These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

145 related articles for article (PubMed ID: 24109934)

  • 21. ECG Data Encryption Then Compression Using Singular Value Decomposition.
    Liu TY; Lin KJ; Wu HC
    IEEE J Biomed Health Inform; 2018 May; 22(3):707-713. PubMed ID: 28463208
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud.
    Shanmugapriya E; Kavitha R
    J Med Syst; 2019 Jul; 43(8):265. PubMed ID: 31273467
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Steganography for medical record image.
    Hua C; Wu Y; Shi Y; Hu M; Xie R; Zhai G; Zhang XP
    Comput Biol Med; 2023 Oct; 165():107344. PubMed ID: 37603961
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Embedding and retrieving private metadata in electrocardiograms.
    Kozat SS; Vlachos M; Lucchese C; Van Herle H; Yu PS
    J Med Syst; 2009 Aug; 33(4):241-59. PubMed ID: 19697691
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things.
    AlEisa HN
    J Healthc Eng; 2022; 2022():7528583. PubMed ID: 35571336
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review.
    Apau R; Asante M; Twum F; Ben Hayfron-Acquah J; Peasah KO
    PLoS One; 2024; 19(9):e0308807. PubMed ID: 39283894
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A new feature detection mechanism and its application in secured ECG transmission with noise masking.
    Sufi F; Khalil I
    J Med Syst; 2009 Apr; 33(2):121-32. PubMed ID: 19397097
    [TBL] [Abstract][Full Text] [Related]  

  • 29. An efficient steganography method for hiding patient confidential information.
    Al-Dmour H; Al-Ani A; Nguyen H
    Annu Int Conf IEEE Eng Med Biol Soc; 2014; 2014():222-5. PubMed ID: 25569937
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography.
    Adee R; Mouratidis H
    Sensors (Basel); 2022 Feb; 22(3):. PubMed ID: 35161853
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Improving the privacy of optical steganography with temporal phase masks.
    Wang Z; Fok MP; Xu L; Chang J; Prucnal PR
    Opt Express; 2010 Mar; 18(6):6079-88. PubMed ID: 20389629
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
    Ding K; Hu T; Niu W; Liu X; He J; Yin M; Zhang X
    Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36080965
    [TBL] [Abstract][Full Text] [Related]  

  • 33. A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.
    Abd-El-Atty B; Iliyasu AM; Alaskar H; Abd El-Latif AA
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486383
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Privacy and security for electronic health records.
    Sharpe VA
    Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
    [No Abstract]   [Full Text] [Related]  

  • 35. Enhancing privacy and authorization control scalability in the grid through ontologies.
    Blanquer I; Hernández V; Segrelles D; Torres E
    IEEE Trans Inf Technol Biomed; 2009 Jan; 13(1):16-24. PubMed ID: 19129020
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Cloud-assisted mobile-access of health data with privacy and auditability.
    Tong Y; Sun J; Chow SS; Li P
    IEEE J Biomed Health Inform; 2014 Mar; 18(2):419-29. PubMed ID: 24608047
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Privacy preserving probabilistic record linkage (P3RL): a novel method for linking existing health-related data and maintaining participant confidentiality.
    Schmidlin K; Clough-Gorr KM; Spoerri A;
    BMC Med Res Methodol; 2015 May; 15():46. PubMed ID: 26024886
    [TBL] [Abstract][Full Text] [Related]  

  • 38. PAX: Using Pseudonymization and Anonymization to Protect Patients' Identities and Data in the Healthcare System.
    Al-Zubaidie M; Zhang Z; Zhang J
    Int J Environ Res Public Health; 2019 Apr; 16(9):. PubMed ID: 31035551
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A morphologically robust chaotic map based approach to embed patient's confidential data securely in non-QRS regions of ECG signal.
    Soni N; Saini I; Singh B
    Australas Phys Eng Sci Med; 2019 Mar; 42(1):111-135. PubMed ID: 30617778
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A linkable identity privacy algorithm for HealthGrid.
    Zhang N; Rector A; Buchan I; Shi Q; Kalra D; Rogers J; Goble C; Walker S; Ingram D; Singleton P
    Stud Health Technol Inform; 2005; 112():234-45. PubMed ID: 15923732
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.