These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
94 related articles for article (PubMed ID: 22410333)
1. Comment on "Cheating prevention in visual cryptography". Chen YC; Horng G; Tsai DS IEEE Trans Image Process; 2012 Jul; 21(7):3319-23. PubMed ID: 22410333 [TBL] [Abstract][Full Text] [Related]
2. Cheating prevention in visual cryptography. Hu CM; Tzeng WG IEEE Trans Image Process; 2007 Jan; 16(1):36-45. PubMed ID: 17283763 [TBL] [Abstract][Full Text] [Related]
3. Halftone visual cryptography. Zhou Z; Arce GR; Di Crescenzo G IEEE Trans Image Process; 2006 Aug; 15(8):2441-53. PubMed ID: 16900697 [TBL] [Abstract][Full Text] [Related]
4. Recovering DC coefficients in block-based DCT. Uehara T; Safavi-Naini R; Ogunbona P IEEE Trans Image Process; 2006 Nov; 15(11):3592-6. PubMed ID: 17076416 [TBL] [Abstract][Full Text] [Related]
5. Is image steganography natural? Martín A; Sapiro G; Seroussi G IEEE Trans Image Process; 2005 Dec; 14(12):2040-50. PubMed ID: 16370457 [TBL] [Abstract][Full Text] [Related]
6. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability. Lee CW; Tsai WH IEEE Trans Image Process; 2012 Jan; 21(1):207-18. PubMed ID: 21693424 [TBL] [Abstract][Full Text] [Related]
7. Secure authentication system that generates seed from biometric information. Kim Y; Ahn JH; Byun H Appl Opt; 2005 Feb; 44(5):735-41. PubMed ID: 15751854 [TBL] [Abstract][Full Text] [Related]
8. A joint signal processing and cryptographic approach to multimedia encryption. Mao Y; Wu M IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924 [TBL] [Abstract][Full Text] [Related]
9. Artifacts caused by simplicial subdivision. Carr H; Möller T; Snoeyink J IEEE Trans Vis Comput Graph; 2006; 12(2):231-42. PubMed ID: 16509382 [TBL] [Abstract][Full Text] [Related]
11. Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)]. Solak E; Cokal C Chaos; 2008 Sep; 18(3):038101. PubMed ID: 19045506 [TBL] [Abstract][Full Text] [Related]
12. Comments on "fundamental limits of reconstruction-based superresolution algorithms under local translation". Wang L; Feng J IEEE Trans Pattern Anal Mach Intell; 2006 May; 28(5):846; discussion 847. PubMed ID: 16640271 [TBL] [Abstract][Full Text] [Related]
13. Upsilon-quaternion splines for the smooth interpolation of orientations. Nielson GM IEEE Trans Vis Comput Graph; 2004; 10(2):224-9. PubMed ID: 15384647 [TBL] [Abstract][Full Text] [Related]
14. Real-time pattern matching using projection kernels. Hel-Or Y; Hel-Or H IEEE Trans Pattern Anal Mach Intell; 2005 Sep; 27(9):1430-45. PubMed ID: 16173186 [TBL] [Abstract][Full Text] [Related]
15. Isoperimetric graph partitioning for image segmentation. Grady L; Schwartz EL IEEE Trans Pattern Anal Mach Intell; 2006 Mar; 28(3):469-75. PubMed ID: 16526432 [TBL] [Abstract][Full Text] [Related]
16. Inpainting of binary images using the Cahn-Hilliard equation. Bertozzi AL; Esedoglu S; Gillette A IEEE Trans Image Process; 2007 Jan; 16(1):285-91. PubMed ID: 17283787 [TBL] [Abstract][Full Text] [Related]
17. Image authentication using distributed source coding. Lin YC; Varodayan D; Girod B IEEE Trans Image Process; 2012 Jan; 21(1):273-83. PubMed ID: 21609882 [TBL] [Abstract][Full Text] [Related]
18. A survey of visualization pipelines. Moreland K IEEE Trans Vis Comput Graph; 2013 Mar; 19(3):367-78. PubMed ID: 22665724 [TBL] [Abstract][Full Text] [Related]