期刊文献+
共找到94篇文章
< 1 2 5 >
每页显示 20 50 100
High-speed all-optical speckle decryption empowered by a physics-informed diffractive neural network
1
作者 Jiaan Gan Yong Yang +2 位作者 Siwei Zhu Shengjiang Chang Xiaocong Yuan 《Advanced Photonics Nexus》 2026年第1期150-157,共8页
Speckle-based optical cryptosystems are promising technologies for information security.However,existing techniques mostly rely on digital decryption,resulting in computational delay and undermining the high-speed adv... Speckle-based optical cryptosystems are promising technologies for information security.However,existing techniques mostly rely on digital decryption,resulting in computational delay and undermining the high-speed advantage of optical encryption.Moreover,conventional neural networks are typically effective only on images from the same distribution as the training datasets,limiting their general applicability.In this paper,we propose an all-optical high-speed decryption scheme for real-time recovery of speckle-encoded ciphertexts.By constructing a physics-informed diffractive neural network that approximates the inverse transmission matrix of the scattering medium,secret images can be directly reconstructed from speckle fields without optoelectronic conversion or post-processing.The network is trained with only 2048 samples from the MNIST dataset.Its transfer learning capability is validated across three out-of-distribution datasets,with decrypted images achieving a Pearson correlation coefficient of 0.82 and a structural similarity index measure of 0.75,demonstrating excellent transfer learning capability.For the first time,to our knowledge,this scheme simultaneously overcomes the bottlenecks of decryption delay and limited network generalizability in conventional speckle-based cryptosystems,achieving real-time image decryption with strong transferability.It provides a new pathway for developing low-power,real-time,and broadly applicable optical encryption systems,demonstrating significant potential for applications in high-speed security optical communications. 展开更多
关键词 SPECKLE all-optical decryption diffractive neural network transmission matrix transfer learning real time
在线阅读 下载PDF
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
2
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
A Recursive Method to Encryption-Decryption-Based Distributed Set-Membership Filtering for Time-Varying Saturated Systems Over Sensor Networks
3
作者 Jun Hu Jiaxing Li +2 位作者 Chaoqing Jia Xiaojian Yi Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期1047-1049,共3页
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt... Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided. 展开更多
关键词 time varying saturated systems signal transmission processspecificallya encryption decryption mechanism sensor networks recursive method distributed set membership filtering
在线阅读 下载PDF
Femtosecond laser subtractive/additive-integrated biomimetic manufacturing for visible/infrared encryption and stimuli-responsive infrared decryption
4
作者 Ruijie Liu Dongshi Zhang Zhuguo Li 《International Journal of Extreme Manufacturing》 2025年第4期387-404,共18页
Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,... Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension. 展开更多
关键词 femtosecond laser biomimetic manufacturing black particle aggregates subtractive/additive-integrated manufacturing intrinsic visible-infrared encryption stimuli responsive decrypted IR display
在线阅读 下载PDF
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
5
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
在线阅读 下载PDF
Decryption of pure-position permutation algorithms 被引量:3
6
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 decryption Image encryption FUZZY Position permutation
在线阅读 下载PDF
A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption 被引量:2
7
作者 李世群 吴永东 +1 位作者 周建英 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期67-70,共4页
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa... The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4. 展开更多
关键词 batch decryption secure socket layer (SSL) server public key algorithm
在线阅读 下载PDF
New Constructions of Identity-Based Threshold Decryption 被引量:1
8
作者 ZHANG Leyou HU Yupu +1 位作者 TIAN Xu'an YANG Yang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期222-226,共5页
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive c... In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously. 展开更多
关键词 ID-Based threshold decryption verifiable pair computational bilinear Diffie-Hellman (CBDH) problem provable security
原文传递
ECC Based Threshold Decryption Scheme and Its Application in Web Security 被引量:2
9
作者 张险峰 张峰 +1 位作者 秦志光 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第4期41-46,共6页
The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test appro... The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test approach based on elliptic curve cryptography is designed. The application of these techniques in Web security is studied. Performance analysis shows that our scheme is characterized by excellent security as well as high efficiency. 展开更多
关键词 intrusion tolerance elliptic curve cryptography threshold decryption web security
在线阅读 下载PDF
Identity-Based Threshold Decryption on Access Structure
10
作者 秦华旺 朱晓华 戴跃伟 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期485-489,共5页
For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig... For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible. 展开更多
