• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643668)   Today's Articles (354)   Subscriber (50597)
For: Nagm A, Safy Elwan M. Protection of the patient data against intentional attacks using a hybrid robust watermarking code. PeerJ Comput Sci 2021;7:e400. [PMID: 33834095 PMCID: PMC8022583 DOI: 10.7717/peerj-cs.400] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/14/2020] [Accepted: 01/29/2021] [Indexed: 06/12/2023]
Number Cited by Other Article(s)
1
Nagm AM, Moussa MM, Shoitan R, Ali A, Mashhour M, Salama AS, AbdulWakel HI. Detecting image manipulation with ELA-CNN integration: a powerful framework for authenticity verification. PeerJ Comput Sci 2024;10:e2205. [PMID: 39145198 PMCID: PMC11323046 DOI: 10.7717/peerj-cs.2205] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/28/2024] [Accepted: 06/26/2024] [Indexed: 08/16/2024]
2
Das SK, Rahman MZ. A secured compression technique based on encoding for sharing electronic patient data in slow-speed networks. Heliyon 2022;8:e10788. [PMID: 36203895 PMCID: PMC9529588 DOI: 10.1016/j.heliyon.2022.e10788] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/14/2021] [Revised: 02/18/2022] [Accepted: 09/22/2022] [Indexed: 11/25/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA