These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

301 related articles for article (PubMed ID: 31035557)

  • 1. Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy.
    Lin YH; Hsia CH; Chen BY; Chen YY
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035557
    [TBL] [Abstract][Full Text] [Related]  

  • 2. AMBTC based high payload data hiding with modulo-2 operation and Hamming code.
    Li L; Zhang SQ; Luo T; Chang CC
    Math Biosci Eng; 2019 Aug; 16(6):7934-7949. PubMed ID: 31698648
    [TBL] [Abstract][Full Text] [Related]  

  • 3. High-Payload Data-Hiding Method for AMBTC Decompressed Images.
    Yeh JY; Chen CC; Liu PL; Huang YH
    Entropy (Basel); 2020 Jan; 22(2):. PubMed ID: 33285920
    [TBL] [Abstract][Full Text] [Related]  

  • 4. AMBTC-based visual secret sharing with different meaningful shadows.
    Wang S; Lu Y; Yan X; Li L; Yu Y
    Math Biosci Eng; 2021 Jun; 18(5):5236-5251. PubMed ID: 34517486
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A bit toggling approach for AMBTC tamper detection scheme with high image fidelity.
    Hong W; Li D; Lou DC; Zhou X; Chang CH
    PLoS One; 2020; 15(4):e0230997. PubMed ID: 32298280
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A recoverable AMBTC authentication scheme using similarity embedding strategy.
    Hong W; Zhou X; Lou DC
    PLoS One; 2019; 14(2):e0212802. PubMed ID: 30811472
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.
    Sun Y; Yang CN; Yan X; Lu Y; Sun L
    Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552
    [TBL] [Abstract][Full Text] [Related]  

  • 8. High capacity data hiding with absolute moment block truncation coding image based on interpolation.
    Kim C; Shin D; Yang CN
    Math Biosci Eng; 2019 Sep; 17(1):160-178. PubMed ID: 31731345
    [TBL] [Abstract][Full Text] [Related]  

  • 9. SVIoT: A Secure Visual-IoT Framework for Smart Healthcare.
    Kaw JA; Gull S; Parah SA
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270920
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.
    Muhammad K; Sajjad M; Baik SW
    J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An efficient and adaptive data-hiding scheme based on secure random matrix.
    Zhang M; Zhang S; Harn L
    PLoS One; 2019; 14(10):e0222892. PubMed ID: 31577802
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu.
    Horng JH; Xu S; Chang CC; Chang CC
    Sensors (Basel); 2020 May; 20(9):. PubMed ID: 32403350
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A novel joint data-hiding and compression scheme based on SMVQ and image inpainting.
    Chuan Qin ; Chin-Chen Chang ; Yi-Ping Chiu
    IEEE Trans Image Process; 2014 Mar; 23(3):969-78. PubMed ID: 23649221
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Reversible data hiding techniques with high message embedding capacity in images.
    Aziz F; Ahmad T; Malik AH; Uddin MI; Ahmad S; Sharaf M
    PLoS One; 2020; 15(5):e0231602. PubMed ID: 32469877
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Tamper detection and recovery for medical images using near-lossless information hiding technique.
    Wu JH; Chang RF; Chen CJ; Wang CL; Kuo TH; Moon WK; Chen DR
    J Digit Imaging; 2008 Mar; 21(1):59-76. PubMed ID: 17393256
    [TBL] [Abstract][Full Text] [Related]  

  • 17. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Visual Secure Image Encryption Scheme Based on Compressed Sensing and Regional Energy.
    Shi M; Guo S; Song X; Zhou Y; Wang E
    Entropy (Basel); 2021 May; 23(5):. PubMed ID: 34066391
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Multi-Directional Pixel-Swapping Approach (
    Panchikkil S; Manikandan VM; Zhang Y; Wang S
    Entropy (Basel); 2023 Mar; 25(4):. PubMed ID: 37190351
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 16.