首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   50篇
  免费   0篇
化学   14篇
综合类   1篇
数学   5篇
物理学   30篇
  2024年   1篇
  2023年   13篇
  2021年   1篇
  2017年   3篇
  2016年   2篇
  2015年   1篇
  2014年   5篇
  2013年   2篇
  2012年   1篇
  2011年   5篇
  2010年   4篇
  2009年   4篇
  2008年   3篇
  2007年   3篇
  2006年   1篇
  1999年   1篇
排序方式: 共有50条查询结果,搜索用时 0 毫秒
1.
基于两步正交相移干涉的振幅图像光学加密技术   总被引:1,自引:1,他引:1  
提出一种基于两步正交相移干涉的光学图像加密技术.这种相移干涉数字全息只要记录两幅干涉图,不需要记录物光波和参考光波的强度信息,就可以再现没有零级像和共轭像的再现像.物光波对应的光路经过两次菲涅尔变换,并结合双随机相位编码.参考光分别引入0和π/2相位,用数字化记录介质记录两幅数字全息图作为加密图像.解密时只要获得正确的密钥,经过简单的计算就可以重建清晰的原始图像.模拟实验验证了它的可行性和有效性,分析了抗裁剪和噪音的鲁棒性.  相似文献   
2.
A novel nonlinear image encryption scheme based on a fully phase nonzero-order joint transform correlator architecture (JTC) in the Gyrator domain (GD) is proposed. In this encryption scheme, the two non-overlapping data distributions of the input plane of the JTC are fully encoded in phase and this input plane is transformed using the Gyrator transform (GT); the intensity distribution captured in the GD represents a new definition of the joint Gyrator power distribution (JGPD). The JGPD is modified by two nonlinear operations with the purpose of retrieving the encrypted image, with enhancement of the decrypted signal quality and improvement of the overall security. There are three keys used in the encryption scheme, two random phase masks and the rotation angle of the GT, which are all necessary for a proper decryption. Decryption is highly sensitivity to changes of the rotation angle of the GT as well as to little changes in other parameters or keys. The proposed encryption scheme in the GD still preserves the shift-invariance properties originated in the JTC-based encryption in the Fourier domain. The proposed encryption scheme is more resistant to brute force attacks, chosen-plaintext attacks, known-plaintext attacks, and ciphertext-only attacks, as they have been introduced in the cryptanalysis of the JTC-based encryption system. Numerical results are presented and discussed in order to verify and analyze the feasibility and validity of the novel encryption–decryption scheme.  相似文献   
3.
几种光学图象相位加密方法的比较   总被引:2,自引:1,他引:2  
本文分析比较了多种实现光学图象相位加密的方法,发现不同方法获得的加密图象有不同类型的噪音分布.无论加密相位是随机相位模板、浑沌序列的相位列阵,还是用相位重构迭代算法计算的结果,它们都能起到加密图象的功能.解密图象的质量或被相关识别的能力与解密过程中所使用正确解密相位的不同部分以及高低频分量多少有关,且其依赖程度是由不同的加密方法自身决定.  相似文献   
4.
A cascaded Fresnel digital hologram (CFDH) is proposed, together with its mathematical derivation. Its application to watermarking has been demonstrated by a simulation procedure, in which the watermark image to be hidden is encoded into the phase of the host image. The watermark image can be deciphered by the CFDH setup, the reconstructed image shows good quality and the error is almost closed to zeros. Compared with previous technique, this is a lensless architecture, which minimizes the hardware requirement.  相似文献   
5.
We propose a modified encryption joint transform correlator scheme that introduces an additional random phase mask. The positions of both the conventional and the new mask are crucial for successful recovery of the original data. Although the two random phase masks are 2D, variation of their relative distance constitutes an additional dimension. Consequently by including this notion, both random phase masks act as a 3-dimensional (3D) key code increasing thereby the security with respect to the conventional JTC encryption scheme. We employ this scheme to multiplex encrypted data, displacing the encoding masks. During decryption of the multiplexed information, we only reconstruct the object that matches the correct predetermined 3D key code, i.e. that matches the random masks positions in the encryption step. We present actual experimental results, by using BSO crystal as recording medium, as well as their respective analysis.  相似文献   
6.
