These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

119 related articles for article (PubMed ID: 30811472)

  • 1. A recoverable AMBTC authentication scheme using similarity embedding strategy.
    Hong W; Zhou X; Lou DC
    PLoS One; 2019; 14(2):e0212802. PubMed ID: 30811472
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A bit toggling approach for AMBTC tamper detection scheme with high image fidelity.
    Hong W; Li D; Lou DC; Zhou X; Chang CH
    PLoS One; 2020; 15(4):e0230997. PubMed ID: 32298280
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.
    Sun Y; Yang CN; Yan X; Lu Y; Sun L
    Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552
    [TBL] [Abstract][Full Text] [Related]  

  • 4. AMBTC based high payload data hiding with modulo-2 operation and Hamming code.
    Li L; Zhang SQ; Luo T; Chang CC
    Math Biosci Eng; 2019 Aug; 16(6):7934-7949. PubMed ID: 31698648
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy.
    Lin YH; Hsia CH; Chen BY; Chen YY
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035557
    [TBL] [Abstract][Full Text] [Related]  

  • 6. AMBTC-based visual secret sharing with different meaningful shadows.
    Wang S; Lu Y; Yan X; Li L; Yu Y
    Math Biosci Eng; 2021 Jun; 18(5):5236-5251. PubMed ID: 34517486
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A novel joint data-hiding and compression scheme based on SMVQ and image inpainting.
    Chuan Qin ; Chin-Chen Chang ; Yi-Ping Chiu
    IEEE Trans Image Process; 2014 Mar; 23(3):969-78. PubMed ID: 23649221
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Self-recovery reversible image watermarking algorithm.
    Zhang Z; Sun H; Gao S; Jin S
    PLoS One; 2018; 13(6):e0199143. PubMed ID: 29920528
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability.
    Li X; Chen Q; Chu R; Wang W
    PLoS One; 2024; 19(2):e0297632. PubMed ID: 38306338
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Tamper detection and recovery for medical images using near-lossless information hiding technique.
    Wu JH; Chang RF; Chen CJ; Wang CL; Kuo TH; Moon WK; Chen DR
    J Digit Imaging; 2008 Mar; 21(1):59-76. PubMed ID: 17393256
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication.
    Liew SC; Liew SW; Zain JM
    J Digit Imaging; 2013 Apr; 26(2):316-25. PubMed ID: 22555905
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Multiscale fragile watermarking based on the Gaussian mixture model.
    Yuan H; Zhang XP
    IEEE Trans Image Process; 2006 Oct; 15(10):3189-200. PubMed ID: 17022280
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy.
    Chi HX; Horng JH; Chang CC; Li YH
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298292
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Authentication and recovery of medical diagnostic image using dual reversible digital watermarking.
    Deng X; Chen Z; Zeng F; Zhang Y; Mao Y
    J Nanosci Nanotechnol; 2013 Mar; 13(3):2099-107. PubMed ID: 23755652
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.
    Khalil MS; Kurniawan F; Khan MK; Alginahi YM
    ScientificWorldJournal; 2014; 2014():803983. PubMed ID: 25028681
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A novel high-capacity data-embedding system.
    Lan TH; Tewfik AH
    IEEE Trans Image Process; 2006 Aug; 15(8):2431-40. PubMed ID: 16900696
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Lossless generalized-lSB data embedding.
    Celik MU; Sharma G; Tekalp AM; Saber E
    IEEE Trans Image Process; 2005 Feb; 14(2):253-66. PubMed ID: 15700530
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Robust authentication for paper-based text documents based on text watermarking technology.
    Qi WF; Guo W; Zhang T; Liu YX; Guo ZM; Fang XF
    Math Biosci Eng; 2019 Mar; 16(4):2233-2249. PubMed ID: 31137209
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Joint compression/watermarking scheme using majority-parity guidance and halftoning-based block truncation coding.
    Guo JM; Liu YF
    IEEE Trans Image Process; 2010 Aug; 19(8):2056-69. PubMed ID: 20236887
    [TBL] [Abstract][Full Text] [Related]  

  • 20. High-Payload Data-Hiding Method for AMBTC Decompressed Images.
    Yeh JY; Chen CC; Liu PL; Huang YH
    Entropy (Basel); 2020 Jan; 22(2):. PubMed ID: 33285920
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.