These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

166 related articles for article (PubMed ID: 36653991)

  • 1. Adaptive visual cryptography scheme design based on QR codes.
    Zhang LN; Cui CY; Zhang XY; Wu W
    Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Two-level QR code scheme based on region matrix image secret sharing algorithm.
    Zhang LN; Sun JQ; Zhang XY; Chen QP; Zhang J
    Math Biosci Eng; 2023 Aug; 20(9):16678-16704. PubMed ID: 37920029
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A QR code-based user-friendly visual cryptography scheme.
    Ren L; Zhang D
    Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes.
    Pan JS; Liu T; Yan B; Yang HM; Chu SC
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190441
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network.
    Velumani R; Sudalaimuthu H; Choudhary G; Bama S; Jose MV; Dragoni N
    Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458944
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code.
    Wan S; Yang GZ; Qi LL; Li LL; Yan XH; Lu YL
    Math Biosci Eng; 2019 Jul; 16(6):6367-6385. PubMed ID: 31698567
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Speckle visual cryptography for credential authentication.
    Jiao A; Zhu Y; Mi Z; Zhou X; Zhu Q; Ke C; Shi Y
    Appl Opt; 2024 Jun; 63(16):4351-4359. PubMed ID: 38856613
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Visual cryptography in single-pixel imaging.
    Jiao S; Feng J; Gao Y; Lei T; Yuan X
    Opt Express; 2020 Mar; 28(5):7301-7313. PubMed ID: 32225961
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.
    Sun Y; Yang CN; Yan X; Lu Y; Sun L
    Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Nonlinear secret image sharing scheme.
    Shin SH; Lee GJ; Yoo KY
    ScientificWorldJournal; 2014; 2014():418090. PubMed ID: 25140334
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Halftone visual cryptography.
    Zhou Z; Arce GR; Di Crescenzo G
    IEEE Trans Image Process; 2006 Aug; 15(8):2441-53. PubMed ID: 16900697
    [TBL] [Abstract][Full Text] [Related]  

  • 12. One-time-pad cryptography scheme based on a three-dimensional DNA self-assembly pyramid structure.
    Peng W; Cheng D; Song C
    PLoS One; 2018; 13(11):e0206612. PubMed ID: 30399178
    [TBL] [Abstract][Full Text] [Related]  

  • 13. MAN-C: A masked autoencoder neural cryptography based encryption scheme for CT scan images.
    Kumar K; Tanwar S; Kumar S
    MethodsX; 2024 Jun; 12():102738. PubMed ID: 38715952
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Comment on "Cheating prevention in visual cryptography".
    Chen YC; Horng G; Tsai DS
    IEEE Trans Image Process; 2012 Jul; 21(7):3319-23. PubMed ID: 22410333
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Confidential QR Code Approach with Higher Information Privacy.
    Lin PY; Lan WS; Chen YH; Wu WC
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205577
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Stokes meta-hologram toward optical cryptography.
    Guo X; Li P; Zhong J; Wen D; Wei B; Liu S; Qi S; Zhao J
    Nat Commun; 2022 Nov; 13(1):6687. PubMed ID: 36335215
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cheating prevention in visual cryptography.
    Hu CM; Tzeng WG
    IEEE Trans Image Process; 2007 Jan; 16(1):36-45. PubMed ID: 17283763
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach.
    Yan B; Xiang Y; Hua G
    IEEE Trans Image Process; 2018 Oct; ():. PubMed ID: 30296234
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.
    Yuan L; Li M; Guo C; Choo KR; Ren Y
    PLoS One; 2016; 11(10):e0165512. PubMed ID: 27792784
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.