BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

162 related articles for article (PubMed ID: 31137215)

  • 1. Steganography in beautified images.
    Liu LY; Wang ZC; Qian ZX; Zhang XP; Feng GR
    Math Biosci Eng; 2019 Mar; 16(4):2322-2333. PubMed ID: 31137215
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 3. ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks.
    Cohen A; Cohen A; Nissim N
    Neural Netw; 2020 Nov; 131():64-77. PubMed ID: 32759032
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Is image steganography natural?
    Martín A; Sapiro G; Seroussi G
    IEEE Trans Image Process; 2005 Dec; 14(12):2040-50. PubMed ID: 16370457
    [TBL] [Abstract][Full Text] [Related]  

  • 5. JPEG Steganography With Content Similarity Evaluation.
    Wang Z; Feng G; Qian Z; Zhang X
    IEEE Trans Cybern; 2023 Aug; 53(8):5082-5093. PubMed ID: 35580096
    [TBL] [Abstract][Full Text] [Related]  

  • 6. High capacity reversible data hiding in MP3 based on Huffman table transformation.
    Tan DW; Lu YL; Yan XH; Liu LT; Li LL
    Math Biosci Eng; 2019 Apr; 16(4):3183-3194. PubMed ID: 31137257
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.
    Abd-El-Atty B; Iliyasu AM; Alaskar H; Abd El-Latif AA
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486383
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Genetic algorithm based methodology for breaking the steganalytic systems.
    Wu YT; Shih FY
    IEEE Trans Syst Man Cybern B Cybern; 2006 Feb; 36(1):24-31. PubMed ID: 16468564
    [TBL] [Abstract][Full Text] [Related]  

  • 9. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion.
    Zhang Y; Zhu J; Xue M; Zhang X; Cao X
    IEEE Trans Vis Comput Graph; 2024 Aug; 30(8):5299-5312. PubMed ID: 37363849
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Optimal signature design for spread-spectrum steganography.
    Gkizeli M; Pados DA; Medley MJ
    IEEE Trans Image Process; 2007 Feb; 16(2):391-405. PubMed ID: 17269633
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A novel fuzzy logic-based image steganography method to ensure medical data security.
    Karakış R; Güler I; Çapraz I; Bilir E
    Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Comparative performance assessment of deep learning based image steganography techniques.
    Himthani V; Dhaka VS; Kaur M; Rani G; Oza M; Lee HN
    Sci Rep; 2022 Oct; 12(1):16895. PubMed ID: 36207314
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks.
    Zhang S; Li H; Li L; Lu J; Zuo Z
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298196
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
    Mantos PL; Maglogiannis I
    J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Lossless generalized-lSB data embedding.
    Celik MU; Sharma G; Tekalp AM; Saber E
    IEEE Trans Image Process; 2005 Feb; 14(2):253-66. PubMed ID: 15700530
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A high-capacity coverless image steganography method based on double-level index and block matching.
    Chen XY; Qiu AQ; Sun XM; Wang S; Wei G
    Math Biosci Eng; 2019 May; 16(5):4708-4722. PubMed ID: 31499685
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Double layer security using crypto-stego techniques: a comprehensive review.
    Jan A; Parah SA; Hussan M; Malik BA
    Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Steganography using reversible texture synthesis.
    Wu KC; Wang CM
    IEEE Trans Image Process; 2015 Jan; 24(1):130-9. PubMed ID: 25415988
    [TBL] [Abstract][Full Text] [Related]  

  • 20. On Max-Plus Algebra and Its Application on Image Steganography.
    Santoso KA; Fatmawati ; Suprajitno H
    ScientificWorldJournal; 2018; 2018():6718653. PubMed ID: 29887761
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.