These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 36832576)

  • 1. Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm.
    Weng CY; Yang CH
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832576
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing.
    Yu H; Zhang J; Xiang Z; Liu B; Feng H
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430779
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Multi-Directional Pixel-Swapping Approach (
    Panchikkil S; Manikandan VM; Zhang Y; Wang S
    Entropy (Basel); 2023 Mar; 25(4):. PubMed ID: 37190351
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing.
    Wu HT; Cheung YM; Zhuang Z; Xu L; Hu J
    IEEE Trans Cybern; 2023 Jun; 53(6):3688-3701. PubMed ID: 35427226
    [TBL] [Abstract][Full Text] [Related]  

  • 5. High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation.
    Cao X; Du L; Wei X; Meng D; Guo X
    IEEE Trans Cybern; 2016 May; 46(5):1132-43. PubMed ID: 25955861
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection.
    Li L; Chang CC; Lin CC
    Entropy (Basel); 2021 Jun; 23(7):. PubMed ID: 34206604
    [TBL] [Abstract][Full Text] [Related]  

  • 7. High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting.
    Chen KM; Chang CC
    Math Biosci Eng; 2019 May; 16(5):3947-3964. PubMed ID: 31499644
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Separable Reversible Data Hiding in Encrypted Images for Remote Sensing Images.
    Liu R; Zhou Q; Liu J; Zhang Y; Hui Z; Zhang X
    Entropy (Basel); 2023 Dec; 25(12):. PubMed ID: 38136512
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A fine-grained reversible data hiding in encrypted domain based on the cipher-text redundancy of encryption process.
    Kong YJ; Zhang MQ; Jiang ZB; Zhang X; Jiang C; Di FQ
    Heliyon; 2024 Jun; 10(11):e31542. PubMed ID: 38882386
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain.
    Li J; Liang X; Dai C; Xiang S
    Entropy (Basel); 2019 Jun; 21(7):. PubMed ID: 33267339
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Nonlinear secret image sharing scheme.
    Shin SH; Lee GJ; Yoo KY
    ScientificWorldJournal; 2014; 2014():418090. PubMed ID: 25140334
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Reversible data hiding in encrypted images with multi-prediction and adaptive huffman encoding.
    Ren H; Bai GR; Chen TT; Yue Z; Ren RY
    Sci Rep; 2023 Dec; 13(1):23104. PubMed ID: 38158438
    [TBL] [Abstract][Full Text] [Related]  

  • 13. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Separable and error-free reversible data hiding in encrypted image with high payload.
    Yin Z; Luo B; Hong W
    ScientificWorldJournal; 2014; 2014():604876. PubMed ID: 24977214
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.
    Lang J
    Opt Express; 2012 Jan; 20(3):2386-98. PubMed ID: 22330477
    [TBL] [Abstract][Full Text] [Related]  

  • 16. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Towards Construction Based Data Hiding: From Secrets to Fingerprint Images.
    Li S; Zhang X
    IEEE Trans Image Process; 2018 Oct; ():. PubMed ID: 30371365
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency.
    Motomura R; Imaizumi S; Kiya H
    J Imaging; 2021 Dec; 7(12):. PubMed ID: 34940735
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Image inpainting-based behavior image secret sharing.
    Yan XH; Zhou X; Lu YL; Liu JJ; Yang GZ
    Math Biosci Eng; 2020 Mar; 17(4):2950-2966. PubMed ID: 32987509
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection.
    Chang CC; Horng JH; Shih CS; Chang CC
    Sensors (Basel); 2020 Jul; 20(13):. PubMed ID: 32646024
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.