These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

146 related articles for article (PubMed ID: 31499691)

  • 1. Reducing file size and time complexity in secret sharing based document protection.
    Liu YX; Zhang YZ; Yang CN
    Math Biosci Eng; 2019 May; 16(5):4802-4817. PubMed ID: 31499691
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Nonlinear secret image sharing scheme.
    Shin SH; Lee GJ; Yoo KY
    ScientificWorldJournal; 2014; 2014():418090. PubMed ID: 25140334
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A novel secret sharing scheme using multiple share images.
    Li XP; Liu YJ; Chen HF; Chang CC
    Math Biosci Eng; 2019 Jul; 16(6):6350-6366. PubMed ID: 31698566
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Two-level QR code scheme based on region matrix image secret sharing algorithm.
    Zhang LN; Sun JQ; Zhang XY; Chen QP; Zhang J
    Math Biosci Eng; 2023 Aug; 20(9):16678-16704. PubMed ID: 37920029
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.
    Fujiwara M; Waseda A; Nojima R; Moriai S; Ogata W; Sasaki M
    Sci Rep; 2016 Jul; 6():28988. PubMed ID: 27363566
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19.
    Sarkar A; Sarkar M
    Multimed Tools Appl; 2021; 80(14):21899-21923. PubMed ID: 33776546
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing.
    Yu H; Zhang J; Xiang Z; Liu B; Feng H
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430779
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm.
    Weng CY; Yang CH
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832576
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes.
    Pan JS; Liu T; Yan B; Yang HM; Chu SC
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190441
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Fake and dishonest participant location scheme in secret image sharing.
    Liu J; Sun L; Liu J; Yan X
    Math Biosci Eng; 2021 Mar; 18(3):2473-2495. PubMed ID: 33892556
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem.
    Wang C; Peng Y; Liang Z; Wang Y; Ke G; Jin Z
    Heliyon; 2023 Apr; 9(4):e14918. PubMed ID: 37095991
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.
    Bao L; Yi S; Zhou Y
    IEEE Trans Image Process; 2017 Dec; 26(12):5618-5631. PubMed ID: 28809684
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Weighted visual secret sharing with multiple decryptions and lossless recovery.
    Liu F; Yan XH; Lu YL; Tan LD
    Math Biosci Eng; 2019 Jun; 16(5):5750-5764. PubMed ID: 31499736
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Novel General (
    Xing F; Yan X; Yu L; Li L
    Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327829
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A collaborative secret sharing scheme based on the Chinese Remainder Theorem.
    Jia XX; Song YX; Wang DS; Nie DX; Wu JZ
    Math Biosci Eng; 2019 Feb; 16(3):1280-1299. PubMed ID: 30947420
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability.
    Lee CW; Tsai WH
    IEEE Trans Image Process; 2012 Jan; 21(1):207-18. PubMed ID: 21693424
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network.
    Velumani R; Sudalaimuthu H; Choudhary G; Bama S; Jose MV; Dragoni N
    Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458944
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection.
    Chang CC; Horng JH; Shih CS; Chang CC
    Sensors (Basel); 2020 Jul; 20(13):. PubMed ID: 32646024
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.
    Lang J
    Opt Express; 2012 Jan; 20(3):2386-98. PubMed ID: 22330477
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A QR code-based user-friendly visual cryptography scheme.
    Ren L; Zhang D
    Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.