Information Security Scheme Based on Computational Temporal Ghost Imaging

Abstract An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption pr...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Shan Jiang, Yurong Wang, Tao Long, Xiangfeng Meng, Xiulun Yang, Rong Shu, Baoqing Sun
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2017
Materias:
R
Q
Acceso en línea:https://doaj.org/article/ae09a01ec0ab4583999b2f37c8ba5b47
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!