期刊文献+
共找到436篇文章
< 1 2 22 >
每页显示 20 50 100
NEW FAST ALGORITHM OF 2-D DISCRETE COSINE TRANSFORM
1
作者 王新成 周晓明 +1 位作者 卢颉 朱维乐 《Journal of Electronics(China)》 1995年第3期270-275,共6页
In this paper, a new algorithm for the fast computation of a 2-D discrete cosine transform (DCT) is presented. It is shown that the N×N DCT, where N = 2m, can be computed using only N 1-D DCT’s and additions, in... In this paper, a new algorithm for the fast computation of a 2-D discrete cosine transform (DCT) is presented. It is shown that the N×N DCT, where N = 2m, can be computed using only N 1-D DCT’s and additions, instead of using 2N 1-D DCT’s as in the conventional row-column approach. Hence the total number of multiplications for the proposed algorithm is only half of that required for the row-column approach, and is also less than that of most of other fast algorithms, while the number of additions is almost comparable to that of others. 展开更多
关键词 IMAGE PROCESSING discrete cosine transform fast algorithm
在线阅读 下载PDF
ASIC Design of DA-Based 2-D Inverse Discrete Cosine Transform
2
作者 陈禾 韩月秋 《Journal of Beijing Institute of Technology》 EI CAS 1999年第2期56-63,共8页
Aim To present an ASIC design of DA based 2 D IDCT. Methods\ In the design of 1 D IDCT is utilized a Chen based fast IDCT algorithm, and multiplier accumulators based on distributed algorithm contributes in reduc... Aim To present an ASIC design of DA based 2 D IDCT. Methods\ In the design of 1 D IDCT is utilized a Chen based fast IDCT algorithm, and multiplier accumulators based on distributed algorithm contributes in reducing the hardware amount and in enhancing the speed performance. Results and Conclusion\ VHDL simulation, synthesis and layout design of system are implemented. This 2 D IDCT ASIC design owns best timing performance when compared with other better designs internationally. Results of design prove to be excellent. 展开更多
关键词 discrete cosine transform(DCT) distributed algorithm(DA) VHSIC hardware description language(VHDL)
在线阅读 下载PDF
A FAST ALGORITHM FOR DISCRETE HARTLEY TRANSFORM OF ARBITRARY LENGTH
3
作者 曾泳泓 《Journal of Electronics(China)》 1993年第3期209-216,共8页
DHT of length p<sup>l</sup>q(p is odd and q is arbitrary) is turned into p<sup>l</sup> DHTs of length qand some additional operations, while the additional operations only involves the comput... DHT of length p<sup>l</sup>q(p is odd and q is arbitrary) is turned into p<sup>l</sup> DHTs of length qand some additional operations, while the additional operations only involves the computation ofcos-DFT and sin-DFT with length p. If the length of a DHT is p<sub>1</sub><sup>l<sub>1</sub></sup>…P<sub>N</sub><sup>l<sub>N</sub></sup>2<sup>l</sup>(P<sub>1</sub>…,P<sub>N</sub> are oddprimes), a fast algorithm is obtained by the similar recursive technique. Therefore, the algorithmcan compute DHT of arbitrary length. The paper also Proves that operations for computingDHT of length N by the algorithm are no more than O(Nlog<sub>2</sub>N), when the length is N=p<sup>l</sup>,operations of the algorithm are fewer than that of other known algorithms. 展开更多
关键词 SIGNAL processing discrete Hartley transform fast algorithm
在线阅读 下载PDF
Experiments in Parallelizing the Type IV Discrete Cosine Transform
4
《Computer Technology and Application》 2012年第4期305-314,共10页
The Fourier transform is very important to numerous applications in science and engineering. However, its usefulness is hampered by its computational expense. In this paper, in an attempt to develop a faster method fo... The Fourier transform is very important to numerous applications in science and engineering. However, its usefulness is hampered by its computational expense. In this paper, in an attempt to develop a faster method for computing Fourier transforms, the authors present parallel implementations of two new algorithms developed for the type IV Discrete Cosine Transform (DCT-IV) which support the new interleaved fast Fourier transform method. The authors discuss the realizations of their implementations using two paradigms. The first involved commodity equipment and the Message-Passing Interface (MPI) library. The second utilized the RapidMind development platform and the Cell Broadband Engine (BE) processor. These experiments indicate that the authors' rotation-based algorithm is preferable to their lifting-based algorithm on the platforms tested, with increased efficiency demonstrated by their MPI implementation for large data sets. Finally, the authors outline future work by discussing an architecture-oriented method for computing DCT-IVs which promises further optimization. The results indicate a promising fresh direction in the search for efficient ways to compute Fourier transforms. 展开更多
关键词 discrete cosine transform parallel algorithms fast fourier transforms ROTATION LIFTING MPI (message-passing interface) Cell BE (broadband engine).