关键词 threshold decryption access structure IDENTITY CRYPTOGRAPHY information security
原文传递
Practical Privacy-Preserving ROI Encryption System for Surveillance Videos Supporting Selective Decryption
11
作者 Chan Hyeong Cho Hyun Min Song Taek-Young Youn 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期1911-1931,共21页
With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recor... With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recorded surveillance videos to enhance efficiency and security.The proposed method leverages Dlib’s CNN-based facial recognition technology to identify Regions of Interest(ROIs)within the video,linking these ROIs to generate unique IDs.These IDs are then combined with a master key to create entity-specific keys,which are used to encrypt the ROIs within the video.This system supports selective decryption,effectively protecting personal information using surveillance footage.Additionally,the system overcomes the limitations of existing ROI recognition technologies by predicting unrecognized frames through post-processing.This research validates the proposed technology through experimental evaluations of execution time and post-processing techniques,ensuring comprehensive personal information protection.Guidelines for setting the thresholds used in this process are also provided.Implementing the proposed method could serve as an effective solution to security vulnerabilities that traditional approaches fail to address. 展开更多
关键词 Privacy de-identification selective decryption surveillance video
在线阅读 下载PDF
ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
12
作者 龙宇 陈克非 刘胜利 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期127-133,共7页
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext... B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively. 展开更多
关键词 threshold decryption identity-based cryptology publicly checkable encryption
在线阅读 下载PDF
Encryption and Decryption of Color Images through Random Disruption of Rows and Columns
13
作者 ZENG Jianhua ZHAN Yanlin YANG Jianrong 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期245-255,共11页
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o... In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value. 展开更多
关键词 color image ENCRYPTION decryption single channel RGB component image disrupting
在线阅读 下载PDF
Simple optical decryption based on a modified joint transform correlator technique
14
作者 王怀彬 王天佐 袁晓聪 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第2期203-205,共3页
A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase... A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase-only elements. The optical decryption was implemented by superimposing the encrypted hologram and the decryyption key in a simple optical setup. Numerical simulation and optical experiment have confirmed the proposed technique as a simple and easy implementation for optical decryption, demonstrating potential applications in optical information security verification. 展开更多
关键词 computer generated holograms CORRELATOR ENCRYPTION/decryption
在线阅读 下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
15
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image Encryption and decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
Traceable and revocable multi-authority ABE supporting decryption outsourcing and policy update for cloud data access control
16
作者 Yan-Qing YAO Yun-Jia ZHANG +3 位作者 Zhi-Yi LIU Yu-Xuan WANG Xin-Yu TAN Zhengde ZHAI 《Frontiers of Computer Science》 2026年第4期103-119,共17页
Nowadays,vast and rapidly growing information acts as digital records of social activities and is widely collected and stored as economic assets.To reduce the difficulty and local data management’s cost significantly... Nowadays,vast and rapidly growing information acts as digital records of social activities and is widely collected and stored as economic assets.To reduce the difficulty and local data management’s cost significantly,cloud storage services provide a highly available,highperformance,and low-cost solution for user data hosting,enabling remote access,backup,and sharing of data stored by the cloud.However,this service model is not without security risks,including user privacy exposure,low trustworthiness of data,and unauthorized access.To address these concerns,attribute-based encryption(ABE)schemes allow for the implementation of fine-grained access policies while ensure the confidentiality and availability of data stored under the cloud environment.The issues of collusion among authorities,excessive decryption computation overhead,and high complexity in attribute revocation have aroused many researchers’attention,and many works have emerged.However,expanding the functionality of ABE schemes to satisfy multiple requirements and improving existing functionality of ABE schemes are still urgent problems to be solved.Motivated by these problems,here we propose a novel multi-functional multi-authority ABE scheme that incorporates functional features such as multi-authority key generation,outsourced decryption,malicious user tracking,flexible attribute revocation,and real-time policy updates,thereby providing fine-grained access control as well as confidentiality for data stored under cloud environments.Similar to prior works,we have analyzed the static security,forward security,and resistance to collusion attacks of our proposed scheme for completeness.Storage and computational efficiency evaluation shows that our proposed scheme achieves lower storage costs and computational overhead compared to existing schemes with similar functionalities. 展开更多
