These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 15981515)

  • 41. Time-variant signal encryption by lensless dual random phase encoding applied to fiber optic links.
    Cuadrado-Laborde C
    Opt Lett; 2007 Oct; 32(19):2867-9. PubMed ID: 17909600
    [TBL] [Abstract][Full Text] [Related]  

  • 42. A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency.
    Motomura R; Imaizumi S; Kiya H
    J Imaging; 2021 Dec; 7(12):. PubMed ID: 34940735
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Optical scanning cryptography for secure wireless transmission.
    Poon TC; Kim T; Doh K
    Appl Opt; 2003 Nov; 42(32):6496-503. PubMed ID: 14650492
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Compressive optical image encryption.
    Li J; Sheng Li J; Yang Pan Y; Li R
    Sci Rep; 2015 May; 5():10374. PubMed ID: 25992946
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Color image security system using double random-structured phase encoding in gyrator transform domain.
    Abuturab MR
    Appl Opt; 2012 May; 51(15):3006-16. PubMed ID: 22614604
    [TBL] [Abstract][Full Text] [Related]  

  • 46. All-optical encrypted movie.
    Mosso F; Barrera JF; Tebaldi M; Bolognini N; Torroba R
    Opt Express; 2011 Mar; 19(6):5706-12. PubMed ID: 21445211
    [TBL] [Abstract][Full Text] [Related]  

  • 47. Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram.
    Xi S; Wang X; Song L; Zhu Z; Zhu B; Huang S; Yu N; Wang H
    Opt Express; 2017 Apr; 25(7):8212-8222. PubMed ID: 28380936
    [TBL] [Abstract][Full Text] [Related]  

  • 48. Introducing secure modes of operation for optical encryption.
    Naughton TJ; Hennelly BM; Dowling T
    J Opt Soc Am A Opt Image Sci Vis; 2008 Oct; 25(10):2608-17. PubMed ID: 18830339
    [TBL] [Abstract][Full Text] [Related]  

  • 49. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Jun; 52(18):4343-52. PubMed ID: 23842178
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Practical image encryption and decryption by phase-coding technique for optical security systems.
    Ohtsubo J; Fujimoto A
    Appl Opt; 2002 Aug; 41(23):4848-55. PubMed ID: 12197652
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain.
    Wang Q; Guo Q; Zhou J
    Appl Opt; 2013 Dec; 52(36):8854-63. PubMed ID: 24513953
    [TBL] [Abstract][Full Text] [Related]  

  • 52. High-Capacity Reversible Data Hiding in Encrypted Images with Flexible Restoration.
    Arai E; Imaizumi S
    J Imaging; 2022 Jun; 8(7):. PubMed ID: 35877620
    [TBL] [Abstract][Full Text] [Related]  

  • 53. Shift-tolerance property of an optical double-random phase-encoding encryption system.
    Wang B; Sun CC; Su WC; Chiou AE
    Appl Opt; 2000 Sep; 39(26):4788-93. PubMed ID: 18350070
    [TBL] [Abstract][Full Text] [Related]  

  • 54. An optical encryption and authentication scheme using asymmetric keys.
    Rajput SK; Nishchal NK
    J Opt Soc Am A Opt Image Sci Vis; 2014 Jun; 31(6):1233-8. PubMed ID: 24977361
    [TBL] [Abstract][Full Text] [Related]  

  • 55. Secure optical storage that uses fully phase encryption.
    Tan X; Matoba O; Shimura T; Kuroda K; Javidi B
    Appl Opt; 2000 Dec; 39(35):6689-94. PubMed ID: 18354683
    [TBL] [Abstract][Full Text] [Related]  

  • 56. Encrypted optical memory system using three-dimensional keys in the Fresnel domain.
    Matoba O; Javidi B
    Opt Lett; 1999 Jun; 24(11):762-4. PubMed ID: 18073847
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Multiple-image hiding by information prechoosing.
    Shi Y; Situ G; Zhang J
    Opt Lett; 2008 Mar; 33(6):542-4. PubMed ID: 18347703
    [TBL] [Abstract][Full Text] [Related]  

  • 58. Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging.
    Yi F; Jeoung Y; Moon I
    Appl Opt; 2017 May; 56(15):4381-4387. PubMed ID: 29047866
    [TBL] [Abstract][Full Text] [Related]  

  • 59. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

  • 60. Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding.
    Mehra I; Nishchal NK
    Opt Express; 2014 Mar; 22(5):5474-82. PubMed ID: 24663888
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.