期刊文献+
共找到4,070篇文章
< 1 2 204 >
每页显示 20 50 100
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence 被引量:1
1
作者 Xiong Zhang Minqing Zhang +3 位作者 Xu AnWang Wen Jiang Chao Jiang Pan Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期1925-1938,共14页
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe... This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information. 展开更多
关键词 Information hiding neural style transfer ROBUSTNESS
下载PDF
Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain
2
作者 Zengxiang Li Yongchong Wu +3 位作者 Alanoud Al Mazroa Donghua Jiang Jianhua Wu Xishun Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期847-869,共23页
Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robus... Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications. 展开更多
关键词 Image hiding ROBUSTNESS wavelet transform dynamic region attention
下载PDF
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding
3
作者 Kai Gao Chin-Chen Chang Chia-Chen Lin 《Computer Systems Science & Engineering》 2024年第3期813-833,共21页
Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity ... Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity reversible data hiding scheme.Based on the advantage of the multipredictor mechanism,we combine two effective prediction schemes to improve prediction accuracy.In addition,the multihistogram technique is utilized to further improve the image quality of the stego image.Moreover,a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram.Experimental results show that the quality of the stego image of our scheme outperforms state-of-the-art schemes in most cases. 展开更多
关键词 Data hiding multipredictor mechanism high-fidelity knapsack problem
下载PDF
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
4
作者 Nannan Wu Xianyi Chen +1 位作者 James Msughter Adeke Junjie Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第3期3001-3019,共19页
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s... Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks. 展开更多
关键词 Deep image hiding attention mechanism privacy protection data security visual quality
下载PDF
Analysis on the Epidemic Situation of Intercepted Alien Pests from Imported Hides in Hebei and the Countermeasures during 2013-2014
5
作者 王建昌 高瑞清 +2 位作者 张帅 王珅 王照华 《Agricultural Science & Technology》 CAS 2015年第9期2007-2010,共4页
The situation of intercepted alien pests from imported hides in Hebei during 2013-2014 was systematically analyzed. The results showed that 163 batches of alien pests were intercepted, including 2 batches of quarantin... The situation of intercepted alien pests from imported hides in Hebei during 2013-2014 was systematically analyzed. The results showed that 163 batches of alien pests were intercepted, including 2 batches of quarantine weeds and they both were Italian cocklebur. According to the statistics of original countries, the intercepted hides from 21 countries all had alien pests, in which Australia was the largest number of batches and species of alien pests. The analysis results showed that there was severe risk in the imported hides carrying alien pests, thus to effectively prevent the invasion of alien pests to our country, several quarantine measures should be taken in the future, such as enhancing the quarantine inspection in ports, and promoting the personnel ability of interception and species identification of alien pests. 展开更多
关键词 Imported hides Alien pests Quarantine measures
下载PDF
基于特征码的Imagehide与JPEGX图像隐藏信息检测以及提取 被引量:2
6
作者 胡昊然 钱萌 《科技广场》 2007年第1期125-127,共3页
信息隐藏技术利用载体中存在的冗余信息来隐藏秘密对象,以隐藏秘密信息的存在。隐写术是信息隐藏的一个重要分支。隐写分析是通过对隐密对象的分析,对秘密信息进行检测及破解的技术。本文针对Imagehide与JPEGX两种网上常见的隐写工具,... 信息隐藏技术利用载体中存在的冗余信息来隐藏秘密对象,以隐藏秘密信息的存在。隐写术是信息隐藏的一个重要分支。隐写分析是通过对隐密对象的分析,对秘密信息进行检测及破解的技术。本文针对Imagehide与JPEGX两种网上常见的隐写工具,从分析特征码出发,揭示了检测和提取秘密信息的方法,并进行了实验,取得了较好的结果,证明了该方法的有效性。 展开更多
关键词 信息隐藏 隐写分析 特征码
下载PDF
S-rough sets and the discovery of F-hiding knowledge 被引量:2
7
作者 Hao Xiumei Fu Haiyan Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第6期1171-1177,共7页
Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of onedirectional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding propert... Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of onedirectional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding properties are the basic characteristics of S-rough sets. By using the S-rough sets, the concepts of f-hiding knowledge, F-hiding knowledge, hiding degree, and hiding dependence degree are given. Then, both the hiding theorem and the hiding dependence theorem of hiding knowledge are proposed. Finally, an application of hiding knowledge is discussed. 展开更多
关键词 one-direction S-rough sets f-hiding knowledge hiding degree hiding dependence degree hiding theorem hiding dependence theorem application
下载PDF
Hiding dependence-discovery of F-hiding laws and system laws 被引量:2
8
作者 Zhou Houyong Huang Shunliang Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期543-550,共8页
Function one direction S-rough sets have dynamic characteristics and law characteristics. By using the function one direction S-rough sets, this article presents the concepts of the f-hiding law, F-hiding law, f-hidin... Function one direction S-rough sets have dynamic characteristics and law characteristics. By using the function one direction S-rough sets, this article presents the concepts of the f-hiding law, F-hiding law, f-hiding law dependence and F-hiding law dependence. Based on the concepts above, this article proposes the hidingdependence theorem of f-hiding laws, the hiding-dependence theorem of F-hiding laws, the hiding-dependence separation theorem, the hiding dependence-discovery principle of unknown laws. Finally, the application of the hiding dependence of hiding laws in the discovery of system laws is given. 展开更多
关键词 function one direction S-rough set function rough set hiding law hiding dependence the hidingdependence theorem application.