在线阅读 下载PDF
A fast algorithm for n-D discrete cosine transform
5
作者 王智顺 李文化 何振亚 《Science China(Technological Sciences)》 SCIE EI CAS 1998年第1期45-54,共10页
A generalized fast computational algorithm for the n -dimensional discrete cosine transform ( n- D DCT) of length N=2 m(m≥2) is presented. The developed algorithm is theoretically proved and its efficiency is evaluat... A generalized fast computational algorithm for the n -dimensional discrete cosine transform ( n- D DCT) of length N=2 m(m≥2) is presented. The developed algorithm is theoretically proved and its efficiency is evaluated. The theoretical results show that compared with the conventional method to compute the 1-D DCTs in n directions, the number of multiplications needed by this algorithm is only 1/n of that required by the conventional method; for the total number of additions, it is a bit more when N≤8 and much less when N≥16 than the coventional one. To validate the proposed algorithm, the case when n=3 is taken as an example and applied to the motion picture compression. The results show that the proposed method is superior to MPEG-2. 展开更多
关键词 discrete cosine transform MULTIDIMENSIONAL signal processing fast algorithm MPEG-2.
原文传递
THE MULTIPLICATIVE COMPLEXITY AND ALGORITHM OF THE GENERALIZED DISCRETE FOURIER TRANSFORM(GFT)
6
作者 Y.H. Zeng(7th Department, National University of Defence Technology, Changsha, China) 《Journal of Computational Mathematics》 SCIE CSCD 1995年第4期351-356,共6页
In this paper, we have proved that the lower bound of the number of real multiplications for computing a length 2(t) real GFT(a,b) (a = +/-1/2, b = 0 or b = +/-1/2, a = 0) is 2(t+1) - 2t - 2 and that for computing a l... In this paper, we have proved that the lower bound of the number of real multiplications for computing a length 2(t) real GFT(a,b) (a = +/-1/2, b = 0 or b = +/-1/2, a = 0) is 2(t+1) - 2t - 2 and that for computing a length 2t real GFT(a,b)(a = +/-1/2, b = +/-1/2) is 2(t+1) - 2. Practical algorithms which meet the lower bounds of multiplications are given. 展开更多
关键词 DCT II THE MULTIPLICATIVE COMPLEXITY AND algorithm OF THE GENERALIZED discrete fourier transform Math GFT
原文传递
Comparison of fast discrete wavelet transform algorithms
7
作者 孟书苹 《Journal of Chongqing University》 CAS 2005年第2期84-89,共6页
This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, ... This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, FFT-based algorithm, Short- length based algorithm and Lifting algorithm. The principles, structures and computational complexity of these algorithms are explored in details respectively. The results of the experiments for comparison are consistent to those simulated by MATLAB. It is found that there are limitations in the implementation of DWT. Some algorithms are workable only for special wavelet transform, lacking in generality. Above all, the speed of wavelet transform, as the governing element to the speed of image processing, is in fact the retarding factor for real-time image processing. 展开更多
关键词 discrete wavelet transforms (DWT) fast algorithms computational complexity
在线阅读 下载PDF
Peak-to-Average Power Ratio Performance Analysis for Orthogonal Chirp Division Multiplexing Multicarrier Systems Based on Discrete Fractional Cosine Transform 被引量:2
8
作者 Hani Attar 《International Journal of Communications, Network and System Sciences》 2016年第12期545-562,共18页
