Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Applications (1)
- BET (1)
- Breakdown (1)
- Coating (1)
- Core-shell (1)
-
- Cryptography (1)
- DSC (1)
- Device (1)
- Document Authentication (1)
- EDX (1)
- FESEM (1)
- FTIR (1)
- IR (1)
- Industrially viable solution-based processing route (1)
- Information Security (1)
- Microstructure (1)
- Morphology (1)
- Nano (1)
- Nanoparticles (1)
- Narrow grain size distribution (1)
- Precursor (1)
- Pyrochlore (1)
- Scherrer equation (1)
- Semiconductor (1)
- Sol-gel (1)
- Solution (1)
- Spinel (Zn7Sb2O12) (1)
- Steganography (1)
- TGA (1)
- Varistor (1)
Articles 1 - 2 of 2
Full-Text Articles in Systems and Communications
High Performance Zno Varistors Prepared From Nanocrystalline Precursors For Miniaturised Electronic Devices, Suresh Pillai, Declan Mccormack, John Kelly, Raghavendra Ramesh
High Performance Zno Varistors Prepared From Nanocrystalline Precursors For Miniaturised Electronic Devices, Suresh Pillai, Declan Mccormack, John Kelly, Raghavendra Ramesh
Articles
An industrially viable solution-based processing route using minimal amounts of solvent has been used to prepare bulk quantity nanopowders (average particle size 15.3 nm) for the fabrication of ZnO varistors. The xerogels, calcined powders and sintered materials were fully characterised. The preparation of varistors from nanopowders has been optimised by studying the effect of temperature on grain growth, densification and breakdown voltage. The varistors are prepared by sintering at 1050 C for 2 hours, a temperature that is significantly lower than that used in the current industrial process. Highly dense varistor discs prepared from the sintered material produce devices, with …
Covert Encryption And Document Authentication Using Texture Coding, Jonathan Blackledge, Mary Hallot
Covert Encryption And Document Authentication Using Texture Coding, Jonathan Blackledge, Mary Hallot
Articles
With the improvements in the quality of Commercial-Off-The-Shelf (COTS) printing and scanning devices, the ability to counterfeit documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying and withstand abuse and degradation. In this paper , a new approach to digital watermarking is presented and a range of possible applications are considered. The process is defined by using concepts and techniques borrowed from Cryptography. It is based on computing a 'scramble image' by …