These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
166 related articles for article (PubMed ID: 36653991)
1. Adaptive visual cryptography scheme design based on QR codes. Zhang LN; Cui CY; Zhang XY; Wu W Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991 [TBL] [Abstract][Full Text] [Related]
2. Two-level QR code scheme based on region matrix image secret sharing algorithm. Zhang LN; Sun JQ; Zhang XY; Chen QP; Zhang J Math Biosci Eng; 2023 Aug; 20(9):16678-16704. PubMed ID: 37920029 [TBL] [Abstract][Full Text] [Related]
3. A QR code-based user-friendly visual cryptography scheme. Ren L; Zhang D Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203 [TBL] [Abstract][Full Text] [Related]
4. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes. Pan JS; Liu T; Yan B; Yang HM; Chu SC Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190441 [TBL] [Abstract][Full Text] [Related]
5. Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network. Velumani R; Sudalaimuthu H; Choudhary G; Bama S; Jose MV; Dragoni N Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458944 [TBL] [Abstract][Full Text] [Related]
6. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Wan S; Yang GZ; Qi LL; Li LL; Yan XH; Lu YL Math Biosci Eng; 2019 Jul; 16(6):6367-6385. PubMed ID: 31698567 [TBL] [Abstract][Full Text] [Related]
7. Speckle visual cryptography for credential authentication. Jiao A; Zhu Y; Mi Z; Zhou X; Zhu Q; Ke C; Shi Y Appl Opt; 2024 Jun; 63(16):4351-4359. PubMed ID: 38856613 [TBL] [Abstract][Full Text] [Related]
8. Visual cryptography in single-pixel imaging. Jiao S; Feng J; Gao Y; Lei T; Yuan X Opt Express; 2020 Mar; 28(5):7301-7313. PubMed ID: 32225961 [TBL] [Abstract][Full Text] [Related]
9. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization. Sun Y; Yang CN; Yan X; Lu Y; Sun L Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552 [TBL] [Abstract][Full Text] [Related]
11. Halftone visual cryptography. Zhou Z; Arce GR; Di Crescenzo G IEEE Trans Image Process; 2006 Aug; 15(8):2441-53. PubMed ID: 16900697 [TBL] [Abstract][Full Text] [Related]
12. One-time-pad cryptography scheme based on a three-dimensional DNA self-assembly pyramid structure. Peng W; Cheng D; Song C PLoS One; 2018; 13(11):e0206612. PubMed ID: 30399178 [TBL] [Abstract][Full Text] [Related]
13. MAN-C: A masked autoencoder neural cryptography based encryption scheme for CT scan images. Kumar K; Tanwar S; Kumar S MethodsX; 2024 Jun; 12():102738. PubMed ID: 38715952 [TBL] [Abstract][Full Text] [Related]
14. Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Al-Dmour H; Al-Ani A Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287 [TBL] [Abstract][Full Text] [Related]
15. Comment on "Cheating prevention in visual cryptography". Chen YC; Horng G; Tsai DS IEEE Trans Image Process; 2012 Jul; 21(7):3319-23. PubMed ID: 22410333 [TBL] [Abstract][Full Text] [Related]
16. A Confidential QR Code Approach with Higher Information Privacy. Lin PY; Lan WS; Chen YH; Wu WC Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205577 [TBL] [Abstract][Full Text] [Related]