These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

123 related articles for article (PubMed ID: 33286372)

  • 1. Distributed Steganography in PDF Files-Secrets Hidden in Modified Pages.
    Koptyra K; Ogiela MR
    Entropy (Basel); 2020 May; 22(6):. PubMed ID: 33286372
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A novel steganography method for binary and color halftone images.
    Çiftci E; Sümer E
    PeerJ Comput Sci; 2022; 8():e1062. PubMed ID: 36091978
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.
    Taleby Ahvanooey M; Li Q; Hou J; Rajput AR; Chen Y
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267069
    [TBL] [Abstract][Full Text] [Related]  

  • 4. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Steganography in color images with random order of pixel selection and encrypted text message embedding.
    Kordov K; Zhelezov S
    PeerJ Comput Sci; 2021; 7():e380. PubMed ID: 33817027
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Steganography in IoT: Information Hiding with Joystick and Touch Sensors.
    Koptyra K; Ogiela MR
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991998
    [TBL] [Abstract][Full Text] [Related]  

  • 7. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 8. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An efficient and secure technique for image steganography using a hash function.
    Nezami ZI; Ali H; Asif M; Aljuaid H; Hamid I; Ali Z
    PeerJ Comput Sci; 2022; 8():e1157. PubMed ID: 36532801
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Effective Electrocardiogram Steganography Based on Coefficient Alignment.
    Yang CY; Wang WF
    J Med Syst; 2016 Mar; 40(3):66. PubMed ID: 26711443
    [TBL] [Abstract][Full Text] [Related]  

  • 11. High capacity reversible data hiding in MP3 based on Huffman table transformation.
    Tan DW; Lu YL; Yan XH; Liu LT; Li LL
    Math Biosci Eng; 2019 Apr; 16(4):3183-3194. PubMed ID: 31137257
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Confidentiality in medical images through a genetic-based steganography algorithm in artificial intelligence.
    Vazquez E; Torres S; Sanchez G; Avalos JG; Abarca M; Frias T; Juarez E; Trejo C; Hernandez D
    Front Robot AI; 2022; 9():1031299. PubMed ID: 36274913
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
    Ding K; Hu T; Niu W; Liu X; He J; Yin M; Zhang X
    Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36080965
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning.
    Pan W; Yin Y; Wang X; Jing Y; Song M
    IEEE Trans Pattern Anal Mach Intell; 2022 Nov; 44(11):7871-7884. PubMed ID: 34550880
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Steganographic coding scheme based on dither convolutional trellis under resampling mechanism.
    Cao PC; Liu WW; Liu GJ; Zhai JT; Ji XP; Dai YW
    Math Biosci Eng; 2019 Jun; 16(5):6015-6033. PubMed ID: 31499750
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Spread spectrum image steganography.
    Marvel LM; Boncelet CR; Retter CT
    IEEE Trans Image Process; 1999; 8(8):1075-83. PubMed ID: 18267522
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A new image steganography method with optimum pixel similarity for data hiding in medical images.
    Karakus S; Avci E
    Med Hypotheses; 2020 Jun; 139():109691. PubMed ID: 32240879
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Interval type-2 fuzzy logic system based similarity evaluation for image steganography.
    Ashraf Z; Roy ML; Muhuri PK; Lohani QMD
    Heliyon; 2020 May; 6(5):e03771. PubMed ID: 32420466
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Deep Image Steganography Using Transformer and Recursive Permutation.
    Wang Z; Zhou M; Liu B; Li T
    Entropy (Basel); 2022 Jun; 24(7):. PubMed ID: 35885101
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.