These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

116 related articles for article (PubMed ID: 30296234)

  • 1. Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach.
    Yan B; Xiang Y; Hua G
    IEEE Trans Image Process; 2018 Oct; ():. PubMed ID: 30296234
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Halftone visual cryptography.
    Zhou Z; Arce GR; Di Crescenzo G
    IEEE Trans Image Process; 2006 Aug; 15(8):2441-53. PubMed ID: 16900697
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Color extended visual cryptography using error diffusion.
    Kang I; Arce GR; Lee HK
    IEEE Trans Image Process; 2011 Jan; 20(1):132-45. PubMed ID: 20615812
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Image size invariant visual cryptography for general access structures subject to display quality constraints.
    Lee KH; Chiu PL
    IEEE Trans Image Process; 2013 Oct; 22(10):3830-41. PubMed ID: 23674454
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Adaptive visual cryptography scheme design based on QR codes.
    Zhang LN; Cui CY; Zhang XY; Wu W
    Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cheating prevention in visual cryptography.
    Hu CM; Tzeng WG
    IEEE Trans Image Process; 2007 Jan; 16(1):36-45. PubMed ID: 17283763
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A QR code-based user-friendly visual cryptography scheme.
    Ren L; Zhang D
    Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Visual cryptography in single-pixel imaging.
    Jiao S; Feng J; Gao Y; Lei T; Yuan X
    Opt Express; 2020 Mar; 28(5):7301-7313. PubMed ID: 32225961
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols.
    Wang Q; A JB; Manoranjitham T; Akilandeswari P; G SM; Suryawanshi S; A CEK
    Math Biosci Eng; 2023 Nov; 20(11):19983-20001. PubMed ID: 38052633
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A fast, high-quality inverse halftoning algorithm for error diffused halftones.
    Kite TD; Damera-Venkata N; Evans BL; Bovik AC
    IEEE Trans Image Process; 2000; 9(9):1583-92. PubMed ID: 18262995
    [TBL] [Abstract][Full Text] [Related]  

  • 11. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Sharing visual secrets in single image random dot stereograms.
    Lee KH; Chiu PL
    IEEE Trans Image Process; 2014 Oct; 23(10):4336-47. PubMed ID: 25122571
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Speckle visual cryptography for credential authentication.
    Jiao A; Zhu Y; Mi Z; Zhou X; Zhu Q; Ke C; Shi Y
    Appl Opt; 2024 Jun; 63(16):4351-4359. PubMed ID: 38856613
    [TBL] [Abstract][Full Text] [Related]  

  • 14. JPEG-compliant perceptual coding for a grayscale image printing pipeline.
    Vander Kam RA; Wong PW; Gray RM
    IEEE Trans Image Process; 1999; 8(1):1-14. PubMed ID: 18262860
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Adaptive threshold modulation for error diffusion halftoning.
    Damera-Venkata N; Evans BL
    IEEE Trans Image Process; 2001; 10(1):104-16. PubMed ID: 18249601
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Hardcopy image barcodes via block-error diffusion.
    Damera-Venkata N; Yen J; Monga V; Evans BL
    IEEE Trans Image Process; 2005 Dec; 14(12):1977-89. PubMed ID: 16370452
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Design and analysis of vector color error diffusion halftoning systems.
    Damera-Venkata N; Evans BL
    IEEE Trans Image Process; 2001; 10(10):1552-65. PubMed ID: 18255498
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A compressed secret image sharing method with shadow image verification capability.
    Yang GZ; Liu LT; Yan XH
    Math Biosci Eng; 2020 Jun; 17(4):4295-4316. PubMed ID: 32987580
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Tree-structured method for LUT inverse halftoning and for image halftoning.
    Mese M; Vaidyanathan PP
    IEEE Trans Image Process; 2002; 11(6):644-55. PubMed ID: 18244663
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.