These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
255 related articles for article (PubMed ID: 16830924)
1. A joint signal processing and cryptographic approach to multimedia encryption. Mao Y; Wu M IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924 [TBL] [Abstract][Full Text] [Related]
2. Recovering DC coefficients in block-based DCT. Uehara T; Safavi-Naini R; Ogunbona P IEEE Trans Image Process; 2006 Nov; 15(11):3592-6. PubMed ID: 17076416 [TBL] [Abstract][Full Text] [Related]
3. Fingerprint multicast in secure video streaming. Zhao HV; Liu KJ IEEE Trans Image Process; 2006 Jan; 15(1):12-29. PubMed ID: 16435533 [TBL] [Abstract][Full Text] [Related]
4. Security enhanced optical encryption system by random phase key and permutation key. He M; Tan Q; Cao L; He Q; Jin G Opt Express; 2009 Dec; 17(25):22462-73. PubMed ID: 20052170 [TBL] [Abstract][Full Text] [Related]
5. Fingerprinting protocol for images based on additive homomorphic property. Kuribayashi M; Tanaka H IEEE Trans Image Process; 2005 Dec; 14(12):2129-39. PubMed ID: 16370465 [TBL] [Abstract][Full Text] [Related]
6. A cross-layer diversity technique for multicarrier OFDM multimedia networks. Chan YS; Cosman PC; Milstein LB IEEE Trans Image Process; 2006 Apr; 15(4):833-47. PubMed ID: 16579372 [TBL] [Abstract][Full Text] [Related]
7. Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)]. Solak E; Cokal C Chaos; 2008 Sep; 18(3):038101. PubMed ID: 19045506 [TBL] [Abstract][Full Text] [Related]
8. Progressive quantized projection approach to data hiding. Alghoniemy M; Tewfik AH IEEE Trans Image Process; 2006 Feb; 15(2):459-72. PubMed ID: 16479816 [TBL] [Abstract][Full Text] [Related]
9. On the security of a new image encryption scheme based on chaotic map lattices. Arroyo D; Rhouma R; Alvarez G; Li S; Fernandez V Chaos; 2008 Sep; 18(3):033112. PubMed ID: 19045450 [TBL] [Abstract][Full Text] [Related]
10. Power optimization of wireless media systems with space-time block codes. Yousefi'zadeh H; Jafarkhani H; Moshfeghi M IEEE Trans Image Process; 2004 Jul; 13(7):873-84. PubMed ID: 15648855 [TBL] [Abstract][Full Text] [Related]
11. A cryptologic based trust center for medical images. Wong ST J Am Med Inform Assoc; 1996; 3(6):410-21. PubMed ID: 8930857 [TBL] [Abstract][Full Text] [Related]
13. Comment on "Cheating prevention in visual cryptography". Chen YC; Horng G; Tsai DS IEEE Trans Image Process; 2012 Jul; 21(7):3319-23. PubMed ID: 22410333 [TBL] [Abstract][Full Text] [Related]
14. Fast and efficient method for computing ART. Hwang SK; Kim WY IEEE Trans Image Process; 2006 Jan; 15(1):112-7. PubMed ID: 16435542 [TBL] [Abstract][Full Text] [Related]
15. Comments on "optimal erasure protection for scalably compressed video streams with limited retransmission". Dumitrescu S IEEE Trans Image Process; 2009 Jan; 18(1):214-6. PubMed ID: 19095531 [TBL] [Abstract][Full Text] [Related]
16. Secure public cloud platform for medical images sharing. Pan W; Coatrieux G; Bouslimi D; Prigent N Stud Health Technol Inform; 2015; 210():251-5. PubMed ID: 25991144 [TBL] [Abstract][Full Text] [Related]
17. Optimized transmission of JPEG2000 streams over wireless channels. Thomos N; Boulgouris NV; Strintzis MG IEEE Trans Image Process; 2006 Jan; 15(1):54-67. PubMed ID: 16435536 [TBL] [Abstract][Full Text] [Related]
19. Tile-boundary artifact reduction using odd tile size and the low-pass first convention. Wei J; Pickering MR; Frater MR; Arnold JF; Boman JA; Zeng W IEEE Trans Image Process; 2005 Aug; 14(8):1033-42. PubMed ID: 16121452 [TBL] [Abstract][Full Text] [Related]
20. An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators. Premkumar R; Mahdal M; Elangovan M Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298400 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]