These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

163 related articles for article (PubMed ID: 33546240)

  • 1. Steganography and Steganalysis in Voice over IP: A Review.
    Wu Z; Guo J; Zhang C; Li C
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33546240
    [TBL] [Abstract][Full Text] [Related]  

  • 2. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 3. ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks.
    Cohen A; Cohen A; Nissim N
    Neural Netw; 2020 Nov; 131():64-77. PubMed ID: 32759032
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Locating secret messages based on quantitative steganalysis.
    Yang CF; Liu FL; Ge SK; Lu JC; Huang JW
    Math Biosci Eng; 2019 May; 16(5):4908-4922. PubMed ID: 31499696
    [TBL] [Abstract][Full Text] [Related]  

  • 5. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
    Duan X; Liu N; Gou M; Wang W; Qin C
    Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security-oriented steganographic payload allocation for multi-remote sensing images.
    Wu T; Hu X; Liu C
    Sci Rep; 2024 Feb; 14(1):4826. PubMed ID: 38413801
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Three-Dimensional Mesh Steganography and Steganalysis: A Review.
    Zhou H; Zhang W; Chen K; Li W; Yu N
    IEEE Trans Vis Comput Graph; 2022 Dec; 28(12):5006-5025. PubMed ID: 33886472
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision.
    Zheng Z; Hu Y; Bin Y; Xu X; Yang Y; Shen HT
    IEEE Trans Neural Netw Learn Syst; 2023 Nov; 34(11):9451-9465. PubMed ID: 35679383
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.
    Taleby Ahvanooey M; Li Q; Hou J; Rajput AR; Chen Y
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267069
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Steganographic Analysis of Blockchains.
    Giron AA; Martina JE; Custódio R
    Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34199274
    [TBL] [Abstract][Full Text] [Related]  

  • 11. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 12. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.
    Watzlaf VJ; Moeini S; Firouzan P
    Int J Telerehabil; 2010; 2(2):3-14. PubMed ID: 25945172
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes.
    Tasdemir K; Kurugollu F; Sezer S
    IEEE Trans Image Process; 2016 Jul; 25(7):3316-3328. PubMed ID: 28113715
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264.
    Cao M; Tian L; Li C
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32937998
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Steganography-based voice hiding in medical images of COVID-19 patients.
    Yildirim M
    Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A convolutional neural network-based linguistic steganalysis for synonym substitution steganography.
    Xiang LY; Guo GQ; Yu JM; Sheng VS; Yang P
    Math Biosci Eng; 2019 Nov; 17(2):1041-1058. PubMed ID: 32233569
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion.
    Zhang Y; Zhu J; Xue M; Zhang X; Cao X
    IEEE Trans Vis Comput Graph; 2024 Aug; 30(8):5299-5312. PubMed ID: 37363849
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Adversarial feature hybrid framework for steganography with shifted window local loss.
    Li Z; Yang X; Shen K; Jiang F; Jiang J; Ren H; Li Y
    Neural Netw; 2023 Aug; 165():358-369. PubMed ID: 37329780
    [TBL] [Abstract][Full Text] [Related]  

  • 20. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.
    Watzlaf VJ; Moeini S; Matusow L; Firouzan P
    Int J Telerehabil; 2011; 3(1):3-10. PubMed ID: 25945177
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.