These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

180 related articles for article (PubMed ID: 22319371)

  • 21. Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation.
    Liang Z; Qin Q; Zhou C; Wang N; Xu Y; Zhou W
    PLoS One; 2021; 16(11):e0260014. PubMed ID: 34843485
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Chaos based crossover and mutation for securing DICOM image.
    Ravichandran D; Praveenkumar P; Balaguru Rayappan JB; Amirtharajan R
    Comput Biol Med; 2016 May; 72():170-84. PubMed ID: 27046666
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask.
    Xiong Y; He A; Quan C
    Appl Opt; 2018 Jul; 57(21):6010-6016. PubMed ID: 30118027
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Chaotic Visual Cryptosystem Using Empirical Mode Decomposition Algorithm for Clinical EEG Signals.
    Lin CF
    J Med Syst; 2016 Mar; 40(3):52. PubMed ID: 26645316
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Secure and lightweight network admission and transmission protocol for body sensor networks.
    He D; Chen C; Chan S; Bu J; Zhang P
    IEEE J Biomed Health Inform; 2013 May; 17(3):664-74. PubMed ID: 24592466
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Chaotic image encryption based on running-key related to plaintext.
    Guanghui C; Kai H; Yizhi Z; Jun Z; Xing Z
    ScientificWorldJournal; 2014; 2014():490179. PubMed ID: 24711727
    [TBL] [Abstract][Full Text] [Related]  

  • 27. A new spatiotemporally chaotic cryptosystem and its security and performance analyses.
    Lü H; Wang S; Li X; Tang G; Kuang J; Ye W; Hu G
    Chaos; 2004 Sep; 14(3):617-29. PubMed ID: 15446972
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Image Encryption Based on Hopfield Neural Network and Bidirectional Flipping.
    Zhang H; Yang S
    Comput Intell Neurosci; 2022; 2022():7941448. PubMed ID: 35186070
    [TBL] [Abstract][Full Text] [Related]  

  • 29. A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application.
    Shafique A; Mehmood A; Elhadef M; Khan KH
    PLoS One; 2022; 17(9):e0273661. PubMed ID: 36121821
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A novel and lightweight system to secure wireless medical sensor networks.
    He D; Chan S; Tang S
    IEEE J Biomed Health Inform; 2014 Jan; 18(1):316-26. PubMed ID: 24403430
    [TBL] [Abstract][Full Text] [Related]  

  • 31. An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators.
    Premkumar R; Mahdal M; Elangovan M
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298400
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors.
    Flores-Vergara A; Inzunza-González E; García-Guerrero EE; López-Bonilla OR; Rodríguez-Orozco E; Hernández-Ontiveros JM; Cárdenas-Valdez JR; Tlelo-Cuautle E
    Entropy (Basel); 2019 Mar; 21(3):. PubMed ID: 33266983
    [TBL] [Abstract][Full Text] [Related]  

  • 33. A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform.
    Fan C; Ding Q
    Entropy (Basel); 2018 Jun; 20(6):. PubMed ID: 33265535
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach.
    Chaudhary N; Shahi TB; Neupane A
    J Imaging; 2022 Jun; 8(6):. PubMed ID: 35735966
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Cryptanalysis and Improvement of a Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion.
    Lin CY; Wu JL
    Entropy (Basel); 2020 May; 22(5):. PubMed ID: 33286361
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm.
    Wu Z; Pan P; Sun C; Zhao B
    Entropy (Basel); 2021 Sep; 23(9):. PubMed ID: 34573784
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.
    Nam J; Choo KK; Han S; Kim M; Paik J; Won D
    PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359
    [TBL] [Abstract][Full Text] [Related]  

  • 38. A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System.
    Hanif M; Iqbal N; Ur Rahman F; Khan MA; Ghazal TM; Abbas S; Ahmad M; Al Hamadi H; Yeun CY
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016001
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database.
    Niu Y; Zhang X; Han F
    Comput Intell Neurosci; 2017; 2017():4079793. PubMed ID: 28392799
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Chaotic Image Encryption Algorithm Based on Bit Permutation and Dynamic DNA Encoding.
    Zhang X; Han F; Niu Y
    Comput Intell Neurosci; 2017; 2017():6919675. PubMed ID: 28912802
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.