首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1604篇
  免费   217篇
  国内免费   4篇
化学   11篇
力学   39篇
综合类   12篇
数学   82篇
物理学   404篇
无线电   1277篇
  2024年   10篇
  2023年   39篇
  2022年   66篇
  2021年   83篇
  2020年   68篇
  2019年   39篇
  2018年   49篇
  2017年   88篇
  2016年   63篇
  2015年   75篇
  2014年   166篇
  2013年   99篇
  2012年   103篇
  2011年   105篇
  2010年   77篇
  2009年   90篇
  2008年   96篇
  2007年   89篇
  2006年   90篇
  2005年   76篇
  2004年   46篇
  2003年   60篇
  2002年   21篇
  2001年   23篇
  2000年   21篇
  1999年   22篇
  1998年   18篇
  1997年   12篇
  1996年   12篇
  1995年   3篇
  1994年   2篇
  1993年   4篇
  1992年   6篇
  1991年   1篇
  1988年   1篇
  1981年   1篇
  1976年   1篇
排序方式: 共有1825条查询结果,搜索用时 0 毫秒
1.
In order to improve the transmission efficiency and security of image encryption, we combined a ZUC stream cipher and chaotic compressed sensing to perform image encryption. The parallel compressed sensing method is adopted to ensure the encryption and decryption efficiency. The ZUC stream cipher is used to sample the one-dimensional chaotic map to reduce the correlation between elements and improve the randomness of the chaotic sequence. The compressed sensing measurement matrix is constructed by using the sampled chaotic sequence to improve the image restoration effect. In order to reduce the block effect after the parallel compressed sensing operation, we also propose a method of a random block of images. Simulation analysis shows that the algorithm demonstrated better encryption and compression performance.  相似文献   
2.
Today, with the rapid development of the Internet, improving image security becomes more and more important. To improve image encryption efficiency, a novel region of interest (ROI) encryption algorithm based on a chaotic system was proposed. First, a new 1D eλ-cos-cot (1D-ECC) with better chaotic performance than the traditional chaotic system is proposed. Second, the chaotic system is used to generate a plaintext-relate keystream based on the label information of a medical image DICOM (Digital Imaging and Communications in Medicine) file, the medical image is segmented using an adaptive threshold, and the segmented region of interest is encrypted. The encryption process is divided into two stages: scrambling and diffusion. In the scrambling stage, helical scanning and index scrambling are combined to scramble. In the diffusion stage, two-dimensional bi-directional diffusion is adopted, that is, the image is bi-directionally diffused row by column to make image security better. The algorithm offers good encryption speed and security performance, according to simulation results and security analysis.  相似文献   
3.
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography.  相似文献   
4.
为了研究菲涅耳域光学图像加密系统的解密过程,提出了一种根据对称图像加密密文恢复原图像的方法.采用密文全息的逆菲涅耳变换重构出频谱强度,用CCD接收后送入计算机,根据离散菲涅耳变换的相关和复卷积的性质,对其系数进行分类和排列,可以恢复出入射光波,即可恢复原图像.并研究了对称偏差对解密图像质量的影响.结果表明,此方法可以通过离散菲涅耳衍射解密出原对称图像.  相似文献   
5.
数据脱敏,是指对数据中包含的一些涉及机密或隐私的敏感信息进行特殊处理,以达到保护私密及隐私信息不被恶意攻击者非法获取的目的.保形加密是众多数据脱敏技术的一种,但其具有保持原始数据格式不变的重要优势,从而在一定程度上对上层应用透明.随着大数据时代的到来以及Hadoop平台的广泛应用,传统的基于关系型数据库的数据脱敏技术已不能满足实际的生产需要.针对Hadoop大数据平台实现了一种基于保形加密的数据脱敏系统,支持对多种数据存储格式以及纯数字、纯字母或数字一字母混合等多种数据类型敏感数据的加密脱敏处理.然后对3种不同的实现方式进行了探讨,并开展了一系列实验对系统的加密脱敏性能进行详细的评估比较.  相似文献   
6.
Visually readable codes play a crucial role in anticounterfeiting measures. However, current coding approaches do not enable time‐dependent codes to be visually read, adjusted, and differentiated in bright and dark fields. Here, using a combined strategy of piezoelectric lattice selection, oxygen vacancy engineering, and activator doping, a lanthanide ion‐doped titanate is developed that integrates mechano‐, thermo‐, and photo‐responsive color change (>18 h for bright field), persistent luminescence (>6 h for dark field), and stimulus‐triggered multimodal luminescence. The feasibility of optical encoding, visual displaying, and stimulus‐responsive encrypting of time‐dependent, dual‐field information by using the developed material is demonstrated. In particular, the differentiated display of dual‐field modes is achieved by combining mechanostimulated abolition of only the persistent luminescence and thermo‐ and photostimulated reversal of both the color change and persistent luminescence. The results provide new insights for designing advanced materials and encryption technologies for photonic displays, information security, and intelligent anticounterfeiting.  相似文献   
7.
An open question about the asymptotic cost of connecting many processors to a large memory using three dimensions for wiring is answered, and this result is used to find the full cost of several cryptanalytic attacks. In many cases this full cost is higher than the accepted complexity of a given algorithm based on the number of processor steps. The full costs of several cryptanalytic attacks are determined, including Shanks method for computing discrete logarithms in cyclic groups of prime order n, which requires n1/2+o(1) processor steps, but, when all factors are taken into account, has full cost n2/3+o(1). Other attacks analyzed are factoring with the number field sieve, generic attacks on block ciphers, attacks on double and triple encryption, and finding hash collisions. In many cases parallel collision search gives a significant asymptotic advantage over well-known generic attacks.  相似文献   
8.
杨凤霞 《激光与红外》2014,44(1):103-107
针对图像加密,提出了一种基于Logistic映射和z-映射的图像分组加密算法,该算法在每一轮迭代中,交替使用矩阵置乱、非线性数值替换和数值关联混迭三级操作。经大量实验验证,该算法能够有效抵抗明文攻击、差分攻击、统计分析,密钥空间较大,因而安全性较高,并且加解密速度相当快,适用于数据存储。  相似文献   
9.
近年来,随着人们对移动通信业务的各种需求与日俱增,移动通信市场规模的不断扩大.在巨大的经济利益的驱使下,出现了大量利用移动通信网络的缺陷进行话费欺诈的现象,使电信运营商蒙受了巨大的经济损失.本文将对SIM卡复制的原理及利用复制SIM卡发送垃圾短信等话费欺诈行为进行深入的分析,提出针对此类问题的防范措施,以期提高移动通信...  相似文献   
10.
基于RSA算法和超混沌的复合加密方案   总被引:2,自引:0,他引:2  
结合RSA公钥算法和超混沌加密信号两者的优缺点,提出了一种基于RSA算法和超混沌的复合加密方案.理论分析和仿真结果表明,RSA算法抵抗选择密文攻击、公共模数攻击和低指数攻击的能力得到了提高,同时也不存在混沌加密方法在密钥空间设计上的问题.该方案充分利用了两种加密方法的优点,而克服了各自的缺点,因此其安全性能明显优于单独使用任一加密方法的安全性能.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号