254 related articles for article (PubMed ID: 26555746)
1. A novel fuzzy logic-based image steganography method to ensure medical data security.
Karakış R; Güler I; Çapraz I; Bilir E
Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
[TBL] [Abstract][Full Text] [Related]
2. Interval type-2 fuzzy logic system based similarity evaluation for image steganography.
Ashraf Z; Roy ML; Muhuri PK; Lohani QMD
Heliyon; 2020 May; 6(5):e03771. PubMed ID: 32420466
[TBL] [Abstract][Full Text] [Related]
3. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
Al-Dmour H; Al-Ani A
Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
[TBL] [Abstract][Full Text] [Related]
4. A new image steganography method with optimum pixel similarity for data hiding in medical images.
Karakus S; Avci E
Med Hypotheses; 2020 Jun; 139():109691. PubMed ID: 32240879
[TBL] [Abstract][Full Text] [Related]
5. Classification of anatomical structures in MR brain images using fuzzy parameters.
Algorri ME; Flores-Mangas F
IEEE Trans Biomed Eng; 2004 Sep; 51(9):1599-608. PubMed ID: 15376508
[TBL] [Abstract][Full Text] [Related]
6. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
Hardan H; Alawneh A; El-Emam NN
PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
[TBL] [Abstract][Full Text] [Related]
7. Networked medical data sharing on secure medium - A web publishing mode for DICOM viewer with three layer authentication.
Arumugham S; Rajagopalan S; Rayappan JBB; Amirtharajan R
J Biomed Inform; 2018 Oct; 86():90-105. PubMed ID: 30149142
[TBL] [Abstract][Full Text] [Related]
8. Genetic algorithm based methodology for breaking the steganalytic systems.
Wu YT; Shih FY
IEEE Trans Syst Man Cybern B Cybern; 2006 Feb; 36(1):24-31. PubMed ID: 16468564
[TBL] [Abstract][Full Text] [Related]
9. Enhanced payload volume in the least significant bits image steganography using hash function.
Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
[TBL] [Abstract][Full Text] [Related]
10. Is image steganography natural?
Martín A; Sapiro G; Seroussi G
IEEE Trans Image Process; 2005 Dec; 14(12):2040-50. PubMed ID: 16370457
[TBL] [Abstract][Full Text] [Related]
11. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.
Muhammad K; Sajjad M; Baik SW
J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355
[TBL] [Abstract][Full Text] [Related]
12. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
Hacimurtazaoglu M; Tutuncu K
PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
[TBL] [Abstract][Full Text] [Related]
13. Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things.
AlEisa HN
J Healthc Eng; 2022; 2022():7528583. PubMed ID: 35571336
[TBL] [Abstract][Full Text] [Related]
14. A robust fuzzy local information C-Means clustering algorithm.
Krinidis S; Chatzis V
IEEE Trans Image Process; 2010 May; 19(5):1328-37. PubMed ID: 20089475
[TBL] [Abstract][Full Text] [Related]
15. Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise.
Wu B; Wang Z; Shastri BJ; Chang MP; Frost NA; Prucnal PR
Opt Express; 2014 Jan; 22(1):954-61. PubMed ID: 24515055
[TBL] [Abstract][Full Text] [Related]
16. [A new algorithm for magnetic resonance image segmentation based on fuzzy kerne1 clustering].
Yu XF; Li B; Chen WF
Nan Fang Yi Ke Da Xue Xue Bao; 2008 Apr; 28(4):555-7. PubMed ID: 18495589
[TBL] [Abstract][Full Text] [Related]
17. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
Mantos PL; Maglogiannis I
J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
[TBL] [Abstract][Full Text] [Related]
18. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.
Rahman S; Uddin J; Hussain H; Ahmed A; Khan AA; Zakarya M; Rahman A; Haleem M
Sci Rep; 2023 Aug; 13(1):14183. PubMed ID: 37648738
[TBL] [Abstract][Full Text] [Related]
19. Steganography-based voice hiding in medical images of COVID-19 patients.
Yildirim M
Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
[TBL] [Abstract][Full Text] [Related]
20. A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images.
Bouslimi D; Coatrieux G; Roux C
Comput Methods Programs Biomed; 2012 Apr; 106(1):47-54. PubMed ID: 22054815
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]