In doubly selective fading channels, the orthogonal frequency division multiplexing (OFDM) multicarrier system may fail. Chirp like basis (fractional Fourier transform-fractional cosine transform) may be used instead ... In doubly selective fading channels, the orthogonal frequency division multiplexing (OFDM) multicarrier system may fail. Chirp like basis (fractional Fourier transform-fractional cosine transform) may be used instead of complex exponential basis in this case to improve the system performance. However, in multicarrier transmission, the high peak to average power ratio (PAPR) of the transmitted signal is one of the difficult problems that face both the chirp and the exponential basis. In this paper, an evaluation for the PAPR performance of a multicarrier system based on the fractional cosine transform (FrCT) is introduced and then compared with DFrFT and FFT. Moreover, applying the SLAM technique over these systems is provided to understand the behaviour of these systems when applying SLAM. Simulations verify that this system obtains a better PAPR performance. Moreover, further PAPR reduction can be gained using the well-known PAPR reduction methods. Moreover, applying SLAM technique improves the performance of (dB) by 4 dB to 5 dB and all systems become as competitive to each other when SLAM is applied. Finally, BER performance comparison among OFDM, Discrete Cosine Transform MCM (DCT- MCM), Discrete Hartley Transform MCM (DHT-MCM), DFrFT-OCDM and DFrCT- OCDM MCM systems was done by means of simulation over 100,000 multicarrier blocks for each one and showed that our proposed scenario gave the best performance. 展开更多
关键词 PAPR discrete fourier transform discrete Fractional cosine transform Mobile Digital Video Doubly Selective Channels
在线阅读 下载PDF
Walsh Hadamard Transform Based Transceiver Design for SC-FDMA with Discrete Wavelet Transform 被引量:2
9
作者 Arsla Khan Amna Arif +1 位作者 Tabassum Nawaz Sobia Baig 《China Communications》 SCIE CSCD 2017年第5期193-206,共14页
This article proposes a new transceiver design for Single carrier frequency division multiple access(SCFDMA)system based on discrete wavelet transform(DWT). SCFDMA offers almost same structure as Orthogonal frequency ... This article proposes a new transceiver design for Single carrier frequency division multiple access(SCFDMA)system based on discrete wavelet transform(DWT). SCFDMA offers almost same structure as Orthogonal frequency division multiple access(OFDMA)with extra advantage of low Peak to Average Power Ratio(PAPR). Moreover,this article also suggests the application of Walsh Hadamard transform(WHT)for linear precoding(LP)to improve the PAPR performance of the system. Supremacy of the proposed transceiver over conventional Fast Fourier transform(FFT)based SCFDMA is shown through simulated results in terms of PAPR,spectral efficiency(SE)and bit error rate(BER). 展开更多
关键词 multicarrier modulation orthogonal frequency division multiple access single carrier frequency division multiple access: fast fourier transform discrete wavelet transform Walsh Hadamard transform
在线阅读 下载PDF
Fast Attack Algorithm for JPEG Image Encryption with Block Position Shuffle
10
作者 LI Shanshan GUO Yali +1 位作者 HUANG Jiaxin GAO Ruoyun 《Journal of Shanghai Jiaotong university(Science)》 2025年第5期976-987,共12页
For traditional JPEG image encryption,block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack.However,the numbers of non-zero coefficients in the 8×8 sub-block... For traditional JPEG image encryption,block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack.However,the numbers of non-zero coefficients in the 8×8 sub-blocks are unchanged using block position shuffle.For this defect,this paper proposes a fast attack algorithm for JPEG image encryption based on inter-block shuffle and non-zero quantization discrete cosine transformation coefficient attack.The algorithm analyzes the position mapping relationship