• Publications
  • Influence
Solution of a Robust Stabilization Problem Using YALMIP and Robust Control Toolboxes
The aim of this paper is to compare two toolboxes used for solving the robust stabilization problem. Robust static output feedback controller was designed for a continuous stirred tank reactor (CSTR)Expand
  • 2
  • 1
  • PDF
PIDDESIGN— Software for PID Control Education
Abstract The aim of this paper is to present the software PIDDESIGN. The software has been developed using MATLAB — Simulink programming environment and uses its graphical user interface to makeExpand
  • 11
  • PDF
Substitution steganography with security improved by chaotic image encryption
  • J. Oravec, J. Turán
  • Computer Science
  • IEEE 14th International Scientific Conference on…
  • 1 November 2017
TLDR
This article describes an information hiding scheme, which combines advantages of steganography and cryptography. Expand
  • 7
LSB steganography with usage of Mojette Transform for secret image scrambling
TLDR
In this paper, we have investigated a possibility of using tool known as Mojette Transform for modifying and scrambling a binary image containing secret information. Expand
  • 3
Asymmetric Image Encryption Approach with Plaintext-Related Diffusion
This paper deals with topic of image encryption based on chaotic maps. A solution which has advantage of robustness against chosen-plaintext attacks is proposed. Permutations of image pixels areExpand
  • 5
  • PDF
DESIGNING PID CONTROLLERS USING MATLAB-SIMULINK VIA THE INTERNET
In this paper, we present an Internet version of software for PID controller tuning, which is the open Web-based alternative to our former toolbox for control design. The software represents a userExpand
  • 2
  • PDF
The influence of FWM with AWG multiplexor in DWDM system
This article focuses on the creation of the sixteen-channel DWDM (Dense Wavelength Division Multiplex) system according to the recommendation ITU-T G.694.1. Currently it is not possible to form aExpand
  • 6
  • PDF
An iterative approach for image coding using Mojette transform
TLDR
We propose a set of algorithms, which would reduce the drawbacks of Mojette transform, but exploit its advantages in the field of image coding. Expand
  • 1
An image encryption scheme employing key related skipping
Abstract This paper describes an image encryption algorithm which utilizes chaotic logistic map. Values generated by this map are used in two steps of algorithm which shuffles image pixels and thenExpand
  • 1
  • PDF
Image Encryption Algorithm with Plaintext Related Chaining
TLDR
This paper describes a plaintext related image encryption algorithm that utilizes the Mojette transform for computation of bins that are subsequently combined with pixels of the processed image. Expand
  • 1
...
1
2
...