These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

132 related articles for article (PubMed ID: 38531893)

  • 1. High-capacity data hiding for medical images based on the mask-RCNN model.
    Saidi H; Tibermacine O; Elhadad A
    Sci Rep; 2024 Mar; 14(1):7166. PubMed ID: 38531893
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
    Al-Dmour H; Al-Ani A
    Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks.
    Zhang S; Li H; Li L; Lu J; Zuo Z
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298196
    [TBL] [Abstract][Full Text] [Related]  

  • 4. SABMIS: sparse approximation based blind multi-image steganography scheme.
    Agrawal R; Ahuja K; Steinbach MC; Wick T
    PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
    [TBL] [Abstract][Full Text] [Related]  

  • 5. An Integrated Approach Using Chaotic Map & Sample Value Difference Method for Electrocardiogram Steganography and OFDM Based Secured Patient Information Transmission.
    Pandey A; Saini BS; Singh B; Sood N
    J Med Syst; 2017 Oct; 41(12):187. PubMed ID: 29043502
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Comparative performance assessment of deep learning based image steganography techniques.
    Himthani V; Dhaka VS; Kaur M; Rani G; Oza M; Lee HN
    Sci Rep; 2022 Oct; 12(1):16895. PubMed ID: 36207314
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An efficient and adaptive data-hiding scheme based on secure random matrix.
    Zhang M; Zhang S; Harn L
    PLoS One; 2019; 14(10):e0222892. PubMed ID: 31577802
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Medical image watermarking using bit threshold map based on just noticeable distortion in discrete cosine transform.
    Seo HU; Wei Q; Kwon SG; Sohng KI
    Technol Health Care; 2017 Jul; 25(S1):367-375. PubMed ID: 28582925
    [TBL] [Abstract][Full Text] [Related]  

  • 9. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
    Hardan H; Alawneh A; El-Emam NN
    PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology.
    Li J; Zhang Z; Li S; Benton R; Huang Y; Kasukurthi MV; Li D; Lin J; Borchert GM; Tan S; Li G; Ma B; Yang M; Huang J
    BMC Med Inform Decis Mak; 2020 Dec; 20(Suppl 14):297. PubMed ID: 33323108
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Novel Steganography Method for Infrared Image Based on Smooth Wavelet Transform and Convolutional Neural Network.
    Bai Y; Li L; Lu J; Zhang S; Chu N
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420527
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
    Mantos PL; Maglogiannis I
    J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.
    Pan YL; Wu JL
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A novel fuzzy logic-based image steganography method to ensure medical data security.
    Karakış R; Güler I; Çapraz I; Bilir E
    Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity.
    Kelkar V; Tuckley K; Nemade H
    J Healthc Eng; 2017; 2017():3538979. PubMed ID: 29104744
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 17. High-Payload Data-Hiding Method for AMBTC Decompressed Images.
    Yeh JY; Chen CC; Liu PL; Huang YH
    Entropy (Basel); 2020 Jan; 22(2):. PubMed ID: 33285920
    [TBL] [Abstract][Full Text] [Related]  

  • 18. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
    Duan X; Liu N; Gou M; Wang W; Qin C
    Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Robust data hiding for JPEG images with invertible neural network.
    Shang F; Lan Y; Yang J; Li E; Kang X
    Neural Netw; 2023 Jun; 163():219-232. PubMed ID: 37062180
    [TBL] [Abstract][Full Text] [Related]  

  • 20. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.