before and after encryption of image blocks by detecting the pixel values of an image by the designed plaintext image.Then the preliminary attack result of the image blocks can be obtained from the inverse mapping relationship.Finally,the final attack result of the algorithm is generated according to the numbers of non-zero coefficients in each 8×8 block of the preliminary attack result.Every 8×8 block position is related with its number of non-zero discrete cosine transform coefficients in the designed plaintext.It is verified that the main content of the original image could be obtained without knowledge of the encryption algorithm and keys in a relatively short time. 展开更多
关键词 JPEG image inter-block shuffle discrete cosine transform coefficients non-zero coefficients fast attack
原文传递
Research Progress on Discretization of Linear Canonical Transform
11
作者 Yannan Sun Bingzhao Li Ran Tao 《Journal of Beijing Institute of Technology》 EI CAS 2021年第3期205-216,共12页
Linear canonical transformation(LCT)is a generalization of the Fourier transform and fractional Fourier transform.The recent research has shown that the LCT is widely used in signal processing and applied mathematics,... Linear canonical transformation(LCT)is a generalization of the Fourier transform and fractional Fourier transform.The recent research has shown that the LCT is widely used in signal processing and applied mathematics,and the discretization of the LCT becomes vital for the applic-ations of LCT.Based on the development of discretization LCT,a review of important research progress and current situation is presented,which can help researchers to further understand the discretization of LCT and can promote its engineering application.Meanwhile,the connection among different discretization algorithms and the future research are given. 展开更多
关键词 linear canonical transform(LCT) discrete linear canonical transform sampling Wign-er-Ville distribution fast algorithm
在线阅读 下载PDF
The generalized unified computation of multidimensional discrete orthogonal transforms
12
作者 成礼智 蒋增荣 张振慧 《Science in China(Series F)》 2001年第6期401-411,共11页
By introducing a form of reorder for multidimensional data, we propose a unified fast algo-rithm that jointly employs one-dimensional W transform and multidimensional discrete polynomial trans-form to compute eleven t... By introducing a form of reorder for multidimensional data, we propose a unified fast algo-rithm that jointly employs one-dimensional W transform and multidimensional discrete polynomial trans-form to compute eleven types of multidimensional discrete orthogonal transforms, which contain three types of m-dimensional discrete cosine transforms ( m-D DCTs) ,four types of m-dimensional discrete W transforms ( m-D DWTs) ( m-dimensional Hartley transform as a special case), and four types of generalized discrete Fourier transforms ( m-D GDFTs). For real input, the number of multiplications for all eleven types of the m-D discrete orthogonal transforms needed by the proposed algorithm are only 1/m times that of the commonly used corresponding row-column methods, and for complex input, it is further reduced to 1/(2m) times. The number of additions required is also reduced considerably. Furthermore, the proposed algorithm has a simple computational structure and is also easy to be im-plemented on computer, and the numerical experiments show that the computational efficiency is con-sistent with the theoretic analysis. 展开更多
关键词 multidimensional signal processing fast algorithm multidimensional discrete fourier transform multidimensional discrete cosine transform multidimensional discrete W transform.
