These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

127 related articles for article (PubMed ID: 35538203)

  • 1. A QR code-based user-friendly visual cryptography scheme.
    Ren L; Zhang D
    Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Adaptive visual cryptography scheme design based on QR codes.
    Zhang LN; Cui CY; Zhang XY; Wu W
    Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes.
    Pan JS; Liu T; Yan B; Yang HM; Chu SC
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190441
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Halftone visual cryptography.
    Zhou Z; Arce GR; Di Crescenzo G
    IEEE Trans Image Process; 2006 Aug; 15(8):2441-53. PubMed ID: 16900697
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code.
    Wan S; Yang GZ; Qi LL; Li LL; Yan XH; Lu YL
    Math Biosci Eng; 2019 Jul; 16(6):6367-6385. PubMed ID: 31698567
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Two-level QR code scheme based on region matrix image secret sharing algorithm.
    Zhang LN; Sun JQ; Zhang XY; Chen QP; Zhang J
    Math Biosci Eng; 2023 Aug; 20(9):16678-16704. PubMed ID: 37920029
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network.
    Velumani R; Sudalaimuthu H; Choudhary G; Bama S; Jose MV; Dragoni N
    Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458944
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cheating prevention in visual cryptography.
    Hu CM; Tzeng WG
    IEEE Trans Image Process; 2007 Jan; 16(1):36-45. PubMed ID: 17283763
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A neural-network approach for visual cryptography and authorization.
    Yue TW; Chiang S
    Int J Neural Syst; 2004 Jun; 14(3):175-87. PubMed ID: 15243950
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Speckle visual cryptography for credential authentication.
    Jiao A; Zhu Y; Mi Z; Zhou X; Zhu Q; Ke C; Shi Y
    Appl Opt; 2024 Jun; 63(16):4351-4359. PubMed ID: 38856613
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Li CT; Wu TY; Chen CL; Lee CC; Chen CM
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381
    [TBL] [Abstract][Full Text] [Related]  

  • 12. AMBTC-based visual secret sharing with different meaningful shadows.
    Wang S; Lu Y; Yan X; Li L; Yu Y
    Math Biosci Eng; 2021 Jun; 18(5):5236-5251. PubMed ID: 34517486
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.
    Abdel Hakeem SA; Kim H
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009873
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Sharing visual secrets in single image random dot stereograms.
    Lee KH; Chiu PL
    IEEE Trans Image Process; 2014 Oct; 23(10):4336-47. PubMed ID: 25122571
    [TBL] [Abstract][Full Text] [Related]  

  • 15. MAN-C: A masked autoencoder neural cryptography based encryption scheme for CT scan images.
    Kumar K; Tanwar S; Kumar S
    MethodsX; 2024 Jun; 12():102738. PubMed ID: 38715952
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach.
    Yan B; Xiang Y; Hua G
    IEEE Trans Image Process; 2018 Oct; ():. PubMed ID: 30296234
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Contrast Optimization for Size Invariant Visual Cryptography Scheme.
    Wu X; Fang J; Yan WQ
    IEEE Trans Image Process; 2023; 32():2174-2189. PubMed ID: 37018099
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A New Data Model for the Privacy Protection of Medical Images.
    Ren L; Zhang D
    Comput Intell Neurosci; 2022; 2022():5867215. PubMed ID: 35855794
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.
    Sun Y; Yang CN; Yan X; Lu Y; Sun L
    Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Meaningful Secret Image Sharing with Saliency Detection.
    Cheng J; Yan X; Liu L; Jiang Y; Wang X
    Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327851
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.