BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

36 related articles for article (PubMed ID: 18267522)

  • 1. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors.
    Battikh D; El Assad S; Hoang TM; Bakhache B; Deforges O; Khalil M
    Entropy (Basel); 2019 Jul; 21(8):. PubMed ID: 33267462
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Distributed Steganography in PDF Files-Secrets Hidden in Modified Pages.
    Koptyra K; Ogiela MR
    Entropy (Basel); 2020 May; 22(6):. PubMed ID: 33286372
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Patient Data Hiding and Transmitting during COVID-19 for Telemedicine Application using Image Steganography.
    Sirisha BL; Ahamed SF; Aruna V
    Curr Med Imaging; 2024 May; ():. PubMed ID: 38798224
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Advancing DNA Steganography with Incorporation of Randomness.
    Cui M; Zhang Y
    Chembiochem; 2020 Sep; 21(17):2503-2511. PubMed ID: 32270906
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Creating Digital Watermarks in Bitmap Images Using Lagrange Interpolation and Bezier Curves.
    Yerimbetova A; Daiyrbayeva E; Merzlyakova E; Fionov A; Baisholan N; Turdalyuly M; Mukazhanov N; Turganbayev A
    J Imaging; 2023 Sep; 9(10):. PubMed ID: 37888313
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Direct Spread Spectrum Technology for Data Hiding in Audio.
    Kuznetsov A; Onikiychuk A; Peshkova O; Gancarczyk T; Warwas K; Ziubina R
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35590805
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Steganography in color images with random order of pixel selection and encrypted text message embedding.
    Kordov K; Zhelezov S
    PeerJ Comput Sci; 2021; 7():e380. PubMed ID: 33817027
    [TBL] [Abstract][Full Text] [Related]  

  • 9. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
    Duan X; Liu N; Gou M; Wang W; Qin C
    Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
    [TBL] [Abstract][Full Text] [Related]  

  • 10. ECG Monitoring Systems: Review, Architecture, Processes, and Key Challenges.
    Serhani MA; T El Kassabi H; Ismail H; Nujum Navaz A
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32213969
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
    Yang W; Wang S; Hu J; Ibrahim A; Zheng G; Macedo MJ; Johnstone MN; Valli C
    Sensors (Basel); 2019 Jul; 19(13):. PubMed ID: 31284592
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission.
    Edward Jero S; Ramu P; Ramakrishnan S
    J Med Syst; 2014 Oct; 38(10):132. PubMed ID: 25187409
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.
    Taleby Ahvanooey M; Li Q; Hou J; Rajput AR; Chen Y
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267069
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A high-capacity steganography scheme for JPEG2000 baseline system.
    Zhang L; Wang H; Wu R
    IEEE Trans Image Process; 2009 Aug; 18(8):1797-803. PubMed ID: 19398405
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Digital holography-based steganography.
    Hamam H
    Opt Lett; 2010 Dec; 35(24):4175-7. PubMed ID: 21165128
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An efficient and secure technique for image steganography using a hash function.
    Nezami ZI; Ali H; Asif M; Aljuaid H; Hamid I; Ali Z
    PeerJ Comput Sci; 2022; 8():e1157. PubMed ID: 36532801
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Double layer security using crypto-stego techniques: a comprehensive review.
    Jan A; Parah SA; Hussan M; Malik BA
    Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Spread spectrum image steganography.
    Marvel LM; Boncelet CR; Retter CT
    IEEE Trans Image Process; 1999; 8(8):1075-83. PubMed ID: 18267522
    [TBL] [Abstract][Full Text] [Related]  

  • 19.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 2.