BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

175 related articles for article (PubMed ID: 33267339)

  • 1. Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain.
    Li J; Liang X; Dai C; Xiang S
    Entropy (Basel); 2019 Jun; 21(7):. PubMed ID: 33267339
    [TBL] [Abstract][Full Text] [Related]  

  • 2. High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting.
    Chen KM; Chang CC
    Math Biosci Eng; 2019 May; 16(5):3947-3964. PubMed ID: 31499644
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing.
    Wu HT; Cheung YM; Zhuang Z; Xu L; Hu J
    IEEE Trans Cybern; 2023 Jun; 53(6):3688-3701. PubMed ID: 35427226
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Separable and error-free reversible data hiding in encrypted image with high payload.
    Yin Z; Luo B; Hong W
    ScientificWorldJournal; 2014; 2014():604876. PubMed ID: 24977214
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Multi-Directional Pixel-Swapping Approach (
    Panchikkil S; Manikandan VM; Zhang Y; Wang S
    Entropy (Basel); 2023 Mar; 25(4):. PubMed ID: 37190351
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm.
    Weng CY; Yang CH
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832576
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains.
    Bouslimi D; Bellafqira R; Coatrieux G
    Annu Int Conf IEEE Eng Med Biol Soc; 2016 Aug; 2016():2496-2499. PubMed ID: 28268831
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Logistic regression over encrypted data from fully homomorphic encryption.
    Chen H; Gilad-Bachrach R; Han K; Huang Z; Jalali A; Laine K; Lauter K
    BMC Med Genomics; 2018 Oct; 11(Suppl 4):81. PubMed ID: 30309350
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A fine-grained reversible data hiding in encrypted domain based on the cipher-text redundancy of encryption process.
    Kong YJ; Zhang MQ; Jiang ZB; Zhang X; Jiang C; Di FQ
    Heliyon; 2024 Jun; 10(11):e31542. PubMed ID: 38882386
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Separable Reversible Data Hiding in Encrypted Images for Remote Sensing Images.
    Liu R; Zhou Q; Liu J; Zhang Y; Hui Z; Zhang X
    Entropy (Basel); 2023 Dec; 25(12):. PubMed ID: 38136512
    [TBL] [Abstract][Full Text] [Related]  

  • 11. High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation.
    Cao X; Du L; Wei X; Meng D; Guo X
    IEEE Trans Cybern; 2016 May; 46(5):1132-43. PubMed ID: 25955861
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing.
    Yu H; Zhang J; Xiang Z; Liu B; Feng H
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430779
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme.
    Chen W; Ren N; Zhu C; Keskinarkaus A; Seppänen T; Zhou Q
    Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33498582
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency.
    Motomura R; Imaizumi S; Kiya H
    J Imaging; 2021 Dec; 7(12):. PubMed ID: 34940735
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Privacy-preserving approximate GWAS computation based on homomorphic encryption.
    Kim D; Son Y; Kim D; Kim A; Hong S; Cheon JH
    BMC Med Genomics; 2020 Jul; 13(Suppl 7):77. PubMed ID: 32693801
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side.
    Park S; Kim M; Seo S; Hong S; Han K; Lee K; Cheon JH; Kim S
    BMC Genomics; 2019 Apr; 20(Suppl 2):188. PubMed ID: 30967116
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms.
    Hamza R; Hassan A; Ali A; Bashir MB; Alqhtani SM; Tawfeeg TM; Yousif A
    Entropy (Basel); 2022 Apr; 24(4):. PubMed ID: 35455182
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Private predictive analysis on encrypted medical data.
    Bos JW; Lauter K; Naehrig M
    J Biomed Inform; 2014 Aug; 50():234-43. PubMed ID: 24835616
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A systematic review of homomorphic encryption and its contributions in healthcare industry.
    Munjal K; Bhatia R
    Complex Intell Systems; 2022 May; ():1-28. PubMed ID: 35531323
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.