关键词 multi-authority attribute-based encryption CP-ABE decryption outsourcing policy update attribute revocation white-box traceability access control
原文传递
Non-Fragile Filtering for Discrete-Time Networked Systems Subject to Fading Measurements:An Encryption and Decryption Scheme
17
作者 Jinliang Liu Jiahui Tang +1 位作者 Lijuan Zha Engang Tian 《IEEE/CAA Journal of Automatica Sinica》 2025年第12期2618-2620,共3页
Dear Editor,This letter deals with the non-fragile filtering problem for the discrete-time networked system subject to fading measurements and potential risk of information leakage. To ensure the system security enhan... Dear Editor,This letter deals with the non-fragile filtering problem for the discrete-time networked system subject to fading measurements and potential risk of information leakage. To ensure the system security enhancement,an encryption-decryption scheme is employed to protect the privacy of the transmitted signal via network,under which the real transmitted data is invisible to eavesdroppers. Ultimately,a numerical example is provided to assess the accuracy and efficacy of the derived approaches. 展开更多
关键词 discrete time networked systems information leakage decryption non fragile filtering numerical example fading measurements system security enhancementan encryption
在线阅读 下载PDF
A kaleidoscopic hydrogel canvas for information encoding, encryption, and decryption via chemical-induced phase separation
18
作者 Jun-Bo Hou Yue Zhao 《Science China Materials》 2025年第2期571-580,共10页
Constructing an information storage or communication system, where countless pieces of information canbe hidden like a canvas and revealed on demand throughspecific stimuli or decoding rules, is significant. In the pr... Constructing an information storage or communication system, where countless pieces of information canbe hidden like a canvas and revealed on demand throughspecific stimuli or decoding rules, is significant. In the presentstudy, we developed a hydrogel canvas that leverages noncovalentinteractions to induce phase separation in the polymer matrix, creating various “paintings”, including custommessages, using different chemical inks. Our strategy focuseson designing small molecule inks, with varying affinities withthe hydrogel and specific responsiveness to stimuli, to achievemultiple changes such as color shifts, fluorescence emission,and dynamic optical image evolution. This skips the typicaldesign approaches, such as incorporating responsive fluorophoresinto polymers for color emission through grafting orcopolymerization, and thus avoids the complex processes involved in modifying and synthesizing functional polymers,along with the uncertainties in material properties that theseprocesses bring. 展开更多
关键词 hydrogel canvas chemicals-induced phase separation multistage encryption and decryption self-erasing
原文传递
Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT
19
作者 He Duan Shi Zhang Dayu Li 《Computers, Materials & Continua》 2026年第2期872-896,共25页
Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudass... Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost. 展开更多
关键词 Cloud computing Internet of Things ABSE multi-keyword fuzzy matching outsourcing decryption
在线阅读 下载PDF
Ionoprinting controlled information storage of fluorescent hydrogel for hierarchical and multi-dimensional decryption 被引量:8
20
作者 Xiao-Xia Le Wei Lu +3 位作者 Jiang He Michael J.Serpe Jia-Wei Zhang Tao Chen 《Science China Materials》 SCIE EI CSCD 2019年第6期831-839,共9页
Information storage and corresponding encryption/decryption are highly important owing to the prevalence of counterfeit activities and information leakage in the current age.Herein,we propose a novel method to store i... Information storage and corresponding encryption/decryption are highly important owing to the prevalence of counterfeit activities and information leakage in the current age.Herein,we propose a novel method to store information via controllable ionoprinting onto fluorescent hydrogel for hierarchical and multi-dimensional decryption.Through incorporating pyrene moieties and carboxylic groups into polymeric hydrogel network,fluorescence changing and controllable shape deformation behaviors could be achieved and integrated by ionoprinting of Fe3+ions.The diffusion of Fe^3+ions into fluorescent hydrogel can quench the fluorescence of pyrene moieties,and chelate with carboxylic groups to generate anisotropic structures for shape deformation simultaneously.Thus,fluorescence quenching-based 2D information and actuation-based 3D information could be hierarchically decrypted when exposed to UV light and being put into water,respectively.Importantly,the stored information could be erased by replacing Fe^3+with H^+,which allows the fluorescent hydrogel as a recyclable information storage material.This work may provide new insights in designing and fabricating novel soft devices for hierarchical and multidimensional information encryption,against the rising problems of counterfeiting and confidential information disclosure. 展开更多
关键词 information storage information decryption hydrogel actuator fluorescence quenching anisotropic structures
原文传递
上一页 1 2 5 下一页 到第
使用帮助 返回顶部