2013
DOI: 10.1063/1.4836995
|View full text |Cite
|
Sign up to set email alerts
|

Ghost imaging for three-dimensional optical security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
60
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 107 publications
(60 citation statements)
references
References 26 publications
0
60
0
Order By: Relevance
“…5(a) that due to the use of sparsity strategy, information related to any object cannot be clearly observed. Since the recovered object still contains some invisible but useful information, nonlinear correlation algorithm [24][25][26][27][28][29][30][31][32] is applied to verify the reconstructed object. Fig.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…5(a) that due to the use of sparsity strategy, information related to any object cannot be clearly observed. Since the recovered object still contains some invisible but useful information, nonlinear correlation algorithm [24][25][26][27][28][29][30][31][32] is applied to verify the reconstructed object. Fig.…”
Section: Resultsmentioning
confidence: 99%
“…where N a ðξ; ηÞ and N s ðξ; ηÞ denote nonlinear correlation distributions respectively corresponding to addition and subtraction cases, asterisk denotes complex conjugate, FT and IFT respectively denote 2D Fourier transform and inverse Fourier transform, taðξ; ηÞ denotes the originally added image [taðξ; ηÞ ¼ t 1 ðξ; ηÞþt 2 ðξ; ηÞþt 3 ðξ; ηÞ], tsðξ; ηÞ denotes the originally subtracted image ½tsðξ; ηÞ ¼ t 1 ðξ; ηÞÀt 2 ðξ; ηÞÀt 3 ðξ; ηÞ, and p denotes the strength of applied nonlinearity [24][25][26][27][28][29][30][31][32]. To illustrate the proposed method aforementioned, a flow chart is given in Fig.…”
Section: Optical Setup and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Recently as a development of GI, the computational ghost imaging (CGI) is successfully applied in the field of optical cryptography [26], which noticeably reduces the number of bits required to transmit and store, because the ciphertext is not a complex-valued matrix but simply an intensity vector. Subsequently, many methods were proposed to improve the security and develop its application [27][28][29][30][31][32]. In addition, several secret sharing schemes were proposed based on combination theory [33][34][35], in which a secret image is encrypted into multiple parts and transmitted separately to multiple users, and the secret can only be decrypted by the qualified set of users.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, single-pixel imaging system [6][7][8][9][10][11][12][13] has been paid more and more attention and has been successfully applied in many fields, such as threedimensional imaging [6][7][8][9], optical security [10] and so on [11]. Single-pixel imaging system needs to modulate the illumination light intensity, and the reflected light is detected by single-pixel no-scanning detector.…”
Section: Introductionmentioning
confidence: 99%