TITLE

Feedback

PUB. DATE
September 1991
SOURCE
New Scientist;9/21/91, Vol. 131 Issue 1787, p56
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article presents news briefs related to the field of scientific research as of September 21, 1991. Bob Reid, boss of British Rail, recently rebuffed criticism of Britain's railway system by quoting the tiny percentage of complaining customers. Thomson Consumer Electronics's Research Laboratories in Strasbourg are to be found in the new Parc d'Innovation just outside town. These are the labs where Thomson does all its work on scrambling video and TV signals. The scrambling system relies for security on computer codes.
ACCESSION #
14718066

 

Related Articles

  • Midian releases plug-in encryption.  // Mobile Radio Technology;Aug2003, Vol. 21 Issue 8, p72 

    Reports that Midian Electronics released the MOT-TVS-2-J1, a high-level rolling code scrambler for the Motorola HT-1000 radio versions C and higher in the U.S. Availability; Key features; Applicability.

  • Zero Byte Time Slot Interchange.  // Network Dictionary;2007, p540 

    An encyclopedia entry for "Zero Byte Time Slot Interchange (ZBTSI)" is presented. In telecommunication, this refers to a technique used to ensure pulse density for clear channel capability. It is applied to a Dynamic Systems Initiative (DSI) frame, where bits 2 through 193 of each frame are...

  • Non-cooperative Demodulation of LINK11_SLEW. CHEN Zhu // Telecommunication Engineering;Oct2014, Vol. 54 Issue 10, p1378 

    According to the waveform protocol and frame structure of LINK11_SLEW, an analog demodulation of LINK11_SLEW in complex channel is proceeded at first, then the correlation synchronization, frequency measurements with restructuring the preamble data, channel equalization with adaptive filtering...

  • Image Scrambling Based on Linear Distortion. Shanshan Li; Jiang'an Wang; Bayi Qu // International Journal of Digital Content Technology & its Applic;Dec2012, Vol. 6 Issue 23, p610 

    A novel image scrambling algorithm based on linear distortion is proposed in this paper. The scrambling process is performed in frequency domain with a two-dimensional encryption key to change the amplitude and phase components of image signal respectively. Because pixel value of scrambling...

  • Study on Digital Image Scrambling Algorithm. Wu Xue // Journal of Networks;Jul2013, Vol. 8 Issue 7, p1673 

    Encryption algorithm of traditional cryptology has strong safety, but the effect of encrypting images is not good. Digital image scrambling means that a digital image is transformed into a chaotic image which has no evident significance, but the operator can reconstruct the chaotic image into...

  • Reconstruction of Linear Scrambler with Block Data. Yong-wei Sun; Li-min Zhang; Yu Ma // Applied Mechanics & Materials;2014, Vol. 701/702, p114 

    In this paper, we proposed a scheme to reconstruct the synchronous scrambler placed after a direct sequence spreader. The scheme was first based on the assumption that the spreading code was known and then extended to the unknown situation. The reconstruction algorithm took advantage of the...

  • A New Image Scrambling Scheme through Chaotic Permutation and Geometric Grid based Noise Induction. Jagadeesh, Prabhudev; Nagabhushan, P.; Kumar, R. Pradeep // International Journal of Computer Applications;Sep2013, Vol. 78, p38 

    Digital images cover the major portion of data that is being exchanged over communication network. When digital images are personal or confidential a high level security has to be provided. Traditional Encryption which is normally used to disguise data making it unintelligible to unauthorized...

  • Double-Image Encryption based on Fractional Fourier Transformation and Pixel Scrambling. Liu Xia; Wu Xiaowei; Wang Bo; Cao Yu // Advances in Information Sciences & Service Sciences;May2013, Vol. 5 Issue 10, p63 

    In this paper, a novel image encryption method is presented by combining random phase encoding in the fractional Fourier domain with pixel scrambling to realize double-image encryption. At first, the two original image needed to encrypt are encoded as the phase-based and the amplitude-based...

  • Secure Image Encryption and Decryption in Full Motion Video. Reddy, S. Raghunath; Srikanth, K.; Swathi, T. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p3259 

    Encryption and Decryption is mainly used to transfer the data between the two communication channels. This paper explains the normal approach of the encryption as well as decryption by using chaotic algorithm and also tried to implement this in video frames. Here the basic chaotic encryption...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics