These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
109 related articles for article (PubMed ID: 38052633)
1. Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols. Wang Q; A JB; Manoranjitham T; Akilandeswari P; G SM; Suryawanshi S; A CEK Math Biosci Eng; 2023 Nov; 20(11):19983-20001. PubMed ID: 38052633 [TBL] [Abstract][Full Text] [Related]
2. Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography. Liu T; Vairagar S; Adagale S; Karthick T; Karunya CE; A JB; G SM Math Biosci Eng; 2024 Feb; 21(3):4762-4778. PubMed ID: 38549348 [TBL] [Abstract][Full Text] [Related]
3. Color extended visual cryptography using error diffusion. Kang I; Arce GR; Lee HK IEEE Trans Image Process; 2011 Jan; 20(1):132-45. PubMed ID: 20615812 [TBL] [Abstract][Full Text] [Related]
4. Cheating prevention in visual cryptography. Hu CM; Tzeng WG IEEE Trans Image Process; 2007 Jan; 16(1):36-45. PubMed ID: 17283763 [TBL] [Abstract][Full Text] [Related]
5. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication. Abdel Hakeem SA; Kim H Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009873 [TBL] [Abstract][Full Text] [Related]
6. Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach. Yan B; Xiang Y; Hua G IEEE Trans Image Process; 2018 Oct; ():. PubMed ID: 30296234 [TBL] [Abstract][Full Text] [Related]
7. Comment on "Cheating prevention in visual cryptography". Chen YC; Horng G; Tsai DS IEEE Trans Image Process; 2012 Jul; 21(7):3319-23. PubMed ID: 22410333 [TBL] [Abstract][Full Text] [Related]
8. Sharing visual secrets in single image random dot stereograms. Lee KH; Chiu PL IEEE Trans Image Process; 2014 Oct; 23(10):4336-47. PubMed ID: 25122571 [TBL] [Abstract][Full Text] [Related]
9. Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System. Geetha BT; Mohan P; Mayuri AVR; Jackulin T; Aldo Stalin JL; Anitha V Comput Intell Neurosci; 2022; 2022():2243827. PubMed ID: 35978898 [TBL] [Abstract][Full Text] [Related]
10. Smart healthcare system using integrated and lightweight ECC with private blockchain for multimedia medical data processing. Mahajan HB; Junnarkar AA Multimed Tools Appl; 2023 Apr; ():1-24. PubMed ID: 37362704 [TBL] [Abstract][Full Text] [Related]
11. Halftone visual cryptography. Zhou Z; Arce GR; Di Crescenzo G IEEE Trans Image Process; 2006 Aug; 15(8):2441-53. PubMed ID: 16900697 [TBL] [Abstract][Full Text] [Related]
12. Enhancing Laryngeal Spinocellular Carcinoma Image Security with DCT. Holla R; Suma D Indian J Otolaryngol Head Neck Surg; 2024 Feb; 76(1):695-701. PubMed ID: 38440514 [TBL] [Abstract][Full Text] [Related]
13. A QR code-based user-friendly visual cryptography scheme. Ren L; Zhang D Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203 [TBL] [Abstract][Full Text] [Related]
14. Neural Synchronization-Guided Concatenation of Header and Secret Shares for Secure Transmission of Patients' Electronic Medical Record: Enhancing Telehealth Security for COVID-19. Sarkar A; Singh MM; Mandal JK Arab J Sci Eng; 2021; 46(4):3301-3317. PubMed ID: 33425644 [TBL] [Abstract][Full Text] [Related]
15. Experimental quantum secure network with digital signatures and encryption. Yin HL; Fu Y; Li CL; Weng CX; Li BH; Gu J; Lu YS; Huang S; Chen ZB Natl Sci Rev; 2023 Apr; 10(4):nwac228. PubMed ID: 37168101 [TBL] [Abstract][Full Text] [Related]
16. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Wan S; Yang GZ; Qi LL; Li LL; Yan XH; Lu YL Math Biosci Eng; 2019 Jul; 16(6):6367-6385. PubMed ID: 31698567 [TBL] [Abstract][Full Text] [Related]
17. A compressed secret image sharing method with shadow image verification capability. Yang GZ; Liu LT; Yan XH Math Biosci Eng; 2020 Jun; 17(4):4295-4316. PubMed ID: 32987580 [TBL] [Abstract][Full Text] [Related]
18. SVIoT: A Secure Visual-IoT Framework for Smart Healthcare. Kaw JA; Gull S; Parah SA Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270920 [TBL] [Abstract][Full Text] [Related]
19. Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping. Wang P; Wang Y; Xiang J; Xiao X Sensors (Basel); 2022 Dec; 22(24):. PubMed ID: 36560300 [TBL] [Abstract][Full Text] [Related]
20. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. V AD; V K Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]