These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

292 related articles for article (PubMed ID: 23695310)

  • 21. Optical image conversion and encryption based on structured light illumination and a diffractive neural network.
    Su Y; Xu K; Rong W; Wang Z; Xue R; Xue L; Cai Z; Wan W
    Appl Opt; 2023 Aug; 62(23):6131-6139. PubMed ID: 37707080
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Phase retrieval encryption in an enhanced optical interference by key phase constraint.
    Shi X; Chen Z; Zhao D; Mao H; Chen L
    Appl Opt; 2015 Apr; 54(11):3197-203. PubMed ID: 25967303
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Binary image encryption based on interference of two phase-only masks.
    Jia W; Wen FJ; Chow YT; Zhou C
    Appl Opt; 2012 Jul; 51(21):5253-8. PubMed ID: 22858969
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Optical image hiding with silhouette removal based on the optical interference principle.
    Wang X; Zhao D
    Appl Opt; 2012 Feb; 51(6):686-91. PubMed ID: 22358156
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Hybrid plaintext attack for a cryptosystem based on interference and the phase-retrieval technique.
    Xiong Y; Gu J; Kumar R
    Appl Opt; 2023 Jun; 62(16):4301-4309. PubMed ID: 37706921
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation.
    Zhang C; He W; Wu J; Peng X
    Opt Express; 2015 Apr; 23(7):8845-54. PubMed ID: 25968722
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Jan; 58(3):695-703. PubMed ID: 30694257
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Optical stream-cipher-like system for image encryption based on Michelson interferometer.
    Yang B; Liu Z; Wang B; Zhang Y; Liu S
    Opt Express; 2011 Jan; 19(3):2634-42. PubMed ID: 21369084
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Security enhanced optical encryption system by random phase key and permutation key.
    He M; Tan Q; Cao L; He Q; Jin G
    Opt Express; 2009 Dec; 17(25):22462-73. PubMed ID: 20052170
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Security analysis of phase-only DRPE based on known-plaintext attack using multiple known plaintext-ciphertext pairs.
    Nakano K; Takeda M; Suzuki H; Yamaguchi M
    Appl Opt; 2014 Oct; 53(28):6435-43. PubMed ID: 25322230
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems.
    Guo C; Liu S; Sheridan JT
    Appl Opt; 2015 May; 54(15):4709-19. PubMed ID: 26192505
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation.
    Jiao S; Li G; Zhou C; Zou W; Li X
    J Opt Soc Am A Opt Image Sci Vis; 2018 Jan; 35(1):A1-A6. PubMed ID: 29328078
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Optical multi-image encryption based on focal length multiplexing and multimode phase retrieval.
    He X; Jiang Z; Kong Y; Wang S; Liu C
    Appl Opt; 2020 Sep; 59(26):7801-7812. PubMed ID: 32976450
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain.
    Liansheng S; Bei Z; Xiaojuan N; Ailing T
    Opt Express; 2016 Jan; 24(1):499-515. PubMed ID: 26832280
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Multiple-image optical encryption based on phase retrieval algorithm and fractional Talbot effect.
    Wu J; Wang J; Nie Y; Hu L
    Opt Express; 2019 Nov; 27(24):35096-35107. PubMed ID: 31878685
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Nonlinear optical security system based on a joint transform correlator in the Fresnel domain.
    Vilardy JM; Millán MS; Pérez-Cabré E
    Appl Opt; 2014 Mar; 53(8):1674-82. PubMed ID: 24663426
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Space-based optical image encryption.
    Chen W; Chen X
    Opt Express; 2010 Dec; 18(26):27095-104. PubMed ID: 21196985
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Jun; 52(18):4343-52. PubMed ID: 23842178
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Image encryption by encoding with a nonuniform optical beam in gyrator transform domains.
    Liu Z; Xu L; Lin C; Liu S
    Appl Opt; 2010 Oct; 49(29):5632-7. PubMed ID: 20935710
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 15.