Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
21
result(s) for
"Rooks, S. N"
Sort by:
APPENDIX TO CHRONICLE: DEATHS
1849
APRIL 1846 (pg. 212). APRIL 1848 (pg. 212). JULY 1848 (pg. 212). OCTOBER 1848 (pg. 212). NOVEMBER 1848 (pg. 212). DECEMBER 1848 (pg. 212-213). JANUARY (pg. 213-219). FEBRUARY (pg. 219-223). MARCH (pg. 223-230). APRIL (pg. 230-234). MAY (pg. 234-245). JUNE (pg. 245-250). JULY (pg. 251-257). AUGUST (pg. 257-265). SEPTEMBER (pg. 266-271). OCTOBER (pg. 272-281). NOVEMBER (pg. 281-289). DECEMBER (pg. 289-301).
Book Chapter
Edward Rook
2013
He is survived by his wife, LaVonne; his daughters, Brenda Robison, Billings, and Carla Sackmann, [Lemmon]; his son, Ed, Roundup; eight grandchildren; five great-grandchildren; four great-great-grandchildren;...
Newspaper Article
Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
by
Mashhadi, Samaneh
,
Charoghchi, Sara
,
Saeidi, Zahra
in
(t, n)‐secret image sharing
,
Embedding
,
hamming code
2024
As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A major downside of this method is its noise‐like shadows, which draw the malicious users' attention. In order to overcome this problem, SIS schemes with meaningful shadows are introduced in which the shadows are first hidden in innocent‐looking cover images and then shared. In most of these schemes, the cover image cannot be recovered without distortion, which makes them useless in case of utilising critical cover images such as military or medical images. Also, embedding the secret data in Least significant bits of the cover image, in many of these schemes, makes them very fragile to steganlysis. A reversible IWT‐based SIS scheme using Rook polynomial and Hamming code with authentication is proposed. In order to make the scheme robust to steganalysis, the shadow image is embedded in coefficients of Integer wavelet transform of the cover image. Using Rook polynomial makes the scheme more secure and moreover makes authentication very easy and with no need to share private key to participants. Also, utilising Hamming code lets us embed data with much less required modifications on the cover image which results in high‐quality stego images.
Journal Article
Touch screens called faulty Series: AROUND THE STATE
2002
Other Florida counties have signed contracts for touch screen voting systems, including Hillsborough, Pinellas, Palm Beach and Marion. Hillsborough and Pinellas' deals are with Sequoia Voting Systems, a California company. HE'S NOT FAKING ANYMORE: Pensacola school crossing guard Dale Rooks on Monday points a radar gun students bought him to replace a fake one he crafted from a hair dryer and used to bluff speeding drivers into slowing down. Rooks still cannot write tickets, but police say they will investigate any habitual speeders Rooks identifies with the radar gun. Six fifth-grade students at Suter Elementary School sold lemonade and collected donations to raise $93.93 for the real radar gun.
Newspaper Article