BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

254 related articles for article (PubMed ID: 26555746)

  • 1. A novel fuzzy logic-based image steganography method to ensure medical data security.
    Karakış R; Güler I; Çapraz I; Bilir E
    Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Interval type-2 fuzzy logic system based similarity evaluation for image steganography.
    Ashraf Z; Roy ML; Muhuri PK; Lohani QMD
    Heliyon; 2020 May; 6(5):e03771. PubMed ID: 32420466
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A new image steganography method with optimum pixel similarity for data hiding in medical images.
    Karakus S; Avci E
    Med Hypotheses; 2020 Jun; 139():109691. PubMed ID: 32240879
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Classification of anatomical structures in MR brain images using fuzzy parameters.
    Algorri ME; Flores-Mangas F
    IEEE Trans Biomed Eng; 2004 Sep; 51(9):1599-608. PubMed ID: 15376508
    [TBL] [Abstract][Full Text] [Related]  

  • 6. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Networked medical data sharing on secure medium - A web publishing mode for DICOM viewer with three layer authentication.
    Arumugham S; Rajagopalan S; Rayappan JBB; Amirtharajan R
    J Biomed Inform; 2018 Oct; 86():90-105. PubMed ID: 30149142
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Genetic algorithm based methodology for breaking the steganalytic systems.
    Wu YT; Shih FY
    IEEE Trans Syst Man Cybern B Cybern; 2006 Feb; 36(1):24-31. PubMed ID: 16468564
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Is image steganography natural?
    Martín A; Sapiro G; Seroussi G
    IEEE Trans Image Process; 2005 Dec; 14(12):2040-50. PubMed ID: 16370457
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.
    Muhammad K; Sajjad M; Baik SW
    J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355
    [TBL] [Abstract][Full Text] [Related]  

  • 12. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things.
    AlEisa HN
    J Healthc Eng; 2022; 2022():7528583. PubMed ID: 35571336
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A robust fuzzy local information C-Means clustering algorithm.
    Krinidis S; Chatzis V
    IEEE Trans Image Process; 2010 May; 19(5):1328-37. PubMed ID: 20089475
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise.
    Wu B; Wang Z; Shastri BJ; Chang MP; Frost NA; Prucnal PR
    Opt Express; 2014 Jan; 22(1):954-61. PubMed ID: 24515055
    [TBL] [Abstract][Full Text] [Related]  

  • 16. [A new algorithm for magnetic resonance image segmentation based on fuzzy kerne1 clustering].
    Yu XF; Li B; Chen WF
    Nan Fang Yi Ke Da Xue Xue Bao; 2008 Apr; 28(4):555-7. PubMed ID: 18495589
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
    Mantos PL; Maglogiannis I
    J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.
    Rahman S; Uddin J; Hussain H; Ahmed A; Khan AA; Zakarya M; Rahman A; Haleem M
    Sci Rep; 2023 Aug; 13(1):14183. PubMed ID: 37648738
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Steganography-based voice hiding in medical images of COVID-19 patients.
    Yildirim M
    Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images.
    Bouslimi D; Coatrieux G; Roux C
    Comput Methods Programs Biomed; 2012 Apr; 106(1):47-54. PubMed ID: 22054815
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 13.