原文传递
一种NDVI时间序列离散Fourier重建方法 被引量:5
13
作者 马超 郭增长 张晓克 《测绘科学技术学报》 北大核心 2011年第5期347-350,355,共5页
时间序列重建是多时相遥感变化监测研究的基础。多时相遥感数据由于气象、轨道周期等原因,很难达到严格意义的同时相。不同时相的特征信息不具有可比性。以一矿区归一化差值植被指数为例,采用2004-2007年SPOT II/IV数据,通过大气校正,... 时间序列重建是多时相遥感变化监测研究的基础。多时相遥感数据由于气象、轨道周期等原因,很难达到严格意义的同时相。不同时相的特征信息不具有可比性。以一矿区归一化差值植被指数为例,采用2004-2007年SPOT II/IV数据,通过大气校正,波段运算,获得7个时相的包括伪不变特征区和矿业扰动区8个实验工作面的NDVI最大值、均值和振幅;进而采用快速Fourier变换的Fourier 4模型将NDVI转化为振幅,将物候信息转化为相位。实现了低数据样本下高时间、高空间分辨率NDVI时间序列数据集重建。该方法可为多时相遥感信息时间序列归一化、多源数据时间序列同化以及特征信息协同反演提供一些借鉴。 展开更多
关键词 开采沉陷区 时间序列重建 离散fourier分析 快速fourier变换 归一化差值植被指数
在线阅读 下载PDF
2.5维直流电法正演中Fourier逆变换离散波数的最优化选取 被引量:4
14
作者 潘克家 汤井田 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第7期2819-2826,共8页
从优化模型和计算方法 2方面改进点源2.5维直流电法正演中Fourier逆变换离散波数的最优化选取方法。首先利用均匀半空间点源电位的精确解,基于最小二乘法给出计算离散波数的改进非线性最优化问题;然后,利用差分进化(DE)算法进行求解;最... 从优化模型和计算方法 2方面改进点源2.5维直流电法正演中Fourier逆变换离散波数的最优化选取方法。首先利用均匀半空间点源电位的精确解,基于最小二乘法给出计算离散波数的改进非线性最优化问题;然后,利用差分进化(DE)算法进行求解;最后,研究参与计算的电极距数对模拟精度的影响。对具有解析解的典型地电模型,通过与已有文献计算结果进行比较,验证方法的可行性。研究结果表明:增加参与计算的电极距数可有效提高视电阻率曲线近源处的计算精度,并能保证较大电性差异情形下的计算精度;与现有离散波数相比,本文方法得到的波数具有更高的精度和更大的适用范围。 展开更多
关键词 直流电法 有限单元法 fourier逆变换 离散波数 差分进化算法
在线阅读 下载PDF
离散Fourier变换并行算法综述 被引量:1
15
作者 吴建平 李晓梅 《计算机工程与科学》 CSCD 2001年第3期62-65,69,共5页
本文详细介绍了 1 - D DFT精确计算的六步框架并行算法和按位并行计算法 ,以及按位计算法在 2 - D Mesh和 Torus上的模拟实现 ,同时介绍了近似计算中的基于奇异值分解的算法和基于快速多极方法的算法。对于 2 - D DFT,本文介绍了并行行... 本文详细介绍了 1 - D DFT精确计算的六步框架并行算法和按位并行计算法 ,以及按位计算法在 2 - D Mesh和 Torus上的模拟实现 ,同时介绍了近似计算中的基于奇异值分解的算法和基于快速多极方法的算法。对于 2 - D DFT,本文介绍了并行行列算法和并行多项式变换算法 ,并分析了其优缺点。 展开更多
关键词 离散fourier变换 奇异值分解 并行算法 计算机
在线阅读 下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm 被引量:1
16
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
在线阅读 下载PDF
二维离散余弦变换与二维离散Fourier变换的快速算法
17
作者 蒋增荣 成礼智 《国防科技大学学报》 EI CAS CSCD 北大核心 1992年第1期69-75,共7页
