Works matching DE "SCRAMBLING systems (Telecommunication)"
Results: 83
A new and secure digital image scrambling algorithm based on 2D cellular automata.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 5, p. 3515, doi. 10.3906/elk-1610-225
- By:
- Publication type:
- Article
Secure Speech Content Based on Scrambling and Adaptive Hiding.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 12, p. 694, doi. 10.3390/sym10120694
- By:
- Publication type:
- Article
CHAOTIC BEHAVIOR AND DYNAMICS OF MAPS USED IN A METHOD OF SCRAMBLING SIGNALS.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2010, v. 20, n. 12, p. 4097, doi. 10.1142/S0218127410028203
- By:
- Publication type:
- Article
Scrambling the New Sanitationist Synthesis: Civil Liberties and Public Health in the Age of COVID-19.
- Published in:
- University of Chicago Legal Forum, 2021, v. 2021, p. 277
- By:
- Publication type:
- Article
Image Encryption Algorithm Based on Fractional Fourier Transform.
- Published in:
- International Review on Computers & Software, 2012, v. 7, n. 5, p. 1986
- By:
- Publication type:
- Article
Examining the Design and Test Challenges of 3GPP LTE.
- Published in:
- Microwave Journal, 2007, v. 50, p. 14
- By:
- Publication type:
- Article
Iterative smoothing filtering schemes by using clipping noise-assisted signals for PAPR reduction in OFDM-based carrier aggregation systems.
- Published in:
- IET Communications (Wiley-Blackwell), 2019, v. 13, n. 6, p. 802, doi. 10.1049/iet-com.2018.5421
- By:
- Publication type:
- Article
Generation of balanced quadrature phase shift keyed sequences through guided scrambling.
- Published in:
- IET Communications (Wiley-Blackwell), 2015, v. 9, n. 11, p. 1404, doi. 10.1049/iet-com.2015.0009
- By:
- Publication type:
- Article
Reconstructing the feedback polynomial of a linear scrambler with the method of hypothesis testing.
- Published in:
- IET Communications (Wiley-Blackwell), 2015, v. 9, n. 8, p. 1044, doi. 10.1049/iet-com.2014.0109
- By:
- Publication type:
- Article
Image encryption based on random scrambling of the amplitude and phase in the frequency domain.
- Published in:
- Optical Engineering, 2009, v. 48, n. 8, p. 087005
- By:
- Publication type:
- Article
Optimization of polarization-scrambling frequency in lightwave systems.
- Published in:
- Optical Engineering, 2008, v. 47, n. 3, p. 35005, doi. 10.1117/1.2896415
- By:
- Publication type:
- Article
Robust Image Encryption Based on Balanced Cellular Automaton and Pixel Separation.
- Published in:
- Radioengineering, 2016, v. 25, n. 3, p. 548, doi. 10.13164/re.2016.0548
- By:
- Publication type:
- Article
Image Encryption Based on Improved Chaotic Sequences.
- Published in:
- Journal of Multimedia, 2013, v. 8, n. 6, p. 802, doi. 10.4304/jmm.8.6.802-808
- By:
- Publication type:
- Article
Medical Images Watermarking Algorithm Based on Improved DCT.
- Published in:
- Journal of Multimedia, 2013, v. 8, n. 6, p. 796, doi. 10.4304/jmm.8.6.796-801
- By:
- Publication type:
- Article
Secure Image Encryption without Size Limitation Using Arnold Transform and Random Strategies.
- Published in:
- Journal of Multimedia, 2011, v. 6, n. 2, p. 202, doi. 10.4304/jmm.6.2.202-206
- By:
- Publication type:
- Article
Confidentiality of Images Based on Scrambling in Spatial Domain.
- Published in:
- IUP Journal of Computer Sciences, 2010, v. 4, n. 3, p. 22
- By:
- Publication type:
- Article
IMAGE SCRAMBLING ON A "MESH-OF-TORI" ARCHITECTURE.
- Published in:
- Scalable Computing: Practice & Experience, 2014, v. 15, n. 1, p. 79, doi. 10.12694/scpe.v15i1.967
- By:
- Publication type:
- Article
Reshaped Sequential Replacement for variable selection in QSPR: comparison with other reference methods.
- Published in:
- Journal of Chemometrics, 2014, v. 28, n. 4, p. 249, doi. 10.1002/cem.2603
- By:
- Publication type:
- Article
Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2007, p. 1, doi. 10.1155/2007/83589
- By:
- Publication type:
- Article
Speech Scrambling Based on Imitation of a Target Speech Signal with Non-confidential Content.
- Published in:
- Circuits, Systems & Signal Processing, 2014, v. 33, n. 11, p. 3475, doi. 10.1007/s00034-014-9810-9
- By:
- Publication type:
- Article
The Number Theoretic Hilbert Transform.
- Published in:
- Circuits, Systems & Signal Processing, 2014, v. 33, n. 8, p. 2539, doi. 10.1007/s00034-014-9759-8
- By:
- Publication type:
- Article
Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Sychronization.
- Published in:
- EMITTER International Journal of Engineering Technology, 2018, v. 6, n. 2, p. 217, doi. 10.24003/emitter.v6i2.267
- By:
- Publication type:
- Article
DATA SCRAMBLER KNIGHT TOUR ALGORITHM.
- Published in:
- System Research & Information Technologies / Sistemnì Doslìdžennâ ta Ìnformacìjnì Tehnologìï, 2024, n. 3, p. 44, doi. 10.20535/SRIT.2308-8893.2024.3.03
- By:
- Publication type:
- Article
Non-cooperative Demodulation of LINK11_SLEW.
