These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 29608931)

  • 1. Hybrid, randomized and high capacity conservative mutations DNA-based steganography for large sized data.
    Hamed G; Marey M; Amin SE; Tolba MF
    Biosystems; 2018 May; 167():47-61. PubMed ID: 29608931
    [TBL] [Abstract][Full Text] [Related]  

  • 2. DNA-based cryptographic methods for data hiding in DNA media.
    Marwan S; Shawish A; Nagaty K
    Biosystems; 2016 Dec; 150():110-118. PubMed ID: 27634362
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 4. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 5. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Random Matrix Transformation and Its Application in Image Hiding.
    Wang J; Tan FS; Yuan Y
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679814
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning.
    Pan W; Yin Y; Wang X; Jing Y; Song M
    IEEE Trans Pattern Anal Mach Intell; 2022 Nov; 44(11):7871-7884. PubMed ID: 34550880
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A secure fingerprint hiding technique based on DNA sequence and mathematical function.
    Al-Ahmadi WE; Aljahdali AO; Thabit F; Munshi A
    PeerJ Comput Sci; 2024; 10():e1847. PubMed ID: 38660173
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Effective Electrocardiogram Steganography Based on Coefficient Alignment.
    Yang CY; Wang WF
    J Med Syst; 2016 Mar; 40(3):66. PubMed ID: 26711443
    [TBL] [Abstract][Full Text] [Related]  

  • 12. DNA-based watermarks using the DNA-Crypt algorithm.
    Heider D; Barnekow A
    BMC Bioinformatics; 2007 May; 8():176. PubMed ID: 17535434
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An efficient steganography method for hiding patient confidential information.
    Al-Dmour H; Al-Ani A; Nguyen H
    Annu Int Conf IEEE Eng Med Biol Soc; 2014; 2014():222-5. PubMed ID: 25569937
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Diagonal queue medical image steganography with Rabin cryptosystem.
    Jain M; Lenka SK
    Brain Inform; 2016 Mar; 3(1):39-51. PubMed ID: 27747599
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Efficient three layer secured adaptive video steganography method using chaotic dynamic systems.
    Kumar D; Sudha VK; Manikandan N; Ramaswamy K
    Sci Rep; 2024 Aug; 14(1):18301. PubMed ID: 39112647
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Double layer security using crypto-stego techniques: a comprehensive review.
    Jan A; Parah SA; Hussan M; Malik BA
    Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Steganography in color images with random order of pixel selection and encrypted text message embedding.
    Kordov K; Zhelezov S
    PeerJ Comput Sci; 2021; 7():e380. PubMed ID: 33817027
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Nucleic acid sequence data turns 100,000,000,000 and looks to the future.
    Bloom S
    J Clin Invest; 2005 Oct; 115(10):2588. PubMed ID: 16200189
    [No Abstract]   [Full Text] [Related]  

  • 19. GATA: a graphic alignment tool for comparative sequence analysis.
    Nix DA; Eisen MB
    BMC Bioinformatics; 2005 Jan; 6():9. PubMed ID: 15655071
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Trends to store digital data in DNA: an overview.
    Akram F; Haq IU; Ali H; Laghari AT
    Mol Biol Rep; 2018 Oct; 45(5):1479-1490. PubMed ID: 30073589
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.