Articles with "scheme using" as a keyword



Photo by lensingmyworld from unsplash

A novel passive shimming scheme using explicit control of magnetic field qualities with minimal use of ferromagnetic materials

Sign Up to like & get
recommendations!
Published in 2022 at "Magnetic Resonance in Medicine"

DOI: 10.1002/mrm.29419

Abstract: In an MRI system, the static magnetic field homogeneity is strictly required especially in ultrahigh field situations. However, owing to the engineering tolerances and system errors, the magnetic field homogeneity of a magnet usually cannot… read more here.

Keywords: shimming scheme; passive shimming; scheme using; magnetic field ... See more keywords
Photo by usgs from unsplash

Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6015-4

Abstract: In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos cryptosystems. In this… read more here.

Keywords: image encryption; image; diffusion; scheme using ... See more keywords
Photo by giamboscaro from unsplash

An Optimized Hybrid Algorithm for Blind Watermarking Scheme Using Singular Value Decomposition in RDWT-DCT Domain

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Applied Security Research"

DOI: 10.1080/19361610.2020.1838251

Abstract: Watermarking is a technique which offers more robustness and good imperceptibility. Even if the algorithmic principle is public or the existence of hidden information is known, it is difficult to a... read more here.

Keywords: algorithm blind; optimized hybrid; watermarking scheme; scheme using ... See more keywords
Photo by campaign_creators from unsplash

Developing audio data hiding scheme using random sample bits with logical operators

Sign Up to like & get
recommendations!
Published in 2019 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v13.i1.pp147-154

Abstract: Sharp development progress of information technology has affected many aspects including data security. This is because classified data are often transferred between systems. In this case, data hiding exists to protect such data. Some methods… read more here.

Keywords: developing audio; data hiding; hiding scheme; scheme using ... See more keywords