下载PDF
Image Hiding Algorithm in Discrete Cosine Transform Domain Based on Grey Prediction and Grey Relational Analysis 被引量:4
9
作者 黄海平 黄世超 +1 位作者 陈九天 王汝传 《China Communications》 SCIE CSCD 2013年第7期57-70,共14页
Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and robustness.In this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey ... Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and robustness.In this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey relational analysis in the Discrete Cosine Transform(DCT) domain is proposed.First,this algorithm compresses the secret image losslessly based on the improved grey prediction GM(1,1)(IGM) model.It then chooses the blocks of rich texture in the cover image as the embedding regions using Double-dimension Grey Relational Analysis(DGRA).Finally,it adaptively embeds the compressed secret bits stream into the DCT domain mid-frequency coefficients,which are decided by those blocks' Double-Dimension Grey Correlation Degree(DGCD) and Human Visual System(HVS).This method can ensure an adequate balance between invisibility,capacity and robustness.Experimental results show that the proposed algorithm is robust against JPEG compression(46.724 6 dB when the compression quality factor is 90%),Gaussian noise(45.531 3 dB when the parameter is(0,0.000 5)) etc.,and it is a blind information hiding algorithm that can be extracted without an original carrier. 展开更多
关键词 image information hiding IGM DGRA blind information hiding DCT
下载PDF
A New Images Hiding Scheme Based on Chaotic Sequences 被引量:2
10
作者 LIUNian-sheng GUODong-hui +1 位作者 WUBo-xi ParrG 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期303-306,共4页
We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive imag... We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit). 展开更多
关键词 information hiding chaotic sequence information security image transform
下载PDF
On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing 被引量:11
11
作者 Lizhi Xiong Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2018年第6期523-539,共17页
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou... Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels. 展开更多
关键词 Cloud data security re-encryption reversible data hiding cloud computing privacy-preserving.
下载PDF
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
12
作者 Jie Xu Li-Jun Feng Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad... An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
下载PDF
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images 被引量:4
13
作者 Yanping Zhang Juan Jiang +2 位作者 Yongliang Zha Heng Zhang Shu Zhao 《International Journal of Intelligence Science》 2013年第2期77-85,共9页
Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called em... Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called embedding efficiency. This paper mainly studies on the information hiding technology based on gray-scale digital images and especially considers the improvement of embedding capacity and embedding efficiency. For the purpose of that, two algorithms for information hiding were proposed, one is called high capacity of information hiding algorithm (HCIH for short), which achieves high embedding rate, and the other is called high quality of information hiding algorithm (HQIH for short), which realizes high embedding efficiency. The simulation experiments show that our proposed algorithms achieve better performance. 展开更多
关键词 Information hiding EMBEDDING Capacity EMBEDDING EFFICIENCY Security Peak-Signal-to-Noise-Rate(PSNR)
下载PDF
Local binary pattern-based reversible data hiding 被引量:4
14
作者 Monalisa Sahu Neelamadhab Padhy +1 位作者 Sasanko Sekhar Gantayat Aditya Kumar Sahu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2022年第4期695-709,共15页
A novel local binary pattern-based reversible data hiding(LBP-RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided ... A novel local binary pattern-based reversible data hiding(LBP-RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided into various 3×3 blocks.Then,using the LBP-based image descriptor,the LBP codes for each block are computed.Next,the obtained LBP codes are XORed with the embedding bits and are concealed in the respective blocks using the proposed pixel readjustment process.Further,each cover image(CI)pixel produces two different stego-image pixels.Likewise,during extraction,the CI pixels are restored without the loss of a single bit of information.The outcome of the proposed technique with respect to perceptual transparency measures,such as peak signal-to-noise ratio and structural similarity index,is found to be superior to that of some of the recent and state-of-the-art techniques.In addition,the proposed technique has shown excellent resilience to various stego-attacks,such as pixel difference histogram as well as regular and singular analysis.Besides,the out-off boundary pixel problem,which endures in most of the contemporary data hiding techniques,has been successfully addressed. 展开更多
