These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

96 related articles for article (PubMed ID: 28252386)

  • 1. Comments on "Steganography Using Reversible Texture Synthesis".
    Zhou H; Chen K; Zhang W; Yu N
    IEEE Trans Image Process; 2017 Apr; 26(4):1623-1625. PubMed ID: 28252386
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Steganography using reversible texture synthesis.
    Wu KC; Wang CM
    IEEE Trans Image Process; 2015 Jan; 24(1):130-9. PubMed ID: 25415988
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A new image steganography method with optimum pixel similarity for data hiding in medical images.
    Karakus S; Avci E
    Med Hypotheses; 2020 Jun; 139():109691. PubMed ID: 32240879
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Steganography-based voice hiding in medical images of COVID-19 patients.
    Yildirim M
    Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
    [TBL] [Abstract][Full Text] [Related]  

  • 5. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A high-capacity coverless image steganography method based on double-level index and block matching.
    Chen XY; Qiu AQ; Sun XM; Wang S; Wei G
    Math Biosci Eng; 2019 May; 16(5):4708-4722. PubMed ID: 31499685
    [TBL] [Abstract][Full Text] [Related]  

  • 7. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Effective Electrocardiogram Steganography Based on Coefficient Alignment.
    Yang CY; Wang WF
    J Med Syst; 2016 Mar; 40(3):66. PubMed ID: 26711443
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Lossless Image Steganography Based on Invertible Neural Networks.
    Liu L; Tang L; Zheng W
    Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554167
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An optimal data hiding scheme with tree-based parity check.
    Hou CL; Lu C; Tsai SC; Tzeng WG
    IEEE Trans Image Process; 2011 Mar; 20(3):880-6. PubMed ID: 20813640
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.
    Pan YL; Wu JL
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204
    [TBL] [Abstract][Full Text] [Related]  

  • 12. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
    Duan X; Liu N; Gou M; Wang W; Qin C
    Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Spread spectrum image steganography.
    Marvel LM; Boncelet CR; Retter CT
    IEEE Trans Image Process; 1999; 8(8):1075-83. PubMed ID: 18267522
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Eigenfaces-Based Steganography.
    Hachaj T; Koptyra K; Ogiela MR
    Entropy (Basel); 2021 Feb; 23(3):. PubMed ID: 33668760
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
    Mantos PL; Maglogiannis I
    J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
    [TBL] [Abstract][Full Text] [Related]  

  • 16. High-Capacity Image Steganography Based on Improved Xception.
    Duan X; Gou M; Liu N; Wang W; Qin C
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33348833
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A novel steganography method for binary and color halftone images.
    Çiftci E; Sümer E
    PeerJ Comput Sci; 2022; 8():e1062. PubMed ID: 36091978
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors.
    Battikh D; El Assad S; Hoang TM; Bakhache B; Deforges O; Khalil M
    Entropy (Basel); 2019 Jul; 21(8):. PubMed ID: 33267462
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A novel fuzzy logic-based image steganography method to ensure medical data security.
    Karakış R; Güler I; Çapraz I; Bilir E
    Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.