期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Optical encryption scheme based on ghost imaging with disordered speckles 被引量:4
1
作者 张玉东 赵生妹 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第5期160-164,共5页
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the... An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key. 展开更多
关键词 ghost encryption secure speckle recover authorized disordered users reconstructed PSNR
下载PDF
GUEST EDITORIAL
2
作者 Supeng Leng Yan Zhang Nei Kato 《China Communications》 SCIE CSCD 2017年第1期18-19,共2页
The IEEE/CIC International Conference on Communication in China(ICCC)has been globally recognized as one of the important annual international conference held by the IEEE Communication Society(Com Soc)and China In... The IEEE/CIC International Conference on Communication in China(ICCC)has been globally recognized as one of the important annual international conference held by the IEEE Communication Society(Com Soc)and China Institute of Communication(CIC)in China.IEEE/CIC ICCC 2016, 展开更多
关键词 globally fifth users desired distinguished carefully authority permission Chengdu maximize
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部