BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

126 related articles for article (PubMed ID: 37648738)

  • 1. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.
    Rahman S; Uddin J; Hussain H; Ahmed A; Khan AA; Zakarya M; Rahman A; Haleem M
    Sci Rep; 2023 Aug; 13(1):14183. PubMed ID: 37648738
    [TBL] [Abstract][Full Text] [Related]  

  • 2. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 3. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A novel fuzzy logic-based image steganography method to ensure medical data security.
    Karakış R; Güler I; Çapraz I; Bilir E
    Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Interval type-2 fuzzy logic system based similarity evaluation for image steganography.
    Ashraf Z; Roy ML; Muhuri PK; Lohani QMD
    Heliyon; 2020 May; 6(5):e03771. PubMed ID: 32420466
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A new image steganography method with optimum pixel similarity for data hiding in medical images.
    Karakus S; Avci E
    Med Hypotheses; 2020 Jun; 139():109691. PubMed ID: 32240879
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Steganography-based voice hiding in medical images of COVID-19 patients.
    Yildirim M
    Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Double layer steganography technique using DNA sequences and images.
    Aljahdali AO; Al-Harbi OA
    PeerJ Comput Sci; 2023; 9():e1379. PubMed ID: 37346596
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An efficient and secure technique for image steganography using a hash function.
    Nezami ZI; Ali H; Asif M; Aljuaid H; Hamid I; Ali Z
    PeerJ Comput Sci; 2022; 8():e1157. PubMed ID: 36532801
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography.
    Shashikiran BS; Shaila K; Venugopal KR
    SN Comput Sci; 2021; 2(3):139. PubMed ID: 33748775
    [TBL] [Abstract][Full Text] [Related]  

  • 13. High-Capacity Image Steganography Based on Improved Xception.
    Duan X; Gou M; Liu N; Wang W; Qin C
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33348833
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Double layer security using crypto-stego techniques: a comprehensive review.
    Jan A; Parah SA; Hussan M; Malik BA
    Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.
    Muhammad K; Sajjad M; Baik SW
    J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem.
    Jain M; Kumar A; Choudhary RC
    Brain Inform; 2017 Jun; 4(2):95-106. PubMed ID: 27747825
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things.
    AlEisa HN
    J Healthc Eng; 2022; 2022():7528583. PubMed ID: 35571336
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An optimal and efficient data security technique through crypto-stegano for E-commerce.
    Kumbhakar D; Sanyal K; Karforma S
    Multimed Tools Appl; 2023; 82(14):21005-21018. PubMed ID: 36778718
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning.
    Pan W; Yin Y; Wang X; Jing Y; Song M
    IEEE Trans Pattern Anal Mach Intell; 2022 Nov; 44(11):7871-7884. PubMed ID: 34550880
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.