BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

149 related articles for article (PubMed ID: 35571336)

  • 1. Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things.
    AlEisa HN
    J Healthc Eng; 2022; 2022():7528583. PubMed ID: 35571336
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
    Mantos PL; Maglogiannis I
    J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A novel fuzzy logic-based image steganography method to ensure medical data security.
    Karakış R; Güler I; Çapraz I; Bilir E
    Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
    [TBL] [Abstract][Full Text] [Related]  

  • 5. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A review: a new authentication protocol for real-time healthcare monitoring system.
    Dewangan K; Mishra M; Dewangan NK
    Ir J Med Sci; 2021 Aug; 190(3):927-932. PubMed ID: 33145637
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission.
    Edward Jero S; Ramu P; Ramakrishnan S
    J Med Syst; 2014 Oct; 38(10):132. PubMed ID: 25187409
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Integrated Approach Using Chaotic Map & Sample Value Difference Method for Electrocardiogram Steganography and OFDM Based Secured Patient Information Transmission.
    Pandey A; Saini BS; Singh B; Sood N
    J Med Syst; 2017 Oct; 41(12):187. PubMed ID: 29043502
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Diagonal queue medical image steganography with Rabin cryptosystem.
    Jain M; Lenka SK
    Brain Inform; 2016 Mar; 3(1):39-51. PubMed ID: 27747599
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A morphologically robust chaotic map based approach to embed patient's confidential data securely in non-QRS regions of ECG signal.
    Soni N; Saini I; Singh B
    Australas Phys Eng Sci Med; 2019 Mar; 42(1):111-135. PubMed ID: 30617778
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Confidentiality in medical images through a genetic-based steganography algorithm in artificial intelligence.
    Vazquez E; Torres S; Sanchez G; Avalos JG; Abarca M; Frias T; Juarez E; Trejo C; Hernandez D
    Front Robot AI; 2022; 9():1031299. PubMed ID: 36274913
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Lossless Image Steganography Based on Invertible Neural Networks.
    Liu L; Tang L; Zheng W
    Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554167
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.
    Abd-El-Atty B; Iliyasu AM; Alaskar H; Abd El-Latif AA
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486383
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Double layer steganography technique using DNA sequences and images.
    Aljahdali AO; Al-Harbi OA
    PeerJ Comput Sci; 2023; 9():e1379. PubMed ID: 37346596
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An efficient steganography method for hiding patient confidential information.
    Al-Dmour H; Al-Ani A; Nguyen H
    Annu Int Conf IEEE Eng Med Biol Soc; 2014; 2014():222-5. PubMed ID: 25569937
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Double layer security using crypto-stego techniques: a comprehensive review.
    Jan A; Parah SA; Hussan M; Malik BA
    Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.
    Rahman S; Uddin J; Hussain H; Ahmed A; Khan AA; Zakarya M; Rahman A; Haleem M
    Sci Rep; 2023 Aug; 13(1):14183. PubMed ID: 37648738
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System.
    Ullah I; Amin NU; Khan MA; Khattak H; Kumari S
    J Med Syst; 2020 Nov; 45(1):4. PubMed ID: 33247388
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Accelerating Health Data Sharing: A Solution Based on the Internet of Things and Distributed Ledger Technologies.
    Zheng X; Sun S; Mukkamala RR; Vatrapu R; Ordieres-Meré J
    J Med Internet Res; 2019 Jun; 21(6):e13583. PubMed ID: 31172963
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.