BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

122 related articles for article (PubMed ID: 38413801)

  • 1. Security-oriented steganographic payload allocation for multi-remote sensing images.
    Wu T; Hu X; Liu C
    Sci Rep; 2024 Feb; 14(1):4826. PubMed ID: 38413801
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Steganography and Steganalysis in Voice over IP: A Review.
    Wu Z; Guo J; Zhang C; Li C
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33546240
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors.
    Battikh D; El Assad S; Hoang TM; Bakhache B; Deforges O; Khalil M
    Entropy (Basel); 2019 Jul; 21(8):. PubMed ID: 33267462
    [TBL] [Abstract][Full Text] [Related]  

  • 4. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
    Duan X; Liu N; Gou M; Wang W; Qin C
    Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
    [TBL] [Abstract][Full Text] [Related]  

  • 5. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 6. JPEG Steganography With Content Similarity Evaluation.
    Wang Z; Feng G; Qian Z; Zhang X
    IEEE Trans Cybern; 2023 Aug; 53(8):5082-5093. PubMed ID: 35580096
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 8. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 9. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 10. RED-Net: Residual and Enhanced Discriminative Network for Image Steganalysis in the Internet of Medical Things and Telemedicine.
    Chen K; Zhou Z; Li Y; Ji X; Wu J; Coatrieux JL; Chen Y; Coatrieux G
    IEEE J Biomed Health Inform; 2024 Mar; 28(3):1611-1622. PubMed ID: 37721892
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.
    Pan YL; Wu JL
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Synchronization of Acoustic Signals for Steganographic Transmission.
    WojtuƄ J; Piotrowski Z
    Sensors (Basel); 2021 May; 21(10):. PubMed ID: 34066251
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization.
    Shankar DD; Azhakath AS
    Sci Rep; 2023 Feb; 13(1):2359. PubMed ID: 36759703
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An Enhanced Steganography Network for Concealing and Protecting Secret Image Data.
    Chen F; Xing Q; Sun B; Yan X; Cheng J
    Entropy (Basel); 2022 Aug; 24(9):. PubMed ID: 36141089
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Steganography using reversible texture synthesis.
    Wu KC; Wang CM
    IEEE Trans Image Process; 2015 Jan; 24(1):130-9. PubMed ID: 25415988
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Steganography in beautified images.
    Liu LY; Wang ZC; Qian ZX; Zhang XP; Feng GR
    Math Biosci Eng; 2019 Mar; 16(4):2322-2333. PubMed ID: 31137215
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision.
    Zheng Z; Hu Y; Bin Y; Xu X; Yang Y; Shen HT
    IEEE Trans Neural Netw Learn Syst; 2023 Nov; 34(11):9451-9465. PubMed ID: 35679383
    [TBL] [Abstract][Full Text] [Related]  

  • 18. ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks.
    Cohen A; Cohen A; Nissim N
    Neural Netw; 2020 Nov; 131():64-77. PubMed ID: 32759032
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Interval type-2 fuzzy logic system based similarity evaluation for image steganography.
    Ashraf Z; Roy ML; Muhuri PK; Lohani QMD
    Heliyon; 2020 May; 6(5):e03771. PubMed ID: 32420466
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.
    Rahman S; Uddin J; Hussain H; Ahmed A; Khan AA; Zakarya M; Rahman A; Haleem M
    Sci Rep; 2023 Aug; 13(1):14183. PubMed ID: 37648738
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.