These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
121 related articles for article (PubMed ID: 34517486)
1. AMBTC-based visual secret sharing with different meaningful shadows. Wang S; Lu Y; Yan X; Li L; Yu Y Math Biosci Eng; 2021 Jun; 18(5):5236-5251. PubMed ID: 34517486 [TBL] [Abstract][Full Text] [Related]
2. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization. Sun Y; Yang CN; Yan X; Lu Y; Sun L Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552 [TBL] [Abstract][Full Text] [Related]
3. Image inpainting-based behavior image secret sharing. Yan XH; Zhou X; Lu YL; Liu JJ; Yang GZ Math Biosci Eng; 2020 Mar; 17(4):2950-2966. PubMed ID: 32987509 [TBL] [Abstract][Full Text] [Related]
4. Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy. Lin YH; Hsia CH; Chen BY; Chen YY Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035557 [TBL] [Abstract][Full Text] [Related]
6. A recoverable AMBTC authentication scheme using similarity embedding strategy. Hong W; Zhou X; Lou DC PLoS One; 2019; 14(2):e0212802. PubMed ID: 30811472 [TBL] [Abstract][Full Text] [Related]
7. A bit toggling approach for AMBTC tamper detection scheme with high image fidelity. Hong W; Li D; Lou DC; Zhou X; Chang CH PLoS One; 2020; 15(4):e0230997. PubMed ID: 32298280 [TBL] [Abstract][Full Text] [Related]
8. Meaningful Secret Image Sharing with Saliency Detection. Cheng J; Yan X; Liu L; Jiang Y; Wang X Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327851 [TBL] [Abstract][Full Text] [Related]
10. Meaningful secret image sharing for JPEG images with arbitrary quality factors. Jiang Y; Yan X; Chen J; Cheng J; Zhang J Math Biosci Eng; 2022 Aug; 19(11):11544-11562. PubMed ID: 36124603 [TBL] [Abstract][Full Text] [Related]
11. AMBTC based high payload data hiding with modulo-2 operation and Hamming code. Li L; Zhang SQ; Luo T; Chang CC Math Biosci Eng; 2019 Aug; 16(6):7934-7949. PubMed ID: 31698648 [TBL] [Abstract][Full Text] [Related]
12. Fake and dishonest participant location scheme in secret image sharing. Liu J; Sun L; Liu J; Yan X Math Biosci Eng; 2021 Mar; 18(3):2473-2495. PubMed ID: 33892556 [TBL] [Abstract][Full Text] [Related]
13. High capacity data hiding with absolute moment block truncation coding image based on interpolation. Kim C; Shin D; Yang CN Math Biosci Eng; 2019 Sep; 17(1):160-178. PubMed ID: 31731345 [TBL] [Abstract][Full Text] [Related]
15. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images. Mantos PL; Maglogiannis I J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526 [TBL] [Abstract][Full Text] [Related]
16. Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Al-Dmour H; Al-Ani A Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287 [TBL] [Abstract][Full Text] [Related]
17. A compressed secret image sharing method with shadow image verification capability. Yang GZ; Liu LT; Yan XH Math Biosci Eng; 2020 Jun; 17(4):4295-4316. PubMed ID: 32987580 [TBL] [Abstract][Full Text] [Related]
18. A Novel General ( Xing F; Yan X; Yu L; Li L Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327829 [TBL] [Abstract][Full Text] [Related]
19. Weighted visual secret sharing with multiple decryptions and lossless recovery. Liu F; Yan XH; Lu YL; Tan LD Math Biosci Eng; 2019 Jun; 16(5):5750-5764. PubMed ID: 31499736 [TBL] [Abstract][Full Text] [Related]
20. A QR code-based user-friendly visual cryptography scheme. Ren L; Zhang D Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]