首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24篇
  免费   0篇
电工技术   1篇
化学工业   3篇
轻工业   2篇
无线电   5篇
一般工业技术   5篇
自动化技术   8篇
  2021年   4篇
  2020年   2篇
  2019年   2篇
  2018年   4篇
  2017年   4篇
  2016年   2篇
  2015年   1篇
  2014年   2篇
  2013年   1篇
  2011年   1篇
  2010年   1篇
排序方式: 共有24条查询结果,搜索用时 31 毫秒
11.
12.

With the rapid escalation of information technology and the internet, the digital image has turned out to be a vital medium for communication. Hence, there is an increasing demand to protect these digital images as they are transmitted over the insecure medium such as the Internet. This paper proposes the Genetic Algorithm influenced image encryption scheme. Both crossover and mutation operations were performed to enhance the statistical measures of the grayscale cipher images. Intra-pixel bit manipulation improved the diffusion property during mutation. Crossover accomplished the generation of offspring with the confluence of image intensities and keys. The chaotic Logistic and Tent maps provided improvement in keyspace through their role in the generation of initial seeds. Noticeably, the initial seeds were generated from the features of input image such as minimum & maximum number of occurrences of intensity and minimum & maximum intensity levels. In this regard, every image will accompany a unique key sequence as a session key which needs to be shared with the intended receiver for the distortion-free recovery of original images. Besides, the multi-point genetic crossover was employed for diffusion which resulted in the production of a couple of offspring. The Fitness test which decides the number of generations was executed by performing correlation and entropy analyses at a threshold of 0.01 and 7.99 for the former and later respectively. The investigational consequences authenticate that the proposed scheme not only reveals simple and optimised encryption, it is also defending against various distinctive attacks. The proposed image security solutions can be incorporated in banking, medical insurances, e-healthcare, and e-governance sectors for document confidentiality and integrity checking mechanisms.

