These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

180 related articles for article (PubMed ID: 34550880)

  • 1. Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning.
    Pan W; Yin Y; Wang X; Jing Y; Song M
    IEEE Trans Pattern Anal Mach Intell; 2022 Nov; 44(11):7871-7884. PubMed ID: 34550880
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Deep Image Steganography Using Transformer and Recursive Permutation.
    Wang Z; Zhou M; Liu B; Li T
    Entropy (Basel); 2022 Jun; 24(7):. PubMed ID: 35885101
    [TBL] [Abstract][Full Text] [Related]  

  • 3. High-Capacity Image Steganography Based on Improved Xception.
    Duan X; Gou M; Liu N; Wang W; Qin C
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33348833
    [TBL] [Abstract][Full Text] [Related]  

  • 4. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Comparative performance assessment of deep learning based image steganography techniques.
    Himthani V; Dhaka VS; Kaur M; Rani G; Oza M; Lee HN
    Sci Rep; 2022 Oct; 12(1):16895. PubMed ID: 36207314
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Steganography-based voice hiding in medical images of COVID-19 patients.
    Yildirim M
    Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
    [TBL] [Abstract][Full Text] [Related]  

  • 7. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Random Matrix Transformation and Its Application in Image Hiding.
    Wang J; Tan FS; Yuan Y
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679814
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Adversarial feature hybrid framework for steganography with shifted window local loss.
    Li Z; Yang X; Shen K; Jiang F; Jiang J; Ren H; Li Y
    Neural Netw; 2023 Aug; 165():358-369. PubMed ID: 37329780
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision.
    Zheng Z; Hu Y; Bin Y; Xu X; Yang Y; Shen HT
    IEEE Trans Neural Netw Learn Syst; 2023 Nov; 34(11):9451-9465. PubMed ID: 35679383
    [TBL] [Abstract][Full Text] [Related]  

  • 12. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
    Duan X; Liu N; Gou M; Wang W; Qin C
    Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Super-resolution deep neural network (SRDNN) based multi-image steganography for highly secured lossless image transmission.
    Priya S; Abirami SP; Arunkumar B; Mishachandar B
    Sci Rep; 2024 Mar; 14(1):6104. PubMed ID: 38480860
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Lossless Image Steganography Based on Invertible Neural Networks.
    Liu L; Tang L; Zheng W
    Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554167
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 16. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Multitask Identity-Aware Image Steganography via Minimax Optimization.
    Cui J; Zhang P; Li S; Zheng L; Bao C; Xia J; Li X
    IEEE Trans Image Process; 2021; 30():8567-8579. PubMed ID: 34469298
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Steganography using reversible texture synthesis.
    Wu KC; Wang CM
    IEEE Trans Image Process; 2015 Jan; 24(1):130-9. PubMed ID: 25415988
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.
    Pan YL; Wu JL
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks.
    Zhang S; Li H; Li L; Lu J; Zuo Z
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298196
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.