全文获取类型
收费全文 | 321篇 |
免费 | 95篇 |
国内免费 | 1篇 |
专业分类
化学 | 9篇 |
力学 | 1篇 |
综合类 | 12篇 |
数学 | 47篇 |
物理学 | 348篇 |
出版年
2024年 | 2篇 |
2023年 | 4篇 |
2022年 | 22篇 |
2021年 | 28篇 |
2020年 | 17篇 |
2019年 | 6篇 |
2018年 | 3篇 |
2017年 | 32篇 |
2016年 | 14篇 |
2015年 | 17篇 |
2014年 | 39篇 |
2013年 | 28篇 |
2012年 | 22篇 |
2011年 | 31篇 |
2010年 | 23篇 |
2009年 | 24篇 |
2008年 | 25篇 |
2007年 | 16篇 |
2006年 | 13篇 |
2005年 | 13篇 |
2004年 | 9篇 |
2003年 | 10篇 |
2002年 | 2篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 4篇 |
1992年 | 1篇 |
排序方式: 共有417条查询结果,搜索用时 31 毫秒
361.
A self-adapting image encryption algorithm based on spatiotemporal chaos and ergodic matrix
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different blocks of the same size, and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix. Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix. Finally, all modules are rearranged to acquire the final encrypted image. In particular, the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices, so different plain-images will be encrypted to obtain different cipherimages. Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks. 相似文献
362.
According to the digital image encryption, a double encryption algorithm based on the iterative Fourier transform and chaotic transform is proposed. It uses iterative Fourier transform to encrypt image for the first time, then processes the encrypted image through the chaos replacement, which can change image pure phase distribution to realize double encryption. The simulated result shows that the algorithm can effectively resist the attacks of statistical analysis, and has higher encryption effect and safety which is very sensitive to secret key. 相似文献
363.
A new method for double image encryption is proposed that is based on amplitude-phase hybrid encoding and iterative random phase encoding in fractional Fourier transform (FrFT) domains. In the iterative random phase encoding operation, a binary random matrix is defined to encode two original images to a single complex-valued image, which is then converted into a stationary white noise image by the iterative phase encoding with FrFTs. Compared with the previous schemes that uses fully phase encoding, the proposed method reduces the difference between two original images in key space and sensitivity to the FrFT orders. The primitive images can be retrieved exactly by applying correct keys with initial conditions of chaotic system, the pixel scrambling operation and the FrFT orders. Computer simulations demonstrate that the encryption method has impressively high security level and certain robustness against data loss and noise interference. 相似文献
364.
This paper proposes a color image encryption scheme based on Choquet fuzzy integral (CFI) and hyper chaotic system. The major core of the encryption algorithm is a pseudo-random number generator based on the CFI. Before encrypting the color image, the piecewise linear chaotic map (PWLCM) is used to generate the 128-bit secret keys, and the Lorenz system is iterated for limited times to generate the initial parameters of the CFI. The outputs of the CFI are used to confuse and diffuse the three components of the pixel, respectively. Experiment results and security analysis show that the scheme not only can achieve good encryption result and large key space, but also can resist against common attacks, so the scheme is reliable to be adopted for network security and secure communications. 相似文献
365.
Novel image encryption algorithm based on multiple-parameter discrete fractional random transform 总被引:1,自引:0,他引:1
A new method of digital image encryption is presented by utilizing a new multiple-parameter discrete fractional random transform. Image encryption and decryption are performed based on the index additivity and multiple parameters of the multiple-parameter fractional random transform. The plaintext and ciphertext are respectively in the spatial domain and in the fractional domain determined by the encryption keys. The proposed algorithm can resist statistic analyses effectively. The computer simulation results show that the proposed encryption algorithm is sensitive to the multiple keys, and that it has considerable robustness, noise immunity and security. 相似文献
366.
367.
We propose two approaches to encrypt color images based on interference and virtual optics. In the first method, a color image is first decomposed into three independent channels, i.e., red, green and blue. Each channel of the input image is encrypted into two random phase-only masks based on interference. In the second method, a color image is first converted into an image matrix and a color map, and only the image matrix is encrypted into random-phase masks based on interference. After the phase masks are retrieved, a concept based on virtual optics is further applied to enhance the security level. Numerical simulations are demonstrated to show the feasibility and effectiveness of the proposed methods. 相似文献
368.
基于干涉原理的虚拟光学加密系统 总被引:2,自引:0,他引:2
提出了一种虚拟光学加密系统。该光学加密系统采用了同轴全息技术的基本架构,将被加密图像作为被记录物体,而在参考光波及干涉场光路中分别引入两个独立的随机相位板,全息面上的输出即为加密结果,这两个随机相位板即为加密及解密所用密钥。理论分析表明,在恰当设置物光波与参考光波衍射场比例的情况下,任意一灰度图像均可被加密为平稳的复随机白噪声,可以抵御盲反卷积攻击。采用计算机模拟,证实了该系统的加密效果及对抗暴力攻击的能力。研究了解密时附加参数及噪音攻击对解密结果的影响,结果表明本系统抗噪音攻击能力一般,但对附加参数有极高的敏感性。 相似文献
369.
Fixed-time synchronization of a reaction-diffusion BAM neural network with distributed delay and its application to image encryption
下载免费PDF全文
![点击此处可从《Journal of Applied Analysis & Computation》网站下载免费的PDF全文](/ch/ext_images/free.gif)
In this paper, the fixed-time synchronization of reaction-diffusion BAM neural networks is investigated, where both discrete and distributed delays are taken into account. Combining Lyapunov stability theory and several integral inequalities, fixed-time synchronization criteria are established. Through sensitivity analysis, we find the key controller parameters that have a great influence on the maximum settling time. Using the chaotic sequences generated by the neural network, the color image can be encrypted by the Arnold Cat Map and the pixel diffusion. Experiments show that the image encryption algorithm designed in this paper has good properties of security and anti-attacking, which meets the requirements for the secure transmission of image information. 相似文献
370.