These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

107 related articles for article (PubMed ID: 38856613)

  • 1. Speckle visual cryptography for credential authentication.
    Jiao A; Zhu Y; Mi Z; Zhou X; Zhu Q; Ke C; Shi Y
    Appl Opt; 2024 Jun; 63(16):4351-4359. PubMed ID: 38856613
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Adaptive visual cryptography scheme design based on QR codes.
    Zhang LN; Cui CY; Zhang XY; Wu W
    Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code.
    Wan S; Yang GZ; Qi LL; Li LL; Yan XH; Lu YL
    Math Biosci Eng; 2019 Jul; 16(6):6367-6385. PubMed ID: 31698567
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A QR code-based user-friendly visual cryptography scheme.
    Ren L; Zhang D
    Sci Rep; 2022 May; 12(1):7667. PubMed ID: 35538203
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography.
    Liu T; Vairagar S; Adagale S; Karthick T; Karunya CE; A JB; G SM
    Math Biosci Eng; 2024 Feb; 21(3):4762-4778. PubMed ID: 38549348
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Halftone visual cryptography.
    Zhou Z; Arce GR; Di Crescenzo G
    IEEE Trans Image Process; 2006 Aug; 15(8):2441-53. PubMed ID: 16900697
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Visual-cryptographic image hiding with holographic optical elements.
    Yang N; Gao Q; Shi Y
    Opt Express; 2018 Nov; 26(24):31995-32006. PubMed ID: 30650778
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Two-level QR code scheme based on region matrix image secret sharing algorithm.
    Zhang LN; Sun JQ; Zhang XY; Chen QP; Zhang J
    Math Biosci Eng; 2023 Aug; 20(9):16678-16704. PubMed ID: 37920029
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach.
    Yan B; Xiang Y; Hua G
    IEEE Trans Image Process; 2018 Oct; ():. PubMed ID: 30296234
    [TBL] [Abstract][Full Text] [Related]  

  • 10. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes.
    Pan JS; Liu T; Yan B; Yang HM; Chu SC
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190441
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Highly Trustworthy In-Sensor Cryptography for Image Encryption and Authentication.
    Shao B; Wan T; Liao F; Kim BJ; Chen J; Guo J; Ma S; Ahn JH; Chai Y
    ACS Nano; 2023 Jun; 17(11):10291-10299. PubMed ID: 37186522
    [TBL] [Abstract][Full Text] [Related]  

  • 13. All optical metropolitan quantum key distribution network with post-quantum cryptography authentication.
    Yang YH; Li PY; Ma SZ; Qian XC; Zhang KY; Wang LJ; Zhang WL; Zhou F; Tang SB; Wang JY; Yu Y; Zhang Q; Pan JW
    Opt Express; 2021 Aug; 29(16):25859-25867. PubMed ID: 34614905
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.
    Abdel Hakeem SA; Kim H
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009873
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
    Chen H; Ge L; Xie L
    Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Visual cryptography in single-pixel imaging.
    Jiao S; Feng J; Gao Y; Lei T; Yuan X
    Opt Express; 2020 Mar; 28(5):7301-7313. PubMed ID: 32225961
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes.
    Wang X; Chen W; Chen X
    Opt Express; 2015 Mar; 23(5):6239-53. PubMed ID: 25836845
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.
    Choi Y; Lee D; Kim J; Jung J; Nam J; Won D
    Sensors (Basel); 2014 Jun; 14(6):10081-106. PubMed ID: 24919012
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability.
    Lee CW; Tsai WH
    IEEE Trans Image Process; 2012 Jan; 21(1):207-18. PubMed ID: 21693424
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Texture-Hidden Anti-Counterfeiting QR Code and Authentication Method.
    Wang T; Zheng H; You C; Ju J
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679589
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.