These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

105 related articles for article (PubMed ID: 25680128)

  • 21. Optical double-image cryptosystem based on generalized singular value decomposition and five-dimensional hyperchaotic maps.
    Zhang L; Tang C; Shen Y; Han R
    Appl Opt; 2023 Jan; 62(3):665-674. PubMed ID: 36821270
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Cryptoanalysis on the optical image encryption scheme based on full phase encoding and equal modulus decomposition.
    Xiong Y; Wang Y
    Appl Opt; 2022 Apr; 61(10):2743-2749. PubMed ID: 35471346
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Jan; 58(3):695-703. PubMed ID: 30694257
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm.
    Rajput SK; Nishchal NK
    Appl Opt; 2014 Jan; 53(3):418-25. PubMed ID: 24514127
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Security analysis of a double-image encryption technique based on an asymmetric algorithm.
    Xiong Y; He A; Quan C
    J Opt Soc Am A Opt Image Sci Vis; 2018 Feb; 35(2):320-326. PubMed ID: 29400881
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Asymmetric double-image encryption via wavelength multiplexing.
    Zhang Y; Zhang X; Shan M; Zhong Z; Liu B; Yu L; Liu L
    Appl Opt; 2022 Feb; 61(5):1248-1253. PubMed ID: 35201177
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Jun; 52(18):4343-52. PubMed ID: 23842178
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain.
    Zhong Z; Qin H; Liu L; Zhang Y; Shan M
    Opt Express; 2017 Mar; 25(6):6974-6982. PubMed ID: 28381039
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Linear space-variant optical cryptosystem via Fourier ptychography.
    Pan A; Wen K; Yao B
    Opt Lett; 2019 Apr; 44(8):2032-2035. PubMed ID: 30985803
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Asymmetric optical cryptosystem for multiple images based on devil's spiral Fresnel lens phase and random spiral transform in gyrator domain.
    Chen H; Liu Z; Tanougast C; Blondel W
    Sci Rep; 2021 Oct; 11(1):20846. PubMed ID: 34675278
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Optical single-channel color image cryptosystem based on vector decomposition and three-dimensional chaotic maps.
    Chen M; Tang C
    Appl Opt; 2018 Nov; 57(32):9690-9698. PubMed ID: 30461753
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm.
    Liu W; Liu Z; Liu S
    Opt Lett; 2013 May; 38(10):1651-3. PubMed ID: 23938899
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding.
    Abuturab MR
    Appl Opt; 2013 Mar; 52(8):1555-63. PubMed ID: 23478757
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Universal and special keys based on phase-truncated Fourier transform.
    Qin W; Peng X; Meng X; Gao B
    Opt Eng; 2011 Aug; 50(8):080501. PubMed ID: 25339784
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique.
    Lin C; Shen X; Wang Z; Zhao C
    Appl Opt; 2014 Jun; 53(18):3920-8. PubMed ID: 24979424
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Robust multidepth object encryption based on a computer-generated hologram with a cascaded structure.
    Piao ML; Wang SG; Zhao Y; Wei J; Zhao Y; Kim N
    Appl Opt; 2019 Dec; 58(36):9921-9930. PubMed ID: 31873638
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Information authentication system using interference of two beams in gyrator transform domain.
    Abuturab MR
    Appl Opt; 2013 Jul; 52(21):5133-42. PubMed ID: 23872758
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Image encryption based on interference that uses fractional Fourier domain asymmetric keys.
    Rajput SK; Nishchal NK
    Appl Opt; 2012 Apr; 51(10):1446-52. PubMed ID: 22505061
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Optical image hiding with silhouette removal based on the optical interference principle.
    Wang X; Zhao D
    Appl Opt; 2012 Feb; 51(6):686-91. PubMed ID: 22358156
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps.
    Sui L; Duan K; Liang J; Hei X
    Opt Express; 2014 May; 22(9):10605-21. PubMed ID: 24921762
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.