17688201
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Optimal signature design for spread-spectrum steganography.
    Gkizeli M; Pados DA; Medley MJ
    IEEE Trans Image Process; 2007 Feb; 16(2):391-405. PubMed ID: 17269633
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Halftone visual cryptography.
    Zhou Z; Arce GR; Di Crescenzo G
    IEEE Trans Image Process; 2006 Aug; 15(8):2441-53. PubMed ID: 16900697
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting.
    Zhao HV; Wu M; Wang ZJ; Liu KJ
    IEEE Trans Image Process; 2005 May; 14(5):646-61. PubMed ID: 15887559
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Watermarking mesh-based representations of 3-D objects using local moments.
    Bors AG
    IEEE Trans Image Process; 2006 Mar; 15(3):687-701. PubMed ID: 16519355
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.