These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
170 related articles for article (PubMed ID: 31499657)
1. Continuous variable quantum steganography protocol based on quantum identity. Qu ZG; Jiang LM; Sun L; Wang MM; Wang XJ Math Biosci Eng; 2019 May; 16(5):4182-4195. PubMed ID: 31499657 [TBL] [Abstract][Full Text] [Related]
2. Effects of quantum noises on χ state-based quantum steganography protocol. Qu ZG; Wu SY; Sun L; Wang MM; Wang XJ Math Biosci Eng; 2019 May; 16(5):4999-5021. PubMed ID: 31499701 [TBL] [Abstract][Full Text] [Related]
3. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix. Hacimurtazaoglu M; Tutuncu K PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926 [TBL] [Abstract][Full Text] [Related]
4. Multi-Party Quantum Secret Sharing Based on GHZ State. Li Z; Jiang X; Liu L Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420454 [TBL] [Abstract][Full Text] [Related]
5. A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms. Abd-El-Atty B; Iliyasu AM; Alaskar H; Abd El-Latif AA Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486383 [TBL] [Abstract][Full Text] [Related]
6. A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party. Li X; Zhang K; Zhang L; Zhao X Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455145 [TBL] [Abstract][Full Text] [Related]
7. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity. Tian Y; Bian G; Chang J; Tang Y; Li J; Ye C Entropy (Basel); 2023 Apr; 25(5):. PubMed ID: 37238497 [TBL] [Abstract][Full Text] [Related]
8. Efficient Quantum Private Comparison without Sharing a Key. Li J; Che F; Wang Z; Fu A Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998244 [TBL] [Abstract][Full Text] [Related]
9. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices. Almomani I; Alkhayer A; El-Shafai W Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452 [TBL] [Abstract][Full Text] [Related]
10. A New Semi-Quantum Two-Way Authentication Protocol between Control Centers and Neighborhood Gateways in Smart Grids. Zhang Q; Zhang K; Hou K; Zhang L Entropy (Basel); 2024 Jul; 26(8):. PubMed ID: 39202114 [TBL] [Abstract][Full Text] [Related]
11. Steganography and Steganalysis in Voice over IP: A Review. Wu Z; Guo J; Zhang C; Li C Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33546240 [TBL] [Abstract][Full Text] [Related]
12. Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review. Mohsin AH; Zaidan AA; Zaidan BB; Ariffin SAB; Albahri OS; Albahri AS; Alsalem MA; Mohammed KI; Hashim M J Med Syst; 2018 Oct; 42(12):245. PubMed ID: 30374820 [TBL] [Abstract][Full Text] [Related]
13. A Kind of ( Meng D; Li Z; Luo S; Han Z Entropy (Basel); 2023 May; 25(5):. PubMed ID: 37238582 [TBL] [Abstract][Full Text] [Related]
14. An Efficient Quantum Secret Sharing Scheme Based on Restricted Threshold Access Structure. Li L; Li Z Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832630 [TBL] [Abstract][Full Text] [Related]
15. MTS-Stega: Linguistic Steganography Based on Multi-Time-Step. Yu L; Lu Y; Yan X; Yu Y Entropy (Basel); 2022 Apr; 24(5):. PubMed ID: 35626471 [TBL] [Abstract][Full Text] [Related]
16. Double layer steganography technique using DNA sequences and images. Aljahdali AO; Al-Harbi OA PeerJ Comput Sci; 2023; 9():e1379. PubMed ID: 37346596 [TBL] [Abstract][Full Text] [Related]
17. Counterfactual Anonymous Quantum Teleportation in the Presence of Adversarial Attacks and Channel Noise. Nang Paing S; Setiawan JW; Tariq S; Talha Rahim M; Lee K; Shin H Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236686 [TBL] [Abstract][Full Text] [Related]
18. Quantum Secret Sharing Among Four Players Using Multipartite Bound Entanglement of an Optical Field. Zhou Y; Yu J; Yan Z; Jia X; Zhang J; Xie C; Peng K Phys Rev Lett; 2018 Oct; 121(15):150502. PubMed ID: 30362796 [TBL] [Abstract][Full Text] [Related]
19. A novel approach to secure communication in mega events through Arabic text steganography utilizing invisible Unicode characters. Khan EA PeerJ Comput Sci; 2024; 10():e2236. PubMed ID: 39314735 [TBL] [Abstract][Full Text] [Related]
20. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States. Bian Y; Huang L; Zhang Y Entropy (Basel); 2021 Feb; 23(3):. PubMed ID: 33673729 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]