关键词 hiding capacity(HC) local binary pattern(LBP) peak signal-to-noise ratio(PSNR) reversible data hiding
下载PDF
Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification 被引量:3
15
作者 Yang Du Zhaoxia Yin Xinpeng Zhang 《Computers, Materials & Continua》 SCIE EI 2018年第6期495-507,共13页
This paper proposes a lossless and high payload data hiding scheme for JPEG images by histogram modification.The most in JPEG bitstream consists of a sequence of VLCs(variable length codes)and the appended bits.Each V... This paper proposes a lossless and high payload data hiding scheme for JPEG images by histogram modification.The most in JPEG bitstream consists of a sequence of VLCs(variable length codes)and the appended bits.Each VLC has a corresponding RLV(run/length value)to record the AC/DC coefficients.To achieve lossless data hiding with high payload,we shift the histogram of VLCs and modify the DHT segment to embed data.Since we sort the histogram of VLCs in descending order,the filesize expansion is limited.The paper’s key contribution includes:Lossless data hiding,less filesize expansion in identical pay-load and higher embedding efficiency. 展开更多
关键词 LOSSLESS data hiding HISTOGRAM VLC JPEG.
下载PDF
An Image Encryption Method Based on Bit Plane Hiding Technology 被引量:1
16
作者 LIU Bin LI Zhitang TU Hao 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1283-1286,共4页
A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane ... A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effec rive. 展开更多
关键词 image hiding image fusion bit plane correlation analysis
下载PDF
Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation 被引量:4
17
作者 Qun Mo Heng Yao +2 位作者 Fang Cao Zheng Chang Chuan Qin 《Computers, Materials & Continua》 SCIE EI 2019年第4期119-133,共15页
Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on blo... Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on block classification and permutation is proposed.Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively.After block classification,content owner utilizes a specific encryption method,including stream cipher encryption and block permutation to protect image content securely.For the encrypted image,data hider embeds additional secret information in the most significant bits(MSB)of the encrypted pixels in smooth blocks and the final marked image can be obtained.At the receiver side,secret data will be extracted correctly with data-hiding key.When receiver only has encryption key,after stream cipher decryption,block scrambling decryption and MSB error prediction with threshold,decrypted image will be achieved.When data hiding key and encryption key are both obtained,receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly,hence,receiver can recover marked image losslessly.Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes. 展开更多
关键词 Reversible data hiding image encryption image recovery
下载PDF
An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization 被引量:1
18
作者 Zhi-Hui Wang Chin-Chen Chang Ting-Yu Lin 《Journal of Electronic Science and Technology》 CAS 2013年第1期15-19,共5页
Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree ... Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree structure vector quantization (CPTSVQ). The simulation result shows that the execution time of the proposed scheme is much shorter than that attained by previous approaches. 展开更多
关键词 Digital image information hiding tree structure vector quantization vector quantization.
下载PDF
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:1
19
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level Bell states
下载PDF
Angiography reveals early hiding iris neovascularization after ischemic CRVO 被引量:4
20
作者 Zhi-Qing Li Xiao-Xu Zhou +2 位作者 Song Lin Jun-Ling Li Jian-Guo Wu 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2013年第2期253-254,共2页
Dear Sir, I am Dr. Zhi-Qing Li from Tianjin Medical University Eye Hospital, Tianjin City, China. I write to present a case with hiding iris neovascularization (INV) following central retinal vein occlusion (CRVO) can... Dear Sir, I am Dr. Zhi-Qing Li from Tianjin Medical University Eye Hospital, Tianjin City, China. I write to present a case with hiding iris neovascularization (INV) following central retinal vein occlusion (CRVO) can be detected early by iris angiography (IA) and neovascular glaucoma (NVG) was 展开更多
关键词 Angiography reveals early hiding iris neovascularization after ischemic CRVO INV IA NVG Figure
下载PDF
上一页 1 2 204 下一页 到第
使用帮助 返回顶部