BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

183 related articles for article (PubMed ID: 33267069)

  • 1. Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.
    Taleby Ahvanooey M; Li Q; Hou J; Rajput AR; Chen Y
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267069
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Covert Communication through Robust Fragment Hiding in a Large Number of Images.
    Wang P; Zhong H; Feng Y; Gong L; Tang Y; Lu ZM; Wang L
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257719
    [TBL] [Abstract][Full Text] [Related]  

  • 3. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 4. ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks.
    Cohen A; Cohen A; Nissim N
    Neural Netw; 2020 Nov; 131():64-77. PubMed ID: 32759032
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Spread spectrum image steganography.
    Marvel LM; Boncelet CR; Retter CT
    IEEE Trans Image Process; 1999; 8(8):1075-83. PubMed ID: 18267522
    [TBL] [Abstract][Full Text] [Related]  

  • 6. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Confidentiality in medical images through a genetic-based steganography algorithm in artificial intelligence.
    Vazquez E; Torres S; Sanchez G; Avalos JG; Abarca M; Frias T; Juarez E; Trejo C; Hernandez D
    Front Robot AI; 2022; 9():1031299. PubMed ID: 36274913
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An efficient steganography method for hiding patient confidential information.
    Al-Dmour H; Al-Ani A; Nguyen H
    Annu Int Conf IEEE Eng Med Biol Soc; 2014; 2014():222-5. PubMed ID: 25569937
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.
    Pan YL; Wu JL
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Steganography and Steganalysis in Voice over IP: A Review.
    Wu Z; Guo J; Zhang C; Li C
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33546240
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization.
    Shankar DD; Azhakath AS
    Sci Rep; 2023 Feb; 13(1):2359. PubMed ID: 36759703
    [TBL] [Abstract][Full Text] [Related]  

  • 14. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
    Duan X; Liu N; Gou M; Wang W; Qin C
    Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Steganography-based voice hiding in medical images of COVID-19 patients.
    Yildirim M
    Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Efficient text encryption and hiding with double-random phase-encoding.
    Sang J; Ling S; Alam MS
    Sensors (Basel); 2012 Oct; 12(10):13441-57. PubMed ID: 23202003
    [TBL] [Abstract][Full Text] [Related]  

  • 17. DNA Privacy: Analyzing Malicious DNA Sequences Using Deep Neural Networks.
    Bae H; Min S; Choi HS; Yoon S
    IEEE/ACM Trans Comput Biol Bioinform; 2022; 19(2):888-898. PubMed ID: 32809941
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Locating secret messages based on quantitative steganalysis.
    Yang CF; Liu FL; Ge SK; Lu JC; Huang JW
    Math Biosci Eng; 2019 May; 16(5):4908-4922. PubMed ID: 31499696
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Creating Digital Watermarks in Bitmap Images Using Lagrange Interpolation and Bezier Curves.
    Yerimbetova A; Daiyrbayeva E; Merzlyakova E; Fionov A; Baisholan N; Turdalyuly M; Mukazhanov N; Turganbayev A
    J Imaging; 2023 Sep; 9(10):. PubMed ID: 37888313
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A novel steganography method for binary and color halftone images.
    Çiftci E; Sümer E
    PeerJ Comput Sci; 2022; 8():e1062. PubMed ID: 36091978
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.