Sign Up to like & get
recommendations!
1
Published in 2022 at "Magnetic Resonance in Medicine"
DOI: 10.1002/mrm.29419
Abstract: In an MRI system, the static magnetic field homogeneity is strictly required especially in ultrahigh field situations. However, owing to the engineering tolerances and system errors, the magnetic field homogeneity of a magnet usually cannot…
read more here.
Keywords:
shimming scheme;
passive shimming;
scheme using;
magnetic field ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6015-4
Abstract: In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos cryptosystems. In this…
read more here.
Keywords:
image encryption;
image;
diffusion;
scheme using ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of Applied Security Research"
DOI: 10.1080/19361610.2020.1838251
Abstract: Watermarking is a technique which offers more robustness and good imperceptibility. Even if the algorithmic principle is public or the existence of hidden information is known, it is difficult to a...
read more here.
Keywords:
algorithm blind;
optimized hybrid;
watermarking scheme;
scheme using ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v13.i1.pp147-154
Abstract: Sharp development progress of information technology has affected many aspects including data security. This is because classified data are often transferred between systems. In this case, data hiding exists to protect such data. Some methods…
read more here.
Keywords:
developing audio;
data hiding;
hiding scheme;
scheme using ... See more keywords