  相似文献   
13.
Recently, the development of confidentiality and authenticity ensured by image encryption has been one of the key advancements in the field of secured wireless communication. The proposed work focuses on providing confusion, diffusion and permutation inherently in the system. The input grayscale image is shuffled by employing the Henon algorithm and subsequently separated into 8 bit planes. With the aid of a secret key of 256 bits, chaotic sequences are generated for each bit plane. Later, the logistic map is adapted on the chaotic sequences to obtain the scrambled image. Furthermore, this image is shuffled with Zaslavskii and Hilbert Space Filling Curve algorithms, which establishes the confusion stage. To incorporate the diffusion stage, a self-invertible matrix is generated by a latin square image cipher and a secret key. This matrix and the scrambled image underwent the Hill cipher to build the encrypted image followed by a row-column transformation to ensure multifold security. The proposed compound activities of encryption are successfully implemented on the laboratory virtual instrumentation engineering workbench 2013 platform. Noticeably, the established processes of image encryption are tested in the universal software radio peripheral environment and transceived via an additive white Gaussian noise (AWGN) channel. More specifically, the influence of natural and unnatural (cropping attack) noise on the characteristics of the encrypted image while sharing through AWGN channel has been investigated. Security analysis is performed by computing the unified average changing intensity, number of pixels change rate, correlation value, large key space to defy brute force attack, strong key sensitivity and uniform gray value distribution on encryption.  相似文献   
14.
In the recent past, polymer–metal oxide nanocomposites have been identified as one of the key and new class of materials for fabricating gas sensors owing to their swift redox characteristics. In this line of thought, chemical oxidative process was employed to synthesize zinc oxide (ZnO) and polyaniline (PANI) nanocomposite thin films with different mass concentrations of ZnO to explore their gas sensing signatures. X-ray diffraction patterns and Fourier transform infrared spectra confirmed the formation of pure ZnO and PANI–ZnO composites. Field emission scanning electron micrographs revealed the leaf like structure of ZnO, porous nature of PANI and the uniformly distributed blend of these two structures for the composite films. Further, the room temperature gas/vapour sensing characteristics revealed the selective nature of nanocomposite films towards methanol vapour in the presence of other vapours with better response, swift response and recovery times of 7 and 20 s respectively.  相似文献   
15.
In multimedia communication, significance of the images for data representation is noteworthy. In this context, secure transmission of images over open channel has become a challenging task. Creation of different strategies in improving the secure image transmission always has a demand. The proposed work suggests an RGB image encryption with the confluence of attractors and hardware triggered key image in which confusion and diffusion were accomplished by Lorenz, Lü and Cellular Automata attractors. The uniqueness of proposed encryption scheme is a key image generation module through cascaded Ring Oscillator circuit which creates M?×?N key image for diffusion of pixels. Facilitating the authenticated networked access to key image generation hardware enables the secure server-client architecture for a variety of secure image transfer applications. The proposed approach is a hardware – software codesign which possesses a good keyspace, improved key sensitivity and satisfies the various statistical parameters thus offering substantial resistance to differential, occlusion and chosen plaintext attacks on RGB images.  相似文献   
16.
Increased consumption of fried foods such as grilled chicken contains elevated levels of methylglyoxal (MG), which is associated with diabetes mellitus. Hence, in this work, glyoxalase 1(GLO 1) based, zinc oxide (ZnO) flakes interfaced mediator free electrochemical biosensor was developed to detect MG in grilled chicken. ZnO flakes were synthesized by direct precipitation method. X-ray diffractometer and field emission scanning electron microscope were used to study the structural and morphological characteristics of ZnO flakes. The immobilization of GLO 1 on Pt/ZnO flakes modified electrode was confirmed by Fourier transform infrared spectroscopy. Cyclic voltammetric and amperometric studies were carried out using Pt/ZnO flakes/GLO 1 working electrode. The developed biosensor exhibited linear range of 0.6–2.0 µM, sensitivity of 0.281 µA µM?1, LOD of 9 nM with a response time of <4 s and shelf life of 18 days (89%).  相似文献   
17.
Nanostructured cerium oxide (CeO2) thin films were deposited on transparent conducting oxide (TCO) substrate using spray pyrolysis technique with cerium nitrate salt, Ce(NO3)3·6H2O as precursor. Fluorine doped cadmium oxide (CdO:F) thin film prepared using spray pyrolysis technique acts as the TCO film and hence the bare electrode. The structural, morphological and elemental characterizations of the films were carried out using X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM) and energy dispersive X-ray analysis (EDX) respectively. The diffraction peak positions in XRD confirmed the formation of highly crystalline ceria with cubic structure and FE-SEM images showed uniform adherent films with granular morphology. The band gaps of CeO2 and TCO were found to be 3.2 eV and 2.6 eV respectively. Lipase enzyme was physisorbed on the surface of CeO2/TCO film to form the lipase/nano-CeO2/TCO bioelectrode. Sensing studies were carried out using cyclic voltammetry and amperometry, with lipase/nano-CeO2/TCO as working electrode and tributyrin as substrate. The mediator-free biosensor with nanointerface exhibited excellent linearity (0.33–1.98 mM) with a lowest detection limit of 2 μM with sharp response time of 5 s and a shelf life of about 6 weeks.  相似文献   
18.
The implementation of extended Kalman filter-based simultaneous localization and mapping is challenging as the associated system state and covariance matrices along with the memory requirements become significantly large as the information space increases. Unique and consistent point features representing a segment of the map would be an optimal choice to control the size of covariance matrix and maximize the operating speed in a real-time scenario. A two-wheel differential drive mobile robot equipped with a Laser Range Finder with 0.02 m resolution was used for the implementation. Unique point features from the environment were extracted through an elegant line fitting algorithm, namely split only technique. Finally, the implementation showed remarkably good results with a success rate of 98% in feature identification and ±0.08 to ±0.11 m deviation in the generated map.  相似文献   
19.
Multimedia Tools and Applications - Recently, there is an increasing demand for efficient and secure transreception of medical images in telemedicine applications. Though a fixed spectrum is...  相似文献   
20.

Secure transmission of medical information occupies a crucial role in the world of telemedicine applications. Reconfigurable hardware implementation offers several advantages over software implementation especially for real time security applications. This work aims to propose the novel implementation of a penta-layer medical image encryption using a reconfigurable Cyclone II Field Programmable Gate Array (FPGA) EP2C35F672C6. The first layer of encryption performs the row-wise and column-wise pixel permutations based on Linear Feedback Shift Register (LFSR). The second and third layers of encryption are based on maximal length sequence Pseudo Random Number Generator (PRNG) 16-bit Cellular automata (CA) circuit and Galois Field (GF) product. In the fourth layer, a synthetic image is subsequently created by chaotic clock with Phase Lock Loop (PLLs) and gates to diffuse the image pixels. This creation of synthetic image for diffusion makes the developed cryptosystem totally hardware dependent. Last layer performs the diffusion using one dimensional logistic map. The synthesized result reveals that the reconfigurable implementation of proposed encryption process consumes comparatively lesser logic elements (2480) and low power consumption (278.65 mW) with an encryption time of 215.92 ms for encrypting a 256?×?256 DICOM medical image. Finally, various analyses such as Number of Pixel Change Rate (NPCR), Unified Average Change in Intensity (UACI), Entropy, Correlation, Uniform distribution and NIST statistical test suite have been performed to prove the robustness of the algorithm against various attacks.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号