BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

223 related articles for article (PubMed ID: 36532802)

  • 1. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.
    Pan YL; Wu JL
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204
    [TBL] [Abstract][Full Text] [Related]  

  • 3. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Covert Communication through Robust Fragment Hiding in a Large Number of Images.
    Wang P; Zhong H; Feng Y; Gong L; Tang Y; Lu ZM; Wang L
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257719
    [TBL] [Abstract][Full Text] [Related]  

  • 5. An RGB colour image steganography scheme using overlapping block-based pixel-value differencing.
    Prasad S; Pal AK
    R Soc Open Sci; 2017 Apr; 4(4):161066. PubMed ID: 28484623
    [TBL] [Abstract][Full Text] [Related]  

  • 6. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Steganography using reversible texture synthesis.
    Wu KC; Wang CM
    IEEE Trans Image Process; 2015 Jan; 24(1):130-9. PubMed ID: 25415988
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Steganography-based voice hiding in medical images of COVID-19 patients.
    Yildirim M
    Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
    [TBL] [Abstract][Full Text] [Related]  

  • 9. High-Capacity Image Steganography Based on Improved Xception.
    Duan X; Gou M; Liu N; Wang W; Qin C
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33348833
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage.
    Pan P; Wu Z; Yang C; Zhao B
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205541
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An efficient and adaptive data-hiding scheme based on secure random matrix.
    Zhang M; Zhang S; Harn L
    PLoS One; 2019; 14(10):e0222892. PubMed ID: 31577802
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Interval type-2 fuzzy logic system based similarity evaluation for image steganography.
    Ashraf Z; Roy ML; Muhuri PK; Lohani QMD
    Heliyon; 2020 May; 6(5):e03771. PubMed ID: 32420466
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Double layer steganography technique using DNA sequences and images.
    Aljahdali AO; Al-Harbi OA
    PeerJ Comput Sci; 2023; 9():e1379. PubMed ID: 37346596
    [TBL] [Abstract][Full Text] [Related]  

  • 15. High-Payload Data-Hiding Method for AMBTC Decompressed Images.
    Yeh JY; Chen CC; Liu PL; Huang YH
    Entropy (Basel); 2020 Jan; 22(2):. PubMed ID: 33285920
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Lossless Image Steganography Based on Invertible Neural Networks.
    Liu L; Tang L; Zheng W
    Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554167
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 18. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
    Duan X; Liu N; Gou M; Wang W; Qin C
    Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Comparative performance assessment of deep learning based image steganography techniques.
    Himthani V; Dhaka VS; Kaur M; Rani G; Oza M; Lee HN
    Sci Rep; 2022 Oct; 12(1):16895. PubMed ID: 36207314
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.