文中提出N×M2D—DCT(Ⅱ)的一种快速算法,其需实运算量为:M_u=1/2NMlog_2N+1/4MNlog_2M,A_d=3/2NMlog_2NM—3MN—1/2M^2+M+N(其中N、M为2的幂)。当N=M时,与文[5]的结果一样、这是目前最好的结果。但文[5]算法不稳定,容易产生较大的... 文中提出N×M2D—DCT(Ⅱ)的一种快速算法,其需实运算量为:M_u=1/2NMlog_2N+1/4MNlog_2M,A_d=3/2NMlog_2NM—3MN—1/2M^2+M+N(其中N、M为2的幂)。当N=M时,与文[5]的结果一样、这是目前最好的结果。但文[5]算法不稳定,容易产生较大的误差。本文克服了这一缺点。并利用此2D—FCT(Ⅱ)导出了2D—DCT.2D—DST和2D—DCST的快速算法及2D—DFT的一种快速算法。2D—DFT快速算法的运算量与文[1]中用FPT计算2D—DFT相近。 展开更多
关键词 离散余弦变换 算法 离散富氏变换
在线阅读 下载PDF
量子离散Fourier变换在离子阱中的实现方案
18
作者 冯芒 蒋玉蓉 +1 位作者 高克林 朱熙文 《原子与分子物理学报》 CAS CSCD 北大核心 2000年第3期436-440,共5页
在Cirac Zoller模型的框架下 ,讨论在离子阱中如何利用幺正操作实施量子离散Fourier变换的方案。由于量子离散Fourier变换可由两个基本操作组合而成 ,因此讨论虽集中在对一个和两个量子比特的操作上 ,但实质上已能处理任意多个量子比特... 在Cirac Zoller模型的框架下 ,讨论在离子阱中如何利用幺正操作实施量子离散Fourier变换的方案。由于量子离散Fourier变换可由两个基本操作组合而成 ,因此讨论虽集中在对一个和两个量子比特的操作上 ,但实质上已能处理任意多个量子比特的问题。 展开更多
关键词 量子离散fourier变换 Shor算法 离子阱
在线阅读 下载PDF
Hankel矩阵的离散Cosine变换的快速算法
19
作者 汪祥 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2005年第4期461-463,共3页
在图像和信号处理研究邻域,经常会涉及到结构矩阵的离散sine、快速傅里叶变换(FFT)及离散cosine变换.文献[6]的作者利用FFT给出了离散cosine变换的一个算法,计算变换矩阵的M个元素所需的计算量和存贮空间分别为O(N2logN)+O(M)和O(N2).... 在图像和信号处理研究邻域,经常会涉及到结构矩阵的离散sine、快速傅里叶变换(FFT)及离散cosine变换.文献[6]的作者利用FFT给出了离散cosine变换的一个算法,计算变换矩阵的M个元素所需的计算量和存贮空间分别为O(N2logN)+O(M)和O(N2).本文利用Hankel矩阵的结构特点导出一递推关系式(见式(8)),给出了Hankel矩阵的离散cosine变换(DCT)的一个快速算法.该算法所需要的存贮空间为O(N),计算变换矩阵的M个元素所需的计算量为O(NlogN)+O(M). 展开更多
关键词 HANKEL矩阵 快速算法 离散 快速傅里叶变换 存贮空间 变换矩阵 递推关系式 结构矩阵 信号处理 结构特点 计算量 FFT 元素 图像
在线阅读 下载PDF
最优解与二维离散分数阶Fourier的双混沌加密算法 被引量:6
20
作者 汪乐乐 李国东 《中国科技论文》 CAS 北大核心 2018年第17期2024-2031,共8页
针对传统的自然混沌在加密系统上的不足和安全系数较低的问题,提出了二维离散分数阶Fourier变换的双混沌图像加密算法,该算法首先借助Henon映射与分数阶Fourier变换改进得到优化算法,再将经过优化算法得到的密文图像作为输入,按照最优... 针对传统的自然混沌在加密系统上的不足和安全系数较低的问题,提出了二维离散分数阶Fourier变换的双混沌图像加密算法,该算法首先借助Henon映射与分数阶Fourier变换改进得到优化算法,再将经过优化算法得到的密文图像作为输入,按照最优解序列的排序,综合Logistic混沌,得到最终的密文图像;将混沌系统和Fourier变换结合起来,使得明文信息得到很好的隐藏,实现了空间域和频域的置乱。仿真实验结果表明,改进的算法达到了比较好的加密效果,不仅敏感性强,密钥空间大,而且能够有效地抵御攻击,在图像信息安全方面有一定的应用价值。 展开更多
关键词 离散余弦变换 二维离散分数阶fourier变换 图像加密 混沌加密
在线阅读 下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部