咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 8 篇 光学工程
    • 2 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 软件工程
  • 9 篇 理学
    • 9 篇 物理学

主题

  • 11 篇 optical encrypti...
  • 2 篇 optimization of ...
  • 2 篇 digital holograp...
  • 2 篇 fourier transfor...
  • 2 篇 authentication
  • 1 篇 asymmetric crypt...
  • 1 篇 wireless communi...
  • 1 篇 optical security...
  • 1 篇 chaotic phase ma...
  • 1 篇 optical security...
  • 1 篇 orthogonal codin...
  • 1 篇 fingerprint phas...
  • 1 篇 image security
  • 1 篇 interference
  • 1 篇 joint fourier tr...
  • 1 篇 phase compressio...
  • 1 篇 double random ph...
  • 1 篇 optical inforina...
  • 1 篇 double random ph...
  • 1 篇 fingerprint biom...

机构

  • 2 篇 shizuoka univ fa...
  • 1 篇 gautam buddha un...
  • 1 篇 department of ph...
  • 1 篇 indian inst tech...
  • 1 篇 yeungnam univ de...
  • 1 篇 natl univ singap...
  • 1 篇 general director...
  • 1 篇 lnm inst informa...
  • 1 篇 shenzhen univ co...
  • 1 篇 b k birla inst e...
  • 1 篇 univ s alabama d...
  • 1 篇 hankyong natl un...
  • 1 篇 univ connecticut...
  • 1 篇 indian inst tech...
  • 1 篇 kinki univ sch s...
  • 1 篇 shenzhen univ co...

作者

  • 4 篇 verma gaurav
  • 2 篇 he wenqi
  • 2 篇 peng xiang
  • 2 篇 ohtsubo junji
  • 2 篇 sinha aloka
  • 1 篇 fujimoto ayano
  • 1 篇 khalf hawraa a.
  • 1 篇 chen xudong
  • 1 篇 cho myungjin
  • 1 篇 kwak chong hoon
  • 1 篇 lu dajiang
  • 1 篇 liao meihua
  • 1 篇 islam mohammed n...
  • 1 篇 javidi bahram
  • 1 篇 chen wen
  • 1 篇 alam mohammad s.
  • 1 篇 mohammed emad a.
  • 1 篇 lee in-ho
  • 1 篇 nakayama keizo

语言

  • 10 篇 英文
  • 1 篇 其他
检索条件"主题词=optical encryption and decryption"
11 条 记 录,以下是11-20 订阅
排序:
optical encryption of personal identification information using orthogonal code
Optical encryption of personal identification information us...
收藏 引用
Conference on Optics and Photonics in Global Homeland Security II
作者: Islam, Mohammed Nazrul Alam, Mohammad S. Univ S Alabama Dept Elect & Comp Engn Mobile AL 36688 USA
optical information processing techniques have been developed for information security and fraud deterrent applications. Several encryption methods have been proposed in the literature, which includes optical double r... 详细信息
来源: 评论