These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

120 related articles for article (PubMed ID: 34230521)

  • 21. Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network.
    Velumani R; Sudalaimuthu H; Choudhary G; Bama S; Jose MV; Dragoni N
    Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458944
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A Study of the Information Embedding Method into Raster Image Based on Interpolation.
    Daiyrbayeva E; Yerimbetova A; Nechta I; Merzlyakova E; Toigozhinova A; Turganbayev A
    J Imaging; 2022 Oct; 8(10):. PubMed ID: 36286382
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Spread spectrum image steganography.
    Marvel LM; Boncelet CR; Retter CT
    IEEE Trans Image Process; 1999; 8(8):1075-83. PubMed ID: 18267522
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Macromolecular crowding: chemistry and physics meet biology (Ascona, Switzerland, 10-14 June 2012).
    Foffi G; Pastore A; Piazza F; Temussi PA
    Phys Biol; 2013 Aug; 10(4):040301. PubMed ID: 23912807
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Secret Paper with Vinegar as an Invisible Security Ink and Fire as a Decryption Key for Information Protection.
    Chen FF; Zhu YJ; Zhang QQ; Yang RL; Qin DD; Xiong ZC
    Chemistry; 2019 Aug; 25(46):10918-10925. PubMed ID: 31211454
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Error-correcting codes and information in biology.
    Battail G
    Biosystems; 2019 Oct; 184():103987. PubMed ID: 31295534
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Controlled bidirectional quantum secure direct communication.
    Chou YH; Lin YT; Zeng GJ; Lin FJ; Chen CY
    ScientificWorldJournal; 2014; 2014():694798. PubMed ID: 25006596
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Dynamic secret-key provisioning in quantum-secured passive optical networks (PONs).
    Wang H; Zhao Y; Tornatore M; Yu X; Zhang J
    Opt Express; 2021 Jan; 29(2):1578-1596. PubMed ID: 33726370
    [TBL] [Abstract][Full Text] [Related]  

  • 29. An efficient and secure technique for image steganography using a hash function.
    Nezami ZI; Ali H; Asif M; Aljuaid H; Hamid I; Ali Z
    PeerJ Comput Sci; 2022; 8():e1157. PubMed ID: 36532801
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Multicomponent reactions provide key molecules for secret communication.
    Boukis AC; Reiter K; Frölich M; Hofheinz D; Meier MAR
    Nat Commun; 2018 Apr; 9(1):1439. PubMed ID: 29651145
    [TBL] [Abstract][Full Text] [Related]  

  • 31. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity.
    Tian Y; Bian G; Chang J; Tang Y; Li J; Ye C
    Entropy (Basel); 2023 Apr; 25(5):. PubMed ID: 37238497
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Adaptive visual cryptography scheme design based on QR codes.
    Zhang LN; Cui CY; Zhang XY; Wu W
    Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.
    Bao L; Yi S; Zhou Y
    IEEE Trans Image Process; 2017 Dec; 26(12):5618-5631. PubMed ID: 28809684
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A collaborative secret sharing scheme based on the Chinese Remainder Theorem.
    Jia XX; Song YX; Wang DS; Nie DX; Wu JZ
    Math Biosci Eng; 2019 Feb; 16(3):1280-1299. PubMed ID: 30947420
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A novel steganographic technique for medical image using SVM and IWT.
    Chowdhuri P; Pal P; Si T
    Multimed Tools Appl; 2023; 82(13):20497-20516. PubMed ID: 36628353
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Mathematical correction for fingerprint similarity measures to improve chemical retrieval.
    Swamidass SJ; Baldi P
    J Chem Inf Model; 2007; 47(3):952-64. PubMed ID: 17444629
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Secure and Reliable Key Agreement with Physical Unclonable Functions.
    Günlü O; Kernetzky T; İşcan O; Sidorenko V; Kramer G; Schaefer RF
    Entropy (Basel); 2018 May; 20(5):. PubMed ID: 33265430
    [TBL] [Abstract][Full Text] [Related]  

  • 38. A highly parallel strategy for storage of digital information in living cells.
    Akhmetov A; Ellington AD; Marcotte EM
    BMC Biotechnol; 2018 Oct; 18(1):64. PubMed ID: 30333005
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes.
    Ramos AM; Artiles JAP; Chaves DPB; Pimentel C
    Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981397
    [TBL] [Abstract][Full Text] [Related]  

  • 40.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.