These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

121 related articles for article (PubMed ID: 34517486)

  • 1. AMBTC-based visual secret sharing with different meaningful shadows.
    Wang S; Lu Y; Yan X; Li L; Yu Y
    Math Biosci Eng; 2021 Jun; 18(5):5236-5251. PubMed ID: 34517486
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.
    Sun Y; Yang CN; Yan X; Lu Y; Sun L
    Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Image inpainting-based behavior image secret sharing.
    Yan XH; Zhou X; Lu YL; Liu JJ; Yang GZ
    Math Biosci Eng; 2020 Mar; 17(4):2950-2966. PubMed ID: 32987509
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy.
    Lin YH; Hsia CH; Chen BY; Chen YY
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035557
    [TBL] [Abstract][Full Text] [Related]  

  • 5. High-Payload Data-Hiding Method for AMBTC Decompressed Images.
    Yeh JY; Chen CC; Liu PL; Huang YH
    Entropy (Basel); 2020 Jan; 22(2):. PubMed ID: 33285920
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A recoverable AMBTC authentication scheme using similarity embedding strategy.
    Hong W; Zhou X; Lou DC
    PLoS One; 2019; 14(2):e0212802. PubMed ID: 30811472
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A bit toggling approach for AMBTC tamper detection scheme with high image fidelity.
    Hong W; Li D; Lou DC; Zhou X; Chang CH
    PLoS One; 2020; 15(4):e0230997. PubMed ID: 32298280
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Meaningful Secret Image Sharing with Saliency Detection.
    Cheng J; Yan X; Liu L; Jiang Y; Wang X
    Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327851
    [TBL] [Abstract][Full Text] [Related]  

  • 9. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Meaningful secret image sharing for JPEG images with arbitrary quality factors.
    Jiang Y; Yan X; Chen J; Cheng J; Zhang J
    Math Biosci Eng; 2022 Aug; 19(11):11544-11562. PubMed ID: 36124603
    [TBL] [Abstract][Full Text] [Related]  

  • 11. AMBTC based high payload data hiding with modulo-2 operation and Hamming code.
    Li L; Zhang SQ; Luo T; Chang CC
    Math Biosci Eng; 2019 Aug; 16(6):7934-7949. PubMed ID: 31698648
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Fake and dishonest participant location scheme in secret image sharing.
    Liu J; Sun L; Liu J; Yan X
    Math Biosci Eng; 2021 Mar; 18(3):2473-2495. PubMed ID: 33892556
    [TBL] [Abstract][Full Text] [Related]  

  • 13. High capacity data hiding with absolute moment block truncation coding image based on interpolation.
    Kim C; Shin D; Yang CN
    Math Biosci Eng; 2019 Sep; 17(1):160-178. PubMed ID: 31731345
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection.
    Chang CC; Horng JH; Shih CS; Chang CC
    Sensors (Basel); 2020 Jul; 20(13):. PubMed ID: 32646024
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
    Mantos PL; Maglogiannis I
    J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A compressed secret image sharing method with shadow image verification capability.
    Yang GZ; Liu LT; Yan XH
    Math Biosci Eng; 2020 Jun; 17(4):4295-4316. PubMed ID: 32987580
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Novel General (
    Xing F; Yan X; Yu L; Li L
    Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327829
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Weighted visual secret sharing with multiple decryptions and lossless recovery.
    Liu F; Yan XH; Lu YL; Tan LD
    Math Biosci Eng; 2019 Jun; 16(5):5750-5764. PubMed ID: 31499736
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A QR code-based user-friendly visual cryptography scheme.
    Ren L; Zhang D
    Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.