These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

94 related articles for article (PubMed ID: 22410333)

  • 1. Comment on "Cheating prevention in visual cryptography".
    Chen YC; Horng G; Tsai DS
    IEEE Trans Image Process; 2012 Jul; 21(7):3319-23. PubMed ID: 22410333
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cheating prevention in visual cryptography.
    Hu CM; Tzeng WG
    IEEE Trans Image Process; 2007 Jan; 16(1):36-45. PubMed ID: 17283763
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Halftone visual cryptography.
    Zhou Z; Arce GR; Di Crescenzo G
    IEEE Trans Image Process; 2006 Aug; 15(8):2441-53. PubMed ID: 16900697
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Recovering DC coefficients in block-based DCT.
    Uehara T; Safavi-Naini R; Ogunbona P
    IEEE Trans Image Process; 2006 Nov; 15(11):3592-6. PubMed ID: 17076416
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Is image steganography natural?
    Martín A; Sapiro G; Seroussi G
    IEEE Trans Image Process; 2005 Dec; 14(12):2040-50. PubMed ID: 16370457
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability.
    Lee CW; Tsai WH
    IEEE Trans Image Process; 2012 Jan; 21(1):207-18. PubMed ID: 21693424
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Secure authentication system that generates seed from biometric information.
    Kim Y; Ahn JH; Byun H
    Appl Opt; 2005 Feb; 44(5):735-41. PubMed ID: 15751854
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A joint signal processing and cryptographic approach to multimedia encryption.
    Mao Y; Wu M
    IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Artifacts caused by simplicial subdivision.
    Carr H; Möller T; Snoeyink J
    IEEE Trans Vis Comput Graph; 2006; 12(2):231-42. PubMed ID: 16509382
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise.
    Wu B; Wang Z; Shastri BJ; Chang MP; Frost NA; Prucnal PR
    Opt Express; 2014 Jan; 22(1):954-61. PubMed ID: 24515055
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)].
    Solak E; Cokal C
    Chaos; 2008 Sep; 18(3):038101. PubMed ID: 19045506
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Comments on "fundamental limits of reconstruction-based superresolution algorithms under local translation".
    Wang L; Feng J
    IEEE Trans Pattern Anal Mach Intell; 2006 May; 28(5):846; discussion 847. PubMed ID: 16640271
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Upsilon-quaternion splines for the smooth interpolation of orientations.
    Nielson GM
    IEEE Trans Vis Comput Graph; 2004; 10(2):224-9. PubMed ID: 15384647
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Real-time pattern matching using projection kernels.
    Hel-Or Y; Hel-Or H
    IEEE Trans Pattern Anal Mach Intell; 2005 Sep; 27(9):1430-45. PubMed ID: 16173186
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Isoperimetric graph partitioning for image segmentation.
    Grady L; Schwartz EL
    IEEE Trans Pattern Anal Mach Intell; 2006 Mar; 28(3):469-75. PubMed ID: 16526432
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Inpainting of binary images using the Cahn-Hilliard equation.
    Bertozzi AL; Esedoglu S; Gillette A
    IEEE Trans Image Process; 2007 Jan; 16(1):285-91. PubMed ID: 17283787
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Image authentication using distributed source coding.
    Lin YC; Varodayan D; Girod B
    IEEE Trans Image Process; 2012 Jan; 21(1):273-83. PubMed ID: 21609882
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A survey of visualization pipelines.
    Moreland K
    IEEE Trans Vis Comput Graph; 2013 Mar; 19(3):367-78. PubMed ID: 22665724
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Morphological image compositing.
    Soille P
    IEEE Trans Pattern Anal Mach Intell; 2006 May; 28(5):673-83. PubMed ID: 16640255
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Fingerprinting protocol for images based on additive homomorphic property.
    Kuribayashi M; Tanaka H
    IEEE Trans Image Process; 2005 Dec; 14(12):2129-39. PubMed ID: 16370465
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.