These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
120 related articles for article (PubMed ID: 34230521)
21. Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network. Velumani R; Sudalaimuthu H; Choudhary G; Bama S; Jose MV; Dragoni N Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458944 [TBL] [Abstract][Full Text] [Related]
22. A Study of the Information Embedding Method into Raster Image Based on Interpolation. Daiyrbayeva E; Yerimbetova A; Nechta I; Merzlyakova E; Toigozhinova A; Turganbayev A J Imaging; 2022 Oct; 8(10):. PubMed ID: 36286382 [TBL] [Abstract][Full Text] [Related]
25. Secret Paper with Vinegar as an Invisible Security Ink and Fire as a Decryption Key for Information Protection. Chen FF; Zhu YJ; Zhang QQ; Yang RL; Qin DD; Xiong ZC Chemistry; 2019 Aug; 25(46):10918-10925. PubMed ID: 31211454 [TBL] [Abstract][Full Text] [Related]
26. Error-correcting codes and information in biology. Battail G Biosystems; 2019 Oct; 184():103987. PubMed ID: 31295534 [TBL] [Abstract][Full Text] [Related]
27. Controlled bidirectional quantum secure direct communication. Chou YH; Lin YT; Zeng GJ; Lin FJ; Chen CY ScientificWorldJournal; 2014; 2014():694798. PubMed ID: 25006596 [TBL] [Abstract][Full Text] [Related]
29. An efficient and secure technique for image steganography using a hash function. Nezami ZI; Ali H; Asif M; Aljuaid H; Hamid I; Ali Z PeerJ Comput Sci; 2022; 8():e1157. PubMed ID: 36532801 [TBL] [Abstract][Full Text] [Related]
30. Multicomponent reactions provide key molecules for secret communication. Boukis AC; Reiter K; Frölich M; Hofheinz D; Meier MAR Nat Commun; 2018 Apr; 9(1):1439. PubMed ID: 29651145 [TBL] [Abstract][Full Text] [Related]
31. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity. Tian Y; Bian G; Chang J; Tang Y; Li J; Ye C Entropy (Basel); 2023 Apr; 25(5):. PubMed ID: 37238497 [TBL] [Abstract][Full Text] [Related]
32. Adaptive visual cryptography scheme design based on QR codes. Zhang LN; Cui CY; Zhang XY; Wu W Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991 [TBL] [Abstract][Full Text] [Related]
33. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing. Bao L; Yi S; Zhou Y IEEE Trans Image Process; 2017 Dec; 26(12):5618-5631. PubMed ID: 28809684 [TBL] [Abstract][Full Text] [Related]
34. A collaborative secret sharing scheme based on the Chinese Remainder Theorem. Jia XX; Song YX; Wang DS; Nie DX; Wu JZ Math Biosci Eng; 2019 Feb; 16(3):1280-1299. PubMed ID: 30947420 [TBL] [Abstract][Full Text] [Related]
35. A novel steganographic technique for medical image using SVM and IWT. Chowdhuri P; Pal P; Si T Multimed Tools Appl; 2023; 82(13):20497-20516. PubMed ID: 36628353 [TBL] [Abstract][Full Text] [Related]
36. Mathematical correction for fingerprint similarity measures to improve chemical retrieval. Swamidass SJ; Baldi P J Chem Inf Model; 2007; 47(3):952-64. PubMed ID: 17444629 [TBL] [Abstract][Full Text] [Related]
38. A highly parallel strategy for storage of digital information in living cells. Akhmetov A; Ellington AD; Marcotte EM BMC Biotechnol; 2018 Oct; 18(1):64. PubMed ID: 30333005 [TBL] [Abstract][Full Text] [Related]
39. A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes. Ramos AM; Artiles JAP; Chaves DPB; Pimentel C Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981397 [TBL] [Abstract][Full Text] [Related]