首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   318篇
  免费   93篇
化学   9篇
力学   1篇
综合类   12篇
数学   33篇
物理学   356篇
  2024年   2篇
  2023年   4篇
  2022年   35篇
  2021年   28篇
  2020年   17篇
  2019年   5篇
  2018年   3篇
  2017年   32篇
  2016年   14篇
  2015年   16篇
  2014年   37篇
  2013年   27篇
  2012年   22篇
  2011年   29篇
  2010年   20篇
  2009年   22篇
  2008年   25篇
  2007年   16篇
  2006年   12篇
  2005年   13篇
  2004年   8篇
  2003年   8篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   6篇
  1997年   3篇
  1992年   1篇
排序方式: 共有411条查询结果,搜索用时 812 毫秒
11.
Xiaolei Wang  Zhilei Li  Qi Ge 《Optik》2011,122(20):1856-1859
In this paper, a new method for color-image encryption using Discrete Quaternion Fourier-Transforms (DQFT) combined with double random-phase encryption is reported, by which color images can be processed as single channel architecture, instead of as separated color components in three channels, so that the complexity of the encryption system can be effectively reduced without any reduction of its security. The principle of both encryption and decryption is detailed and the noise robustness of the system has been examined experimentally.  相似文献   
12.
An information hiding method based on the optical interference principle is proposed. In this method, a secret image can be obtained by two light beams' interference. One of the beams is modulated by our assigned host image; and the other is modulated by a noise-like complex distribution, which is regard as the encrypted image. The transmission of the encrypted image can be implemented by hiding it in the host image to prevent the communication from being perceived by unauthorized person. In addition, this method can also realize simultaneous encryption and hiding for two images. A series of numerical simulation results are presented to verify the feasibility of our proposed method.  相似文献   
13.
Application of homomorphism to secure image sharing   总被引:1,自引:0,他引:1  
In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images (l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.  相似文献   
14.
A novel phase encoding technology for phase-code multiplexing in holographic data storage (HDS) system called two-dimensional shift-orthogonal random-interleaving (2-D SORI) phase encoding is proposed. Compared with the traditional one-dimensional orthogonal phase-code multiplexing methods, the 2-D method is less sensitive to the variations of the diffraction amplitude and to the phase error of the phase mask. Phase masks for the 2-D SORI phase-code multiplexing can be generated by shifting an elaborately designed phase plate at a certain step, which can avoid the use of a high-cost phase spatial light modulator for the generation of multiple orthogonal phase masks. The cross-talk arising from the systematic phase defects of the static phase modulator is eliminated by the shift operation of the phase plate. Phase codes are interleaved under a predetermined random mapping rule to prevent unauthorized users from accessing the data and eliminate the Bragg degeneration cross-talk. A 2-D SORI phase plate with the size of 5.12 mm × 10.24 mm is designed and fabricated, from which 128 orthogonal phase patterns are generated. The feasibility of the 2-D SORI phase-code multiplexing method for HDS is experimentally demonstrated.  相似文献   
15.
Zhengjun Liu  Yan Zhang  Haifa Zhao  Shutian Liu 《Optik》2011,122(11):1010-1013
We present a novel multi-image encryption and decryption algorithm based on Fourier transform and fractional Fourier transforms. Lower frequency parts of the original images are selected, frequency shifted and encrypted by using double phase encoding in fractional Fourier domains. Multiple images are encrypted together into a single one. A simple optical setup is given to implement the proposed algorithm. This scheme has features of enhancement in decryption accuracy and high optical efficiency. Numerical results have been given to verify the validity and efficiency of the proposed scheme.  相似文献   
16.
An image encryption is discussed based on the random phase encoding method in gyrator domains. An iterative structure of image encryption is designed for introducing more random phases to encrypt image. These random phase functions are generated by a two-dimensional chaotic mapping with the help of computer. The random phases are utilized for increasing the security of this encryption algorithm. In the chaotic mapping relation, the initial value and expression can serve as the key of algorithm. The mapping relation is considered secretly for storage and transmission in practical application in comparison to traditional algorithms. The angle parameter of gyrator transform is an additional key. Some numerical simulations have been given to validate the performance of the encryption scheme.  相似文献   
17.
This paper deals with a synchronization scheme for two fractional chaotic systems which is applied in image encryption. Based on Pecora and Carroll (PC) synchronization, fractional-order Lorenz-like system forms a master–slave configuration, and the sufficient conditions are derived to realize synchronization between these two systems via the Laplace transformation theory. An image encryption algorithm is introduced where the original image is encoded by a nonlinear function of a fractional chaotic state. Simulation results show that the original image is well masked in the cipher texts and recovered successfully through chaotic signals. Further, the cryptanalysis is conducted in detail through histogram, information entropy, key space and sensitivity to verify the high security.  相似文献   
18.
LED密码算法是2011年提出的超轻量级密码算法,主要是为资源受限下物联网加密应用研发的.轻量级密码算法结构相对简单,更容易被旁路攻击成功.随机掩码是一种有效抗旁路攻击的方法,在深入LED密码算法结构研究的基础上,提出一种全随机掩码的LED密码算法CMLED.论述了CMLED算法的设计方法,从形式化方面给出了抗高阶旁路攻击选择掩码的原则.同时,对全随机掩码的CMLED与原始算法进行了硬件资源占用与加密效率对比,实验表明CMLED仍然可以高效地在智能卡上实现.  相似文献   
19.
A realizable quantum encryption algorithm for qubits   总被引:3,自引:0,他引:3       下载免费PDF全文
周南润  曾贵华 《中国物理》2005,14(11):2164-2169
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext space expanded greatly. The security of the proposed algorithm is analysed in detail and the schematic physical implementation is also provided. It is shown that the algorithm, which can prevent quantum attack strategy as well as classical attack strategy, is effective to protect qubits. Finally, we extend our algorithm to encrypt classical binary bits and quantum entanglements.  相似文献   
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号