首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
为了解决传统视觉密码像素扩展度高的问题及分存图像占用存储空间过大问题,提出每次处理2个像素像素扩展度为1的(2,2)视觉密码方案.方案中,秘密图像为黑白二值图像,每次处理2个像素,得到的2个分享份额图像为黑白噪声图像,叠加分享份额恢复秘密图像.该方案解密过程简单,恢复秘密图像无变形,像素扩展度为1.  相似文献   

3.
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows, only qualified set of shadows can reveal the secret image by stacking operation. However, VCS suffers the problems of low visual quality of the revealed image and large shadow size. A (t, k, n) XOR-based visual cryptography scheme (XVCS) shares the secret image into n shadows including t essentials and n-t non-essentials. A qualified set of shadows contains any k shadows including t essentials. The revealing process is implemented by XOR operation on the involved shadows. In this paper, we propose a construction method for (t, k, n)-XVCS with essential shadows. The secret image can be revealed perfectly, and the shadow size is small compared with VCS. Theoretical analysis and experimental results show the security and effectiveness of the proposed scheme.  相似文献   

4.
In this paper, a general method of (k,n) threshold Reversible Absolute moment block truncation coding Visual Cryptography Scheme (RAVCS) is introduced for sharing a binary secret image into multiple absolute moment block truncation coding (AMBTC) shadows. A (k,k) RAVCS is firstly proposed to encode a secret by referencing one ABMTC image. Then, the proposed (k,k) RAVCS is adopted to share the same secret into multiple groups of shadows by referencing multiple images. Those multiple groups of shadows are distributed to participants according to a matrix generated by the proposed shadow distribution algorithms. When any k or more participants share their shadows, the secret image is revealed by OR or XOR decryption. Further, those AMBTC shadows can be losslessly reverted to their original forms. Sufficient theoretical analysis and extensive experimental results are provided in this paper, showing the effectiveness and advantages of the proposed method.  相似文献   

5.
In visual cryptography (VC), cheating is an important security concern where dishonest participants will fool honest ones and make them accept a fake secret by providing fake shares. Share and blind authentications are two categories of cheating prevention, and the last one relies on the inherent robust of shares against cheating attacks. In the previous studies, cheating in VC only focuses on operating a ‘pixel block’ instead of a region of adjacent pixels. However, the well-known advantage of VC is to decode the secret image by using the human vision system (HVS), so it leads to a natural issue to reconsider cheating a region. In this paper, we formally address the binocular cheating attack (BCA) for a region to augment effectiveness of original cheating for a block. Finally, we demonstrate how to realize BCA by presenting non-trivial techniques against some blind authentication schemes, and further obtain implausible results. The BCA can also be applied to halftone secret.  相似文献   

6.
7.
8.
A high contrast ( approximately 70:1), low voltage (4.2 V), asymmetric Fabry-Perot, multiquantum well, symmetric-selfelectro-optic effect device (S-SEED) is demonstrated.<>  相似文献   

9.
This article describes how organizations can fulfil their enterprise security requirements with the Cisco Internetwork Operating System.  相似文献   

10.
There is no (24, 12, 10) self-dual quaternary code   总被引:2,自引:0,他引:2  
An attempt at directly constructing a (24, 12, 10) extremal quaternary code is reported. The attempt at directly constructing the generator matrix of the code is detailed. It was found that no such code exists  相似文献   

11.
12.
王花花  马健  杨智新  杜浩然  高禄  张泽 《红外与激光工程》2021,50(9):20210450-1-20210450-7
边缘增强作为一种图像处理技术,对于研究物体边界信息有着重要的应用。根据热光鬼成像的关联机制,将鬼成像与螺旋相衬成像技术相结合,把相位物体与涡旋滤光器非定域地放在热光鬼成像系统的探测光路和参考光路中,建立了相位物体边缘增强识别系统。实验结果表明,采用具有分数阶轨道角动量拓扑荷的涡旋滤波器可以实现轨道角动量值在0~1范围内的相位物体的边缘渐变性增强效果。随着轨道角动量拓扑荷数的增加,相位物体的边缘增强效果会越明显。非定域螺旋相衬成像相较于传统的螺旋相衬成像方案,突破了被测物体和涡旋滤波器在同一光路,并且滤波器必须放置在频谱面的空间局域性限制,解除了对主动照明光源相干性的要求,增强了涡旋滤波相衬成像系统的泛化能力。  相似文献   

13.
如何打造内网安全内网安全问题是我们在制定安全策略时必须要考虑的重点之一,只有这样才能事半功倍。要想从根本上杜绝恶性攻击事件的发生,必须首先强化企业内部网络的安全防范与安全管理。1. 安全管理与安全教育在协作及知识管理等新型业务手段中,信息共享是不可或缺的,有时企业间还需要进行信息交换。“这种可以自由交换信息的环境很容易导致计算机或网络的非法利用”(Gartner)。如果要明确规定业务伙伴与职员如何正当使用知识财产,就必须与相关人员达成有法律效力的协议,而不能仅仅依靠他们的道德约束力。但是,大部分企业没有制定有关共…  相似文献   

