AN OPTICAL MULTIPLE-IMAGE AUTHENTICATION BASED ON COMPUTATIONAL GHOST IMAGING AND TOTAL-VARIATION MINIMIZATION

An optical multiple-image authentication based on computational ghost imaging and total-variation minimization

An optical multiple-image authentication is suggested using computational ghost imaging lolasalinas.com and total-variation minimization.Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embedded into a cover image to avoid th

read more

Tor network anonymity evaluation based on node anonymity

Abstract In order ealisboa.com to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes, network be

read more