A carregar...

Information Security Scheme Based on Computational Temporal Ghost Imaging

An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can...

ver descrição completa

Na minha lista:
Detalhes bibliográficos
Publicado no:Sci Rep
Main Authors: Jiang, Shan, Wang, Yurong, Long, Tao, Meng, Xiangfeng, Yang, Xiulun, Shu, Rong, Sun, Baoqing
Formato: Artigo
Idioma:Inglês
Publicado em: Nature Publishing Group UK 2017
Assuntos:
Acesso em linha:https://ncbi.nlm.nih.gov/pmc/articles/PMC5550463/
https://ncbi.nlm.nih.gov/pubmed/28794473
https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1038/s41598-017-07816-2
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!