- Published in:
- Telecommunication Engineering, 2014, v. 54, n. 10, p. 1378, doi. 10.3969/j.issn.1001-893x.2014.10.012
- By:
- Publication type:
- Article
22.2: WITHDRAWN: 22.3: Invited Paper: Intra-Panel Interface Technology for High-Resolution Tablet PC Applications.
- Published in:
- SID Symposium Digest of Technical Papers, 2014, v. 45, n. 1, p. 283, doi. 10.1002/j.2168-0159.2014.tb00076.x
- By:
- Publication type:
- Article
ADVENT OF PHY AND MAC LAYER OPERATIONS IN WIRELESS AND LOCAL PERSONAL AREA NETWORK.
- Published in:
- ICTACT Journal on Communication Technology, 2013, v. 4, n. 4, p. 833, doi. 10.21917/ijct.2013.0118
- By:
- Publication type:
- Article
First language attrition of constraints on wh-scrambling: Does the second language have an effect?
- Published in:
- International Journal of Bilingualism, 2015, v. 19, n. 1, p. 75, doi. 10.1177/1367006913506131
- By:
- Publication type:
- Article
A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 1, p. 162, doi. 10.3837/tiis.2012.01.010
- By:
- Publication type:
- Article
A dual quantum image scrambling method.
- Published in:
- Quantum Information Processing, 2019, v. 18, n. 1, p. 1, doi. 10.1007/s11128-018-2122-4
- By:
- Publication type:
- Article
A novel quantum steganography algorithm based on LSBq for multi-wavelength quantum images.
- Published in:
- Quantum Information Processing, 2018, v. 17, n. 11, p. 1, doi. 10.1007/s11128-018-2092-6
- By:
- Publication type:
- Article
Quantum image Gray-code and bit-plane scrambling.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 5, p. 1717, doi. 10.1007/s11128-015-0964-6
- By:
- Publication type:
- Article
The syntax of two types of sluicing in Tamil.
- Published in:
- Linguistic Review, 2018, v. 35, n. 1, p. 35, doi. 10.1515/tlr-2017-0017
- By:
- Publication type:
- Article
'Scrambling' geo-referenced data to protect privacy induces bias in distance estimation.
- Published in:
- Population & Environment, 2015, v. 37, n. 1, p. 83, doi. 10.1007/s11111-014-0225-0
- By:
- Publication type:
- Article
Fibonacci Based Key Frame Selection and Scrambling for Video Watermarking in DWT-SVD Domain.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 2, p. 2011, doi. 10.1007/s11277-018-5252-1
- By:
- Publication type:
- Article
An SVD Based Location Specific Robust Color Image Watermarking Scheme Using RDWT and Arnold Scrambling.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 2, p. 2223, doi. 10.1007/s11277-017-4971-z
- By:
- Publication type:
- Article
Modified Alternating Step Generators with Non-Linear Scrambler.
- Published in:
- Annales UMCS, Informatica, 2014, v. 14, n. 1, p. 61, doi. 10.2478/umcsinfo-2014-0003
- By:
- Publication type:
- Article
FBI scrambles to stop scrambling.
- Published in:
- Bulletin of the Atomic Scientists, 1991, v. 47, n. 6, p. 4
- Publication type:
- Article
Enhance Telecommunication Security Through the Integration of Support Vector Machines.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 633, doi. 10.14569/ijacsa.2024.0150364
- By:
- Publication type:
- Article
An Improved Image Scrambling Algorithm Using {2<sup>n</sup> -1, 2<sup>n</sup>, 2<sup>n</sup> +1}.
- Published in:
- Computing & Information Systems, 2018, v. 22, n. 3, p. 1
- By:
- Publication type:
- Article
Quantized DCT Coefficient Category Address Encryption for JPEG Image.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 4, p. 1790, doi. 10.3837/tiis.2016.04.018
- By:
- Publication type:
- Article
A Novel Image Encryption Scheme Based on Collatz Conjecture.
- Published in:
- Entropy, 2018, v. 20, n. 12, p. 901, doi. 10.3390/e20120901
- By:
- Publication type:
- Article
Imperceptible digital watermarking scheme in multiple transform domains.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 23, p. 30251, doi. 10.1007/s11042-018-6128-9
- By:
- Publication type:
- Article
A chaos based image steganographic system.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 21, p. 27851, doi. 10.1007/s11042-018-5996-3
- By:
- Publication type:
- Article
Robust color image watermarking using invariant quaternion Legendre-Fourier moments.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 19, p. 24727, doi. 10.1007/s11042-018-5670-9
- By:
- Publication type:
- Article
Visual secret sharing in halftone images by multi-scale error diffusion.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 10, p. 12111, doi. 10.1007/s11042-017-4861-0
- By:
- Publication type:
- Article
A plaintext-related image encryption algorithm based on chaos.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 6, p. 6647, doi. 10.1007/s11042-017-4577-1
- By:
- Publication type:
- Article
Steganography of digital watermark by Arnold scrambling transform with blind source separation morphological component analysis.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 5, p. 6821, doi. 10.1007/s11042-015-3205-1
- By:
- Publication type:
- Article
Digital image scrambling based on elementary cellular automata.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 24, p. 17019, doi. 10.1007/s11042-015-2972-z
- By:
- Publication type:
- Article
Protecting patient confidential information based on ECG reversible data hiding.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13733, doi. 10.1007/s11042-015-2706-2
- By:
- Publication type:
- Article
Image scrambling based on chaotic sequences and Veginère cipher.
- Published in:
- Multimedia Tools & Applications, 2013, v. 66, n. 3, p. 573, doi. 10.1007/s11042-012-1281-z
- By:
- Publication type:
- Article