BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 24979424)

  • 1. Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique.
    Lin C; Shen X; Wang Z; Zhao C
    Appl Opt; 2014 Jun; 53(18):3920-8. PubMed ID: 24979424
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Asymmetric information hiding and noise-free recovery based on rotating analyzer ellipsometry and quick-response code.
    Lin C; Shen X; Wang Z
    J Opt Soc Am A Opt Image Sci Vis; 2014 Aug; 31(8):1895-903. PubMed ID: 25121548
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Jun; 52(18):4343-52. PubMed ID: 23842178
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code.
    Lin C; Shen X; Li B
    Opt Express; 2014 Aug; 22(17):20727-39. PubMed ID: 25321276
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask.
    Rajput SK; Nishchal NK
    Appl Opt; 2012 Aug; 51(22):5377-86. PubMed ID: 22859025
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Optical image encoding based on digital holographic recording on polarization state of vector wave.
    Lin C; Shen X; Xu Q
    Appl Opt; 2013 Oct; 52(28):6931-9. PubMed ID: 24085207
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain.
    Wang Q; Guo Q; Zhou J
    Appl Opt; 2013 Dec; 52(36):8854-63. PubMed ID: 24513953
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform.
    Wang X; Chen Y; Dai C; Zhao D
    Appl Opt; 2014 Jan; 53(2):208-13. PubMed ID: 24514051
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security enhancement of a phase-truncation based image encryption algorithm.
    Wang X; Zhao D
    Appl Opt; 2011 Dec; 50(36):6645-51. PubMed ID: 22193194
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle.
    Wang X; Zhao D
    Appl Opt; 2013 Sep; 52(25):6170-8. PubMed ID: 24085074
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Optical asymmetric cryptosystem for multi-image in cyan-magenta-yellow-black color space.
    Shen Y; Tang C; Zhou L; Lei Z
    Appl Opt; 2020 Mar; 59(7):1854-1863. PubMed ID: 32225701
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Jan; 58(3):695-703. PubMed ID: 30694257
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security analysis of a double-image encryption technique based on an asymmetric algorithm.
    Xiong Y; He A; Quan C
    J Opt Soc Am A Opt Image Sci Vis; 2018 Feb; 35(2):320-326. PubMed ID: 29400881
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Apr; 58(12):3301-3309. PubMed ID: 31044810
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Information hiding based on double random-phase encoding and public-key cryptography.
    Sheng Y; Xin Z; Alam MS; Xi L; Xiao-Feng L
    Opt Express; 2009 Mar; 17(5):3270-84. PubMed ID: 19259163
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Optical double-image cryptosystem based on generalized singular value decomposition and five-dimensional hyperchaotic maps.
    Zhang L; Tang C; Shen Y; Han R
    Appl Opt; 2023 Jan; 62(3):665-674. PubMed ID: 36821270
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition.
    Cai J; Shen X; Lei M; Lin C; Dou S
    Opt Lett; 2015 Feb; 40(4):475-8. PubMed ID: 25680128
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Dual encryption scheme of images using polarized light.
    Alfalou A; Brosseau C
    Opt Lett; 2010 Jul; 35(13):2185-7. PubMed ID: 20596188
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Stokes meta-hologram toward optical cryptography.
    Guo X; Li P; Zhong J; Wen D; Wei B; Liu S; Qi S; Zhao J
    Nat Commun; 2022 Nov; 13(1):6687. PubMed ID: 36335215
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.