We develop an experimental protocol to visualize decrypted images that otherwise would have been barely recognizable, while keeping the standard security levels. This image deterioration is partly due to the natural speckle noise as well as the practical limitations arising from the optical elements composing the setup. This protocol is based on an optical image synthesis with digital holography using enlarged sub-samples of an entire image together with a multiplexing technique. We implement the process using a Mach-Zehnder interferometer with a joint transform correlator encrypting architecture. As a result, we get smaller speckle patterns on the final assembled image and a spatial frequency enhancement with respect to the decoded image obtained with the conventional procedures.  相似文献   
7.
Many living organisms have the superb structure-editing capacity for better adaptation in dynamic environments over the course of their life cycle. However, it's still challenging to replicate such natural structure-editing capacity into artificial hydrogel actuating systems for enhancing environment-interactive functions. Herein, we learn from the metamorphosis development of glowing octopus to construct proof-of-concept fluorescent hydrogel actuators with life-like structure-editing capacity by developing a universal stepwise inside-out growth strategy. These actuators could perform origami-like 3D shape deformation and also enable the postnatal growth of new structures to adapt additional actuating states for different visual information delivery by using different environment keys (e.g., temperature, pH). This study opens previously unidentified-avenues of bio-inspired hydrogel actuators/robotics and extends the potential uses for environment-interactive information encryption.  相似文献   
8.
The development of ultra-long room-temperature phosphorescence (UL-RTP) in processable amorphous organic materials is highly desirable for applications in flexible displays, anti-counterfeiting, and bio-imaging. However, achieving efficient UL-RTP from amorphous materials remains a challenging task, especially with activation by visible light and a bright afterglow. Here we report a general and rational molecular-design strategy to enable efficient visible-light-excited UL-RTP by multi-esterification of a rigid large-plane phosphorescence core. Notably, multi-esterification minimizes the aggregation-induced quenching and accomplishes a ′four birds with one stone′ possibility in the generation and radiation process of UL-RTP: i) shifting the excitation from ultraviolet light to blue-light through enhancing the transition dipole moment of low-lying singlet-states, ii) facilitating the intersystem crossing process through the incorporation of lone-pair electrons, iii) boosting the decay process of long-lived triplet excitons resulting from a significantly increased transition dipole moment, and iv) reducing the intrinsic triplet nonradiative decay by substitution of high-frequency vibrating hydrogen atoms. All these factors synergistically contribute to the most efficient and stable visible-light-stimulated UL-RTP (lifetime up to 2.01 s and efficiency up to 35.4 % upon excitation at 450 nm) in flexible films using multi-esterified coronene, which allows high-tech applications in single-component time-delayed white light-emitting diodes and information technology based on flashlight-activated afterglow encryption.  相似文献   
9.
A mixed scrambling operation is defined by the use of Arnold transform and Baker mapping. Following a designed sequence, the combined scrambling operation is utilized for changing the pixel position of secret image under the control of a random matrix. At the same time, the pixel value is altered by random bit shift for obtaining an encrypted image encoded in N-bit data. The operations mentioned above are employed for all pixels of original secret image. Finally an encrypted image is obtained and encoded into N-bit data being from the input image. Some numerical simulations have been achieved for checking the performance of the image hiding scheme.  相似文献   
10.
于晓娟 《光谱实验室》2009,26(4):982-985
在大量的彩色图像处理工作中,已研究和发展了许多方法和技术对光谱颜色进行定量的控制、变换。无论失真彩色复现,还是假彩色合成,均能做到颜色的定量描述。本论文阐述用彩色光谱的三维属性进行编码演算,在浩瀚的颜色空间中进行线性和非线性的颜色参量映射变换,形成难以辨认和难以破解的密码图,对文本、图像的传递实现加密,是一个创新的技术。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号