BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

292 related articles for article (PubMed ID: 22193194)

  • 1. Security enhancement of a phase-truncation based image encryption algorithm.
    Wang X; Zhao D
    Appl Opt; 2011 Dec; 50(36):6645-51. PubMed ID: 22193194
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask.
    Xiong Y; He A; Quan C
    Appl Opt; 2018 Jul; 57(21):6010-6016. PubMed ID: 30118027
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Collision in double-image encryption scheme based on spatial encoding and phase-truncation Fourier transforms.
    Xiong Y; Gu J; Kumar R
    Appl Opt; 2023 Nov; 62(31):8416-8425. PubMed ID: 38037947
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Jan; 58(3):695-703. PubMed ID: 30694257
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Image encryption based on interference that uses fractional Fourier domain asymmetric keys.
    Rajput SK; Nishchal NK
    Appl Opt; 2012 Apr; 51(10):1446-52. PubMed ID: 22505061
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask.
    Wang X; Zhao D; Chen Y
    Appl Opt; 2014 Aug; 53(23):5100-8. PubMed ID: 25320917
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask.
    Rajput SK; Nishchal NK
    Appl Opt; 2012 Aug; 51(22):5377-86. PubMed ID: 22859025
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask.
    Wang X; Zhao D
    Opt Lett; 2013 Sep; 38(18):3684-6. PubMed ID: 24104846
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle.
    Wang X; Zhao D
    Appl Opt; 2013 Sep; 52(25):6170-8. PubMed ID: 24085074
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform.
    Wang X; Chen Y; Dai C; Zhao D
    Appl Opt; 2014 Jan; 53(2):208-13. PubMed ID: 24514051
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm.
    Liu W; Liu Z; Liu S
    Opt Lett; 2013 May; 38(10):1651-3. PubMed ID: 23938899
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Asymmetric cryptosystem based on phase-truncated Fourier transforms.
    Qin W; Peng X
    Opt Lett; 2010 Jan; 35(2):118-20. PubMed ID: 20081940
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Jun; 52(18):4343-52. PubMed ID: 23842178
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Triple-image encryption based on phase-truncated Fresnel transform and basic vector operation.
    Pan X; Meng X; Yang X; Wang Y; Peng X; He W; Dong G; Chen H
    Appl Opt; 2015 Oct; 54(28):8485-93. PubMed ID: 26479627
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Security analysis of a double-image encryption technique based on an asymmetric algorithm.
    Xiong Y; He A; Quan C
    J Opt Soc Am A Opt Image Sci Vis; 2018 Feb; 35(2):320-326. PubMed ID: 29400881
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Discussion on comparative analysis and a new attack on optical asymmetric cryptosystem.
    Fatima A; Nishchal NK
    J Opt Soc Am A Opt Image Sci Vis; 2016 Oct; 33(10):2034-2040. PubMed ID: 27828107
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps.
    Sui L; Duan K; Liang J; Hei X
    Opt Express; 2014 May; 22(9):10605-21. PubMed ID: 24921762
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Optical asymmetric cryptosystem for multi-image in cyan-magenta-yellow-black color space.
    Shen Y; Tang C; Zhou L; Lei Z
    Appl Opt; 2020 Mar; 59(7):1854-1863. PubMed ID: 32225701
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Apr; 58(12):3301-3309. PubMed ID: 31044810
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 15.