BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

260 related articles for article (PubMed ID: 25968722)

  • 1. Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation.
    Zhang C; He W; Wu J; Peng X
    Opt Express; 2015 Apr; 23(7):8845-54. PubMed ID: 25968722
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Optical image encryption based on biometric keys and singular value decomposition.
    Tao S; Tang C; Shen Y; Lei Z
    Appl Opt; 2020 Mar; 59(8):2422-2430. PubMed ID: 32225778
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Feb; 52(4):871-8. PubMed ID: 23385931
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask.
    Xiong Y; He A; Quan C
    Appl Opt; 2018 Jul; 57(21):6010-6016. PubMed ID: 30118027
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform.
    Abuturab MR
    Appl Opt; 2012 Nov; 51(33):7994-8002. PubMed ID: 23207310
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm.
    Rajput SK; Nishchal NK
    Appl Opt; 2014 Jan; 53(3):418-25. PubMed ID: 24514127
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Asymmetric cryptosystem based on phase-truncated Fourier transforms.
    Qin W; Peng X
    Opt Lett; 2010 Jan; 35(2):118-20. PubMed ID: 20081940
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask.
    Wang X; Zhao D; Chen Y
    Appl Opt; 2014 Aug; 53(23):5100-8. PubMed ID: 25320917
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security analysis on an interference-based optical image encryption scheme.
    Xiong Y; Gu J; Kumar R
    Appl Opt; 2022 Oct; 61(30):9045-9051. PubMed ID: 36607034
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Jan; 58(3):695-703. PubMed ID: 30694257
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Triple-image encryption based on phase-truncated Fresnel transform and basic vector operation.
    Pan X; Meng X; Yang X; Wang Y; Peng X; He W; Dong G; Chen H
    Appl Opt; 2015 Oct; 54(28):8485-93. PubMed ID: 26479627
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain.
    Wang Q; Guo Q; Zhou J
    Appl Opt; 2013 Dec; 52(36):8854-63. PubMed ID: 24513953
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask.
    Rajput SK; Nishchal NK
    Appl Opt; 2012 Aug; 51(22):5377-86. PubMed ID: 22859025
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask.
    Wang X; Zhao D
    Opt Lett; 2013 Sep; 38(18):3684-6. PubMed ID: 24104846
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Jun; 52(18):4343-52. PubMed ID: 23842178
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform.
    Wang X; Chen Y; Dai C; Zhao D
    Appl Opt; 2014 Jan; 53(2):208-13. PubMed ID: 24514051
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Apr; 58(12):3301-3309. PubMed ID: 31044810
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Hybrid plaintext attack for a cryptosystem based on interference and the phase-retrieval technique.
    Xiong Y; Gu J; Kumar R
    Appl Opt; 2023 Jun; 62(16):4301-4309. PubMed ID: 37706921
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding.
    Abuturab MR
    Appl Opt; 2013 Mar; 52(8):1555-63. PubMed ID: 23478757
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform.
    Wang Y; Quan C; Tay CJ
    Appl Opt; 2015 Aug; 54(22):6874-81. PubMed ID: 26368104
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 13.