首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
化学工业   1篇
一般工业技术   1篇
自动化技术   1篇
  2021年   1篇
  2019年   2篇
排序方式: 共有3条查询结果,搜索用时 0 毫秒
1
1.
Journal of Polymer Research - The complex and incompletely understood phenomenon of shear-induced crystallization of polymers may be nowadays analysed via the in situ POM-shear stage methodology....  相似文献   
2.

In this paper, an asymmetric hybrid cryptosystem utilizing four-dimensional (4D) hyperchaotic framework by means of coherent superposition and random decomposition in hybrid multi-resolution wavelet domain is put forward. The 4D hyperchaotic framework is utilized for creating permutation keystream for a pixel swapping procedure. The hybrid multi-resolution wavelet is formed by combining Walsh transform and fractional Fourier transform of various orders. The 4D hyperchaotic framework’s parameters and preliminary conditions alongside the fractional orders extend the key-space and consequently give additional strength to the proposed cryptosystem. The proposed cryptosystem has an extended key-space to avoid any brute-force attack and is nonlinear in nature. The scheme is validated on greyscale images. Computer-based simulations have been executed to validate the robustness of the proposed scheme against different types of attacks. Results demonstrate that the proposed cryptosystem along with offering higher protection against noise and occlusion attacks is also unassailable to special attack.

  相似文献   
3.
In this paper, an asymmetric hybrid encryption scheme, using coherent superposition and modified equal modulus decomposition in a hybrid multi-resolution wavelet, is proposed. The hybrid multi-resolution wavelet is generated using fractional Fourier transform of multiple orders and Walsh transform. The fractional orders of the fractional Fourier transform increase the key space and hence provide additional strength to the cryptosystem. The designed scheme has a large key space to avoid brute-force attack and is non-linear in nature. The scheme is validated on grey-scale images. Computer-based simulations have been performed to verify the validity and performance of the proposed scheme against various attacks. Scheme's robustness to the special attack is also checked. Results show that single equal modulus decomposition with fractional Fourier transform and hybrid transform are vulnerable to the special attack, whereas the proposed scheme endures the special attack.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号