These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

217 related articles for article (PubMed ID: 29400881)

  • 21. A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion.
    Huang L; Cai S; Xiao M; Xiong X
    Entropy (Basel); 2018 Jul; 20(7):. PubMed ID: 33265624
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm.
    Liu W; Liu Z; Liu S
    Opt Lett; 2013 May; 38(10):1651-3. PubMed ID: 23938899
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Optical image encryption based on biometric keys and singular value decomposition.
    Tao S; Tang C; Shen Y; Lei Z
    Appl Opt; 2020 Mar; 59(8):2422-2430. PubMed ID: 32225778
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle.
    Wang X; Zhao D
    Appl Opt; 2013 Sep; 52(25):6170-8. PubMed ID: 24085074
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Optical asymmetric JTC cryptosystem based on binary phase modulation and image superposition-subtraction operation.
    Liu Y; Shen X; Zhou B; Liu J; Cai J; Liu X; Cheng Y
    Appl Opt; 2022 Oct; 61(29):8711-8729. PubMed ID: 36256005
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Security improvement for asymmetric cryptosystem based on spherical wave illumination.
    Ding X; Deng X; Song K; Chen G
    Appl Opt; 2013 Jan; 52(3):467-73. PubMed ID: 23338195
    [TBL] [Abstract][Full Text] [Related]  

  • 27. New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition.
    Wang Y; Quan C; Tay CJ
    Appl Opt; 2016 Feb; 55(4):679-86. PubMed ID: 26836068
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes.
    Zhu S; Wang G; Zhu C
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267503
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Optical multiple-image compression-encryption via single-pixel Radon transform.
    Wu J; Li S
    Appl Opt; 2020 Nov; 59(31):9744-9754. PubMed ID: 33175809
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Nonlinear optical security system based on a joint transform correlator in the Fresnel domain.
    Vilardy JM; Millán MS; Pérez-Cabré E
    Appl Opt; 2014 Mar; 53(8):1674-82. PubMed ID: 24663426
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos.
    Zhu S; Zhu C
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922307
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain.
    Perez RA; Pérez-Cabré E; Vilardy JM; Millán MS; Torres CO
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772681
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
    Wang X; Zhao D
    Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Security analysis on an interference-based optical image encryption scheme.
    Xiong Y; Gu J; Kumar R
    Appl Opt; 2022 Oct; 61(30):9045-9051. PubMed ID: 36607034
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Cryptoanalysis on the optical image encryption scheme based on full phase encoding and equal modulus decomposition.
    Xiong Y; Wang Y
    Appl Opt; 2022 Apr; 61(10):2743-2749. PubMed ID: 35471346
    [TBL] [Abstract][Full Text] [Related]  

  • 36. An image encryption scheme based on public key cryptosystem and quantum logistic map.
    Ye G; Jiao K; Huang X; Goi BM; Yap WS
    Sci Rep; 2020 Dec; 10(1):21044. PubMed ID: 33273539
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Ciphertext-only attack on a joint transform correlator encryption system.
    Zhang C; Liao M; He W; Peng X
    Opt Express; 2013 Nov; 21(23):28523-30. PubMed ID: 24514364
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps.
    Zhu C; Wang G; Sun K
    Entropy (Basel); 2018 Nov; 20(11):. PubMed ID: 33266567
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Cryptoanalysis and enhancement of a binary image encryption system based on interference.
    Du J; Xiong Y; Quan C
    Appl Opt; 2021 Sep; 60(26):8038-8045. PubMed ID: 34613065
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Binary-tree encryption strategy for optical multiple-image encryption.
    Yi J; Tan G
    Appl Opt; 2016 Jul; 55(20):5280-91. PubMed ID: 27409301
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 11.