14.
Based on generalized random grids, this paper proposes two visual cryptography methods denoted as (2, n) GRG and (2, infinity) GRG. The (2, n) GRG is suitable for the pre-decided number of shares, and the (2, infinity) method is suitable for the adjustable number of shares. The proposed (2, n) GRG achieves better contrast on the stacking result, and the proposed (2, infinity) GRG enables extending the number of shares anytime. Based on the definition of contrast in Shyu’s work in 2007, we also demonstrate that the stacking result of (2, n) GRG is close to the theoretical bound of the contrast, and the stacking result of (2, infinity) GRG achieves the theoretical bound of the contrast.  相似文献   

15.
市场上现有的大多数网络安全产品在防范内网安全问题上存在着或多或少的一些漏洞,我们结合自身多年来在实施大型网络项目上的经验,推出了自主研发的eCop系列产品,针对在内网监控方面的关键环节,提出了一整套的解决方案。1. 网络物理层安全应用网络拓扑发现工具发现内部网络的物理拓扑结构,显示当前路由器、交换机以及各主机之间的连接关系,并周期测试各网络节点之间的连通状态。网络设备监视器则通过SNMP协议实时监视各网络设备和关键主机的工作状态,一旦发现异常及时予以报警。使得网络管理员对内网的连接状况了如指掌,便于故障的快速定…  相似文献   

16.
随着计算机的应用和发展,网络安全问题越来越受到各行业、各部门领导的重视,投入了很大的精力和财力来解决计算机网络安全问题。上海宝信软件股份有限公司凭借多年来在实施大型网络项目上的经验,拥有一整套完整的解决方案,并开发了一些具有自主知识产权的网络安全产品。我们发表一系列的文章,主要讨论针对来自局域网内部的安全隐患的最新研究进展,并对这些安全问题进行分析,提出了完整的解决方案和对策。本文是第一部分,主要介绍内网的各种安全问题、发生形式和特点。内忧甚于外患2001年国家经贸委信息中心对国家重点企业和地方骨干企业的调…  相似文献   

17.
In this work, two-channel perfect reconstruction quadrature mirror filter (QMF) bank has been proposed based on the prototype filter using windowing method. A novel window function based on logarithmic function along with the spline function is utilized for the design of prototype filter. The proposed window has a variable parameter ‘\(\alpha \)’, which varies the peak side lobe level and rate of fall-off side lobe level which in turn affects the peak reconstruction error (PRE) and amplitude distortion (\(e_{am}\)) of the QMF bank . The transition width of the prototype is controlled by the spline function using the parameter ‘\(\mu \)’. The perfect reconstruction condition is satisfied by setting the cutoff frequency (\(\omega _{c}\)) of the prototype low-pass filter at ‘\(\pi /2\)’. The performance of the proposed design method has been evaluated in terms of mean square error in the pass band, mean square error in the stop band, first side lobe attenuation (\(A_{1}\)), peak reconstruction error (PRE) and amplitude error (\(e_{am}\)) for different values of ‘\(\alpha \)’ and ‘\(\mu \)’. The results are provided and compared with the existing methods.  相似文献   

18.
B-splines caught interest of many engineering applications due to their merits of being flexible and provide a large degree of differentiability and cost/quality trade-off relationship. However, they have less impact with continuous-time applications as they are constructed from piecewise polynomials. On the other hand, exponential spline polynomials (E-splines) represent the best smooth transition between continuous and discrete domains as they are made of exponential segments. In this paper, we present a complete analysis for an E-spline-based subband coding (wavelet) perfect reconstruction (PR) system. Derivations for the scaling and wavelet functions are presented, along with application of the proposed system in image compression and image denoising. In image compression, a comparison of the proposed technique compared with the B-spline-based PR system as well as the basic wavelet subband system with the SPIHT image codec is presented. In image denoising, we report the enhancement achieved with the proposed E-spline-based denoising approach compared with B-spline-based denoising and another basic denoising technique. In both applications, E-splines show superior performance as will be illustrated.  相似文献   

19.
本文从IP协议的内涵、作用与外延的一系列问题讨论出发。进一步以安全性为重点论述发展IP及NGN的理性战略思维。  相似文献   

20.
如上文所述,根据以TCP/IP协议为基础的INTERNET的发展历程可知,IP协议的最可取的内涵与作用即在于其充分的开放透明性与灵活有效的多业务增值能力。然而,要开放透明,往往便“充分暴露”,从而自然容易受到攻击。因此,INTERNET商用化后大量暴露出的一系列问题中最棘手、解决难度最大的问题即为安全性问题。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号