These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

103 related articles for article (PubMed ID: 39333583)

  • 1. A robust audio steganography technique based on image encryption using different chaotic maps.
    Nasr MA; El-Shafai W; El-Rabaie EM; El-Fishawy AS; El-Hoseny HM; Abd El-Samie FE; Abdel-Salam N
    Sci Rep; 2024 Sep; 14(1):22054. PubMed ID: 39333583
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Steganography-based voice hiding in medical images of COVID-19 patients.
    Yildirim M
    Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.
    Michel-Macarty JA; Murillo-Escobar MA; López-Gutiérrez RM; Cruz-Hernández C; Cardoza-Avendaño L
    Comput Methods Programs Biomed; 2018 Aug; 162():165-175. PubMed ID: 29903483
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Double layer security using crypto-stego techniques: a comprehensive review.
    Jan A; Parah SA; Hussan M; Malik BA
    Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications.
    Yasser I; Mohamed MA; Samra AS; Khalifa F
    Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287021
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Enhanced payload volume in the least significant bits image steganography using hash function.
    Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
    PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
    [TBL] [Abstract][Full Text] [Related]  

  • 7. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
    Hacimurtazaoglu M; Tutuncu K
    PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.
    Rahman S; Uddin J; Hussain H; Ahmed A; Khan AA; Zakarya M; Rahman A; Haleem M
    Sci Rep; 2023 Aug; 13(1):14183. PubMed ID: 37648738
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Super-resolution deep neural network (SRDNN) based multi-image steganography for highly secured lossless image transmission.
    Priya S; Abirami SP; Arunkumar B; Mishachandar B
    Sci Rep; 2024 Mar; 14(1):6104. PubMed ID: 38480860
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Effective Color Image Encryption Based on Henon Map, Tent Chaotic Map, and Orthogonal Matrices.
    Kanwal S; Inam S; Othman MTB; Waqar A; Ibrahim M; Nawaz F; Nawaz Z; Hamam H
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746137
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography.
    Shashikiran BS; Shaila K; Venugopal KR
    SN Comput Sci; 2021; 2(3):139. PubMed ID: 33748775
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Non-Linear Hopped Chaos Parameters-Based Image Encryption Algorithm Using Histogram Equalization.
    Moussa KH; Naggary AIE; Mohamed HG
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33925618
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map.
    Masood F; Ahmad J; Shah SA; Jamal SS; Hussain I
    Entropy (Basel); 2020 Feb; 22(3):. PubMed ID: 33286048
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Steganography in color images with random order of pixel selection and encrypted text message embedding.
    Kordov K; Zhelezov S
    PeerJ Comput Sci; 2021; 7():e380. PubMed ID: 33817027
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem.
    Jain M; Kumar A; Choudhary RC
    Brain Inform; 2017 Jun; 4(2):95-106. PubMed ID: 27747825
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network.
    Ye J; Deng X; Zhang A; Yu H
    Entropy (Basel); 2022 Aug; 24(8):. PubMed ID: 36010767
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach.
    Hazzazi MM; Rehman MU; Shafique A; Aljaedi A; Bassfar Z; Usman AB
    Sci Rep; 2024 May; 14(1):12277. PubMed ID: 38806546
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A secure fingerprint hiding technique based on DNA sequence and mathematical function.
    Al-Ahmadi WE; Aljahdali AO; Thabit F; Munshi A
    PeerJ Comput Sci; 2024; 10():e1847. PubMed ID: 38660173
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Double layer steganography technique using DNA sequences and images.
    Aljahdali AO; Al-Harbi OA
    PeerJ Comput Sci; 2023; 9():e1379. PubMed ID: 37346596
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Complex entropy based encryption and decryption technique for securing medical images.
    Kumar V; Pathak V; Badal N; Pandey PS; Mishra R; Gupta SK
    Multimed Tools Appl; 2022; 81(26):37441-37459. PubMed ID: 35912061
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.