These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

133 related articles for article (PubMed ID: 32667318)

  • 1. Forgery attack on optical encryption based on computational ghost imaging.
    Yuan S; Wang L; Liu X; Zhou X
    Opt Lett; 2020 Jul; 45(14):3917-3920. PubMed ID: 32667318
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask.
    Xiong Y; He A; Quan C
    Appl Opt; 2018 Jul; 57(21):6010-6016. PubMed ID: 30118027
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Optical cryptosystem based on computational ghost imaging and nonlinear authentication.
    Zhang L; Wang X; Zhou Q; Xue J; Xu B
    Opt Express; 2024 Jan; 32(3):4242-4253. PubMed ID: 38297629
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry.
    Qin W; Peng X; Meng X; Gao BZ
    Opt Eng; 2011 Jun; 50(6):. PubMed ID: 23894214
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium.
    Liao M; He W; Lu D; Peng X
    Sci Rep; 2017 Jan; 7():41789. PubMed ID: 28139729
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Apr; 58(12):3301-3309. PubMed ID: 31044810
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cryptoanalysis and enhancement of a binary image encryption system based on interference.
    Du J; Xiong Y; Quan C
    Appl Opt; 2021 Sep; 60(26):8038-8045. PubMed ID: 34613065
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Jan; 58(3):695-703. PubMed ID: 30694257
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Information encryption based on the customized data container under the framework of computational ghost imaging.
    Liansheng S; Cong D; Minjie X; Ailing T; Anand A
    Opt Express; 2019 Jun; 27(12):16493-16506. PubMed ID: 31252874
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cryptanalysis for a light-field 3D cryptosystem based on M-cGAN.
    Zhang L; Wang Y; Li DH; Li Q; Zhao W; Li X
    Opt Lett; 2021 Oct; 46(19):4916-4919. PubMed ID: 34598233
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Learning-based attacks for detecting the vulnerability of computer-generated hologram based optical encryption.
    Zhou L; Xiao Y; Chen W
    Opt Express; 2020 Jan; 28(2):2499-2510. PubMed ID: 32121938
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys.
    Carnicer A; Montes-Usategui M; Arcos S; Juvells I
    Opt Lett; 2005 Jul; 30(13):1644-6. PubMed ID: 16075524
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Optical image encryption based on biometric keys and singular value decomposition.
    Tao S; Tang C; Shen Y; Lei Z
    Appl Opt; 2020 Mar; 59(8):2422-2430. PubMed ID: 32225778
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Preventing forgery attacks in computational ghost imaging or disabling ghost imaging in a "spatiotemporal" scattering medium with weighted multiplicative signals.
    Ye Z; Huang T; Pan J; Zhang T; Cui Y; Wang HB; Xiong J
    Appl Opt; 2021 Feb; 60(5):1092-1098. PubMed ID: 33690556
    [TBL] [Abstract][Full Text] [Related]  

  • 15. On the security of a new image encryption scheme based on chaotic map lattices.
    Arroyo D; Rhouma R; Alvarez G; Li S; Fernandez V
    Chaos; 2008 Sep; 18(3):033112. PubMed ID: 19045450
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Differential cryptanalysis of a medical image cryptosystem with multiple rounds.
    Chen L; Wang S
    Comput Biol Med; 2015 Oct; 65():69-75. PubMed ID: 26298487
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Attack on optical cryptosystems by skip connection networks.
    Wang J; Wang D
    Opt Express; 2024 May; 32(11):19424-19437. PubMed ID: 38859077
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Discussion on comparative analysis and a new attack on optical asymmetric cryptosystem.
    Fatima A; Nishchal NK
    J Opt Soc Am A Opt Image Sci Vis; 2016 Oct; 33(10):2034-2040. PubMed ID: 27828107
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Enhancing security of incoherent optical cryptosystem by a simple position-multiplexing technique and ultra-broadband illumination.
    Sahoo SK; Tang D; Dang C
    Sci Rep; 2017 Dec; 7(1):17895. PubMed ID: 29263367
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems.
    Guo C; Liu S; Sheridan JT
    Appl Opt; 2015 May; 54(15):4709-19. PubMed ID: 26192505
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.