Carregant...
Information Security Scheme Based on Computational Temporal Ghost Imaging
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can...
Guardat en:
| Publicat a: | Sci Rep |
|---|---|
| Autors principals: | , , , , , , |
| Format: | Artigo |
| Idioma: | Inglês |
| Publicat: |
Nature Publishing Group UK
2017
|
| Matèries: | |
| Accés en línia: | https://ncbi.nlm.nih.gov/pmc/articles/PMC5550463/ https://ncbi.nlm.nih.gov/pubmed/28794473 https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1038/s41598-017-07816-2 |
| Etiquetes: |
Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|