排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
2.
3.
Quantum steganography that utilizes quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, El Allati et al. proposed a new quantum steganography using GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency. 相似文献
4.
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency. 相似文献
5.
Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext. Furthermore, it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext. Based on the given analysis, it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance. 相似文献
6.
Some new exact solutions to the Burgers--Fisher equation and generalized Burgers--Fisher equation 下载免费PDF全文
Some new exact solutions of the Burgers--Fisher equation and
generalized Burgers--Fisher equation have been obtained by using the
first integral method. These solutions include exponential function
solutions, singular solitary wave solutions and some more complex
solutions whose figures are given in the article. The result shows
that the first integral method is one of the most effective
approaches to obtain the solutions of the nonlinear partial
differential equations. 相似文献
7.
8.
描述顺流方向可变剪切流动的一类变系数Boussinesq方程的Painlevé分析和相似约化 总被引:1,自引:0,他引:1
本文研究一类描述在顺流方向上存在可变剪切流动的长波的变系数Boussinesq方程: utt {αuxxx [β f(x)]ux ωuux g(x)u}x=0的Plainleve性质及相似解,其中f(x)和g(x)是两个实函数.通过对方程进行标准的WTS检验,得到了方程可积的必要条件,即方程具有Painleve性质的条件;应用CK直接方法对方程进行了相似约化,得到了原方程的五组相似变换和相似解;用这些相似解可进一步求得方程的精确解析解. 相似文献
9.
10.