2015
DOI: 10.1016/j.optcom.2015.04.063
|View full text |Cite
|
Sign up to set email alerts
|

High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
37
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 122 publications
(39 citation statements)
references
References 26 publications
0
37
0
Order By: Relevance
“…Fourier transform patterns [26], Hadamard patterns [8], wavelet patterns [27]). In addition, error correction coding ( [28][29][30]) can be used to improve the imaging efficiency in encrypted SPI. However, it is still hard to successfully recover an object image with good fidelity from only a short single-pixel intensity sequence consisting of a small number of pixels.…”
Section: Introductionmentioning
confidence: 99%
“…Fourier transform patterns [26], Hadamard patterns [8], wavelet patterns [27]). In addition, error correction coding ( [28][29][30]) can be used to improve the imaging efficiency in encrypted SPI. However, it is still hard to successfully recover an object image with good fidelity from only a short single-pixel intensity sequence consisting of a small number of pixels.…”
Section: Introductionmentioning
confidence: 99%
“…The key sensitivity of measurement matrices with 3D Lorenz has been analyzed in detail to demonstrate their advantages [15, 2426]. Here we emphasize the key sensitivity of the order of the tensor product.…”
Section: Numerical Simulation Resultsmentioning
confidence: 99%
“…Meanwhile, various optical transforms such as fractional Fourier transform, Fresnel transform, gyrator transform, and other means have been applied, where additional parameters can be considered the secret keys to enhance the level of security [16][17][18][19][20][21][22][23][24][25][26][27][28]. Due to its novel physical characteristics such as the complexity of its optical parameters, the ghost imaging technique can provide a promising alternative for the optical cryptosystem [29][30][31][32][33]. Zhang et al [34] encrypted a fast Fourier transformed image using the compressive ghost imaging system to improve the level of security.…”
Section: Introductionmentioning
confidence: 99%