These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

123 related articles for article (PubMed ID: 24349165)

  • 1. A collusion-resistant fingerprinting system for restricted distribution of digital documents.
    Munoz-Hernandez MD; Garcia-Hernandez JJ; Morales-Sandoval M
    PLoS One; 2013; 8(12):e81976. PubMed ID: 24349165
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Collusion-resistant audio fingerprinting system in the modulated complex lapped transform domain.
    Garcia-Hernandez JJ; Feregrino-Uribe C; Cumplido R
    PLoS One; 2013; 8(6):e65985. PubMed ID: 23762455
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting.
    Zhao HV; Wu M; Wang ZJ; Liu KJ
    IEEE Trans Image Process; 2005 May; 14(5):646-61. PubMed ID: 15887559
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation.
    Wang ZJ; Wu M; Zhao HV; Trappe W; Liu KJ
    IEEE Trans Image Process; 2005 Jun; 14(6):804-21. PubMed ID: 15971779
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Fingerprint multicast in secure video streaming.
    Zhao HV; Liu KJ
    IEEE Trans Image Process; 2006 Jan; 15(1):12-29. PubMed ID: 16435533
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Multipurpose image watermarking algorithm based on multistage vector quantization.
    Lu ZM; Xu DG; Sun SH
    IEEE Trans Image Process; 2005 Jun; 14(6):822-31. PubMed ID: 15971780
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents.
    Tayan O; Kabir MN; Alginahi YM
    ScientificWorldJournal; 2014; 2014():514652. PubMed ID: 25254247
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Watermarking polygonal lines using Fourier descriptors.
    Solachidis V; Pitas I
    IEEE Comput Graph Appl; 2004; 24(3):44-51. PubMed ID: 15628072
    [No Abstract]   [Full Text] [Related]  

  • 9. Dual domain watermarking for authentication and compression of cultural heritage images.
    Zhao Y; Campisi P; Kundur D
    IEEE Trans Image Process; 2004 Mar; 13(3):430-48. PubMed ID: 15376933
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An optimal detector structure for the fourier descriptors domain watermarking of 2D vector graphics.
    Doncel VR; Nikolaidis N; Pitas I
    IEEE Trans Vis Comput Graph; 2007; 13(5):851-63. PubMed ID: 17622672
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Error concealment for shape in MPEG-4 object-based video coding.
    Huang C; Salama P
    IEEE Trans Image Process; 2005 Apr; 14(4):389-96. PubMed ID: 15825475
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Context-based coding of bilevel images enhanced by digital straight line analysis.
    Aghito SM; Forchhammer S
    IEEE Trans Image Process; 2006 Aug; 15(8):2120-30. PubMed ID: 16900670
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Ergodic chaotic parameter modulation with application to digital image watermarking.
    Chen S; Leung H
    IEEE Trans Image Process; 2005 Oct; 14(10):1590-602. PubMed ID: 16238064
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Content-based retrieval of historical Ottoman documents stored as textual images.
    Saykol E; Sinop AK; Güdükbay U; Ulusoy O; Cetin AE
    IEEE Trans Image Process; 2004 Mar; 13(3):314-25. PubMed ID: 15376924
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain.
    Wang Y; Pearmain A
    IEEE Trans Image Process; 2006 Jun; 15(6):1536-43. PubMed ID: 16764278
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Wavelet tree quantization for copyright protection watermarking.
    Wang SH; Lin YP
    IEEE Trans Image Process; 2004 Feb; 13(2):154-65. PubMed ID: 15376937
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.
    Lang J
    Opt Express; 2012 Jan; 20(3):2386-98. PubMed ID: 22330477
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A novel high-capacity data-embedding system.
    Lan TH; Tewfik AH
    IEEE Trans Image Process; 2006 Aug; 15(8):2431-40. PubMed ID: 16900696
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Locating edges and removing ringing artifacts in JPEG images by frequency-domain analysis.
    Popovici I; Withers WD
    IEEE Trans Image Process; 2007 May; 16(5):1470-4. PubMed ID: 17491474
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A comment on "Asymptotically optimal detection for additive watermarking in the DCT AND DWT domains".
    Nadarajah S; Kotz S
    IEEE Trans Image Process; 2007 Apr; 16(4):1182-3. PubMed ID: 17405447
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.