2023
DOI: 10.1016/j.heliyon.2023.e17682
|View full text |Cite
|
Sign up to set email alerts
|

An optical multiple-image authentication based on computational ghost imaging and total-variation minimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 52 publications
0
1
0
Order By: Relevance
“…The concealed data can be extracted from the watermarked video in a fast extraction process with minimum distortion and simultaneously preserve the visual imperceptibility of the watermarked video. The embedded secret data can be reconstructed by reprocessing the watermarked media [ 7 ].…”
Section: Introductionmentioning
confidence: 99%
“…The concealed data can be extracted from the watermarked video in a fast extraction process with minimum distortion and simultaneously preserve the visual imperceptibility of the watermarked video. The embedded secret data can be reconstructed by reprocessing the watermarked media [ 7 ].…”
Section: Introductionmentioning
confidence: 99%