2019
DOI: 10.1016/j.optcom.2019.05.019
|View full text |Cite
|
Sign up to set email alerts
|

Foveated ghost imaging based on deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Step 3: According to equation (11), the compressed JPS of single image is translated by joint power spectral division multiplexing, which realizes the superposition of multiple images without crosstalk. The result is expressed as J (u, v), which is secondary ciphertext.…”
Section: Encryption Processmentioning
confidence: 99%
See 1 more Smart Citation
“…Step 3: According to equation (11), the compressed JPS of single image is translated by joint power spectral division multiplexing, which realizes the superposition of multiple images without crosstalk. The result is expressed as J (u, v), which is secondary ciphertext.…”
Section: Encryption Processmentioning
confidence: 99%
“…Jiao et al proposed two novel visual cryptography (VC) schemes by combining VC with SPI, which improved the security of the encryption system [10]. Zhai et al combined foveated speckle pattern with GAN-based GI object detection system to realize selecting the region of interest for foveated imaging intelligently, which improved the reconstruction accuracy [11].…”
Section: Introductionmentioning
confidence: 99%
“…Sui et al proposed a multi-image authentication method by combining the intensity equation transmission technique [14]; Zhang et al combined phase recovery with correlation imaging and proposed a multi-image based on phase recovery algorithm and ghost imaging holographic encryption technique [15]; Yuan et al proposed a multi-image encryption scheme based on Hadamard matrix ghost imaging and spatial multiplexing, which uses spatial multiplexing technique to combine multiple sampled images into one image, and then performs Fourier transform inverse operation, and finally, the combined image is encrypted with ghost images [16]. Currently, these multi-image encryption methods increase the number of encrypted images but also increase the complexity of the system; at the same time, the time and complexity of data processing increases with the increase of encryption capacity [15,[17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, the deep learning (DL) technique is employed to identify images [26,27] and improve the quality of images with the deep neural network (DNN) [28][29][30][31][32][33][34][35][36]. Specifically, computational ghost imaging via deep learning (CGIDL) has shown a minimum ratio of Nyquist limit down to ∼ 5% [29,33].…”
Section: Introductionmentioning
confidence: 99%