These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

145 related articles for article (PubMed ID: 24109934)

  • 1. Steganography-based access control to medical data hidden in electrocardiogram.
    Mai V; Khalil I; Ibaida A
    Annu Int Conf IEEE Eng Med Biol Soc; 2013; 2013():1302-5. PubMed ID: 24109934
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Preserving privacy of online digital physiological signals using blind and reversible steganography.
    Shiu HJ; Lin BS; Huang CH; Chiang PY; Chiang PY; Lei CL
    Comput Methods Programs Biomed; 2017 Nov; 151():159-170. PubMed ID: 28946998
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Effective Electrocardiogram Steganography Based on Coefficient Alignment.
    Yang CY; Wang WF
    J Med Syst; 2016 Mar; 40(3):66. PubMed ID: 26711443
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care.
    Abuadbba A; Khalil I
    IEEE Trans Biomed Eng; 2017 Sep; 64(9):2186-2195. PubMed ID: 27913318
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A novel fuzzy logic-based image steganography method to ensure medical data security.
    Karakış R; Güler I; Çapraz I; Bilir E
    Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System.
    Ming Y; Zhang T
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30340411
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Image steganography without embedding by carrier secret information for secure communication in networks.
    Zhang Y; Chen Y; Dou H; Tan C; Luo Y; Sang H
    PLoS One; 2024; 19(9):e0308265. PubMed ID: 39240910
    [TBL] [Abstract][Full Text] [Related]  

  • 8. High capacity reversible data hiding in MP3 based on Huffman table transformation.
    Tan DW; Lu YL; Yan XH; Liu LT; Li LL
    Math Biosci Eng; 2019 Apr; 16(4):3183-3194. PubMed ID: 31137257
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review.
    Mohsin AH; Zaidan AA; Zaidan BB; Ariffin SAB; Albahri OS; Albahri AS; Alsalem MA; Mohammed KI; Hashim M
    J Med Syst; 2018 Oct; 42(12):245. PubMed ID: 30374820
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Integrated Approach Using Chaotic Map & Sample Value Difference Method for Electrocardiogram Steganography and OFDM Based Secured Patient Information Transmission.
    Pandey A; Saini BS; Singh B; Sood N
    J Med Syst; 2017 Oct; 41(12):187. PubMed ID: 29043502
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
    Mantos PL; Maglogiannis I
    J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Distributed clinical data sharing via dynamic access-control policy transformation.
    Rezaeibagha F; Mu Y
    Int J Med Inform; 2016 May; 89():25-31. PubMed ID: 26980356
    [TBL] [Abstract][Full Text] [Related]  

  • 13. QR code based patient data protection in ECG steganography.
    Mathivanan P; Edward Jero S; Ramu P; Balaji Ganesh A
    Australas Phys Eng Sci Med; 2018 Dec; 41(4):1057-1068. PubMed ID: 30397899
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Privacy, security and access with sensitive health information.
    Croll P
    Stud Health Technol Inform; 2010; 151():167-75. PubMed ID: 20407159
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Vaccine for digital images against steganography.
    Li X; Wang Z
    Sci Rep; 2024 Sep; 14(1):21340. PubMed ID: 39266648
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Steganography in arrhythmic electrocardiogram signal.
    Edward Jero S; Ramu P; Ramakrishnan S
    Annu Int Conf IEEE Eng Med Biol Soc; 2015 Aug; 2015():1409-12. PubMed ID: 26736533
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security model for secure transmission of medical image data using steganography.
    Umeda T; Okawa A; Gomi T
    Stud Health Technol Inform; 2014; 202():311. PubMed ID: 25000079
    [No Abstract]   [Full Text] [Related]  

  • 18. Privacy preserving processing of genomic data: A survey.
    Akgün M; Bayrak AO; Ozer B; Sağıroğlu MŞ
    J Biomed Inform; 2015 Aug; 56():103-11. PubMed ID: 26056074
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Is image steganography natural?
    Martín A; Sapiro G; Seroussi G
    IEEE Trans Image Process; 2005 Dec; 14(12):2040-50. PubMed ID: 16370457
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.