首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   321篇
  免费   95篇
  国内免费   1篇
化学   9篇
力学   1篇
综合类   12篇
数学   47篇
物理学   348篇
  2024年   2篇
  2023年   4篇
  2022年   22篇
  2021年   28篇
  2020年   17篇
  2019年   6篇
  2018年   3篇
  2017年   32篇
  2016年   14篇
  2015年   17篇
  2014年   39篇
  2013年   28篇
  2012年   22篇
  2011年   31篇
  2010年   23篇
  2009年   24篇
  2008年   25篇
  2007年   16篇
  2006年   13篇
  2005年   13篇
  2004年   9篇
  2003年   10篇
  2002年   2篇
  2001年   4篇
  2000年   1篇
  1999年   1篇
  1998年   6篇
  1997年   4篇
  1992年   1篇
排序方式: 共有417条查询结果,搜索用时 31 毫秒
361.
To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different blocks of the same size, and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix. Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix. Finally, all modules are rearranged to acquire the final encrypted image. In particular, the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices, so different plain-images will be encrypted to obtain different cipherimages. Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks.  相似文献   
362.
According to the digital image encryption, a double encryption algorithm based on the iterative Fourier transform and chaotic transform is proposed. It uses iterative Fourier transform to encrypt image for the first time, then processes the encrypted image through the chaos replacement, which can change image pure phase distribution to realize double encryption. The simulated result shows that the algorithm can effectively resist the attacks of statistical analysis, and has higher encryption effect and safety which is very sensitive to secret key.  相似文献   
363.
A new method for double image encryption is proposed that is based on amplitude-phase hybrid encoding and iterative random phase encoding in fractional Fourier transform (FrFT) domains. In the iterative random phase encoding operation, a binary random matrix is defined to encode two original images to a single complex-valued image, which is then converted into a stationary white noise image by the iterative phase encoding with FrFTs. Compared with the previous schemes that uses fully phase encoding, the proposed method reduces the difference between two original images in key space and sensitivity to the FrFT orders. The primitive images can be retrieved exactly by applying correct keys with initial conditions of chaotic system, the pixel scrambling operation and the FrFT orders. Computer simulations demonstrate that the encryption method has impressively high security level and certain robustness against data loss and noise interference.  相似文献   
364.
This paper proposes a color image encryption scheme based on Choquet fuzzy integral (CFI) and hyper chaotic system. The major core of the encryption algorithm is a pseudo-random number generator based on the CFI. Before encrypting the color image, the piecewise linear chaotic map (PWLCM) is used to generate the 128-bit secret keys, and the Lorenz system is iterated for limited times to generate the initial parameters of the CFI. The outputs of the CFI are used to confuse and diffuse the three components of the pixel, respectively. Experiment results and security analysis show that the scheme not only can achieve good encryption result and large key space, but also can resist against common attacks, so the scheme is reliable to be adopted for network security and secure communications.  相似文献   
365.
A new method of digital image encryption is presented by utilizing a new multiple-parameter discrete fractional random transform. Image encryption and decryption are performed based on the index additivity and multiple parameters of the multiple-parameter fractional random transform. The plaintext and ciphertext are respectively in the spatial domain and in the fractional domain determined by the encryption keys. The proposed algorithm can resist statistic analyses effectively. The computer simulation results show that the proposed encryption algorithm is sensitive to the multiple keys, and that it has considerable robustness, noise immunity and security.  相似文献   
366.
基于Markov性质的一阶安全算术编码及应用   总被引:2,自引:0,他引:2       下载免费PDF全文
段黎力  廖晓峰  向涛 《物理学报》2010,59(10):6744-6751
基于压缩编码的加密方式能够同时完成加密和压缩的功能,通过压缩减少了信息的冗余,同时引入加密使对试图推测出明文信息和找到密钥的攻击具有非常好的鲁棒性.本文提出了一种基于一阶Markov模型的安全算术编码,在编码过程中通过随机密钥保证图像压缩编码的安全性,且显著提高编码的压缩效率,使其方便在网络中安全传输.实验结果和安全性分析表明,算法能够抵抗现有的各种基于算术编码的安全性攻击和其他密码学分析。  相似文献   
367.
We propose two approaches to encrypt color images based on interference and virtual optics. In the first method, a color image is first decomposed into three independent channels, i.e., red, green and blue. Each channel of the input image is encrypted into two random phase-only masks based on interference. In the second method, a color image is first converted into an image matrix and a color map, and only the image matrix is encrypted into random-phase masks based on interference. After the phase masks are retrieved, a concept based on virtual optics is further applied to enhance the security level. Numerical simulations are demonstrated to show the feasibility and effectiveness of the proposed methods.  相似文献   
368.
基于干涉原理的虚拟光学加密系统   总被引:2,自引:0,他引:2  
秦怡  张帅  巩琼  李根全  吕晓东 《光学学报》2012,32(10):1007001-85
提出了一种虚拟光学加密系统。该光学加密系统采用了同轴全息技术的基本架构,将被加密图像作为被记录物体,而在参考光波及干涉场光路中分别引入两个独立的随机相位板,全息面上的输出即为加密结果,这两个随机相位板即为加密及解密所用密钥。理论分析表明,在恰当设置物光波与参考光波衍射场比例的情况下,任意一灰度图像均可被加密为平稳的复随机白噪声,可以抵御盲反卷积攻击。采用计算机模拟,证实了该系统的加密效果及对抗暴力攻击的能力。研究了解密时附加参数及噪音攻击对解密结果的影响,结果表明本系统抗噪音攻击能力一般,但对附加参数有极高的敏感性。  相似文献   
369.
In this paper, the fixed-time synchronization of reaction-diffusion BAM neural networks is investigated, where both discrete and distributed delays are taken into account. Combining Lyapunov stability theory and several integral inequalities, fixed-time synchronization criteria are established. Through sensitivity analysis, we find the key controller parameters that have a great influence on the maximum settling time. Using the chaotic sequences generated by the neural network, the color image can be encrypted by the Arnold Cat Map and the pixel diffusion. Experiments show that the image encryption algorithm designed in this paper has good properties of security and anti-attacking, which meets the requirements for the secure transmission of image information.  相似文献   
370.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号