Carregant...

Information Security Scheme Based on Computational Temporal Ghost Imaging

An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can...

Descripció completa

Guardat en:
Dades bibliogràfiques
Publicat a:Sci Rep
Autors principals: Jiang, Shan, Wang, Yurong, Long, Tao, Meng, Xiangfeng, Yang, Xiulun, Shu, Rong, Sun, Baoqing
Format: Artigo
Idioma:Inglês
Publicat: Nature Publishing Group UK 2017
Matèries:
Accés en línia:https://ncbi.nlm.nih.gov/pmc/articles/PMC5550463/
https://ncbi.nlm.nih.gov/pubmed/28794473
https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1038/s41598-017-07816-2
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!