These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 24979424)

  • 21. Optical single-channel cryptosystem based on the non-negative matrix factorization and face biometric in cyan-magenta-yellow-black color space.
    Zhang L; Tang C; Shen Y; He H; Tang H; Lei Z
    J Opt Soc Am A Opt Image Sci Vis; 2023 Dec; 40(12):2146-2155. PubMed ID: 38086023
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Asymmetric cryptosystem based on phase-truncated Fourier transforms.
    Qin W; Peng X
    Opt Lett; 2010 Jan; 35(2):118-20. PubMed ID: 20081940
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Novel optical scanning cryptography using Fresnel telescope imaging.
    Yan A; Sun J; Hu Z; Zhang J; Liu L
    Opt Express; 2015 Jul; 23(14):18428-34. PubMed ID: 26191901
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm.
    Chang X; Li W; Yan A; Tsang PWM; Poon TC
    Sci Rep; 2022 May; 12(1):7722. PubMed ID: 35545658
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Linear space-variant optical cryptosystem via Fourier ptychography.
    Pan A; Wen K; Yao B
    Opt Lett; 2019 Apr; 44(8):2032-2035. PubMed ID: 30985803
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Novel public key encryption technique based on multiple chaotic systems.
    Bose R
    Phys Rev Lett; 2005 Aug; 95(9):098702. PubMed ID: 16197262
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Discussion on comparative analysis and a new attack on optical asymmetric cryptosystem.
    Fatima A; Nishchal NK
    J Opt Soc Am A Opt Image Sci Vis; 2016 Oct; 33(10):2034-2040. PubMed ID: 27828107
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask.
    Wang X; Zhao D
    Opt Lett; 2013 Sep; 38(18):3684-6. PubMed ID: 24104846
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Optical asymmetric JTC cryptosystem based on binary phase modulation and image superposition-subtraction operation.
    Liu Y; Shen X; Zhou B; Liu J; Cai J; Liu X; Cheng Y
    Appl Opt; 2022 Oct; 61(29):8711-8729. PubMed ID: 36256005
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Image encryption based on interference that uses fractional Fourier domain asymmetric keys.
    Rajput SK; Nishchal NK
    Appl Opt; 2012 Apr; 51(10):1446-52. PubMed ID: 22505061
    [TBL] [Abstract][Full Text] [Related]  

  • 31. New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition.
    Wang Y; Quan C; Tay CJ
    Appl Opt; 2016 Feb; 55(4):679-86. PubMed ID: 26836068
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Polarization scramblers with plasmonic meander-type metamaterials.
    Schau P; Fu L; Frenner K; Schäferling M; Schweizer H; Giessen H; Venancio LM; Osten W
    Opt Express; 2012 Sep; 20(20):22700-11. PubMed ID: 23037420
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm.
    Rajput SK; Nishchal NK
    Appl Opt; 2014 Jan; 53(3):418-25. PubMed ID: 24514127
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask.
    Wang X; Zhao D; Chen Y
    Appl Opt; 2014 Aug; 53(23):5100-8. PubMed ID: 25320917
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging.
    Chen W; Chen X
    Opt Express; 2011 May; 19(10):9008-19. PubMed ID: 21643154
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation.
    Zhang C; He W; Wu J; Peng X
    Opt Express; 2015 Apr; 23(7):8845-54. PubMed ID: 25968722
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Security improvement for asymmetric cryptosystem based on spherical wave illumination.
    Ding X; Deng X; Song K; Chen G
    Appl Opt; 2013 Jan; 52(3):467-73. PubMed ID: 23338195
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps.
    Sui L; Duan K; Liang J; Hei X
    Opt Express; 2014 May; 22(9):10605-21. PubMed ID: 24921762
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Enhanced exclusive-OR and quick response code-based image encryption through incoherent illumination.
    Kumar P; Nishchal NK
    Appl Opt; 2019 Feb; 58(6):1408-1412. PubMed ID: 30874025
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Feb; 52(4):871-8. PubMed ID: 23385931
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.