Information Security Scheme Based on Computational Temporal Ghost Imaging
Abstract An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption pr...
Guardado en:
Autores principales: | Shan Jiang, Yurong Wang, Tao Long, Xiangfeng Meng, Xiulun Yang, Rong Shu, Baoqing Sun |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2017
|
Materias: | |
Acceso en línea: | https://doaj.org/article/ae09a01ec0ab4583999b2f37c8ba5b47 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
DeepGhost: real-time computational ghost imaging via deep learning
por: Saad Rizvi, et al.
Publicado: (2020) -
Experimental demonstration of spectral domain computational ghost imaging
por: Piotr Ryczkowski, et al.
Publicado: (2021) -
The ghosts in the computer: the role of agency and animacy attributions in "ghost controls".
por: Francys Subiaul, et al.
Publicado: (2011) -
Counterfactual ghost imaging
por: Jonte R. Hance, et al.
Publicado: (2021) -
Generalized multi-channel scheme for secure image encryption
por: Romil Audhkhasi, et al.
Publicado: (2021)