2017
DOI: 10.1109/lpt.2017.2703838
|View full text |Cite
|
Sign up to set email alerts
|

Optical Cryptography-Based Temporal Ghost Imaging With Chaotic Laser

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…( 1), the temporal resolution of the reconstruction image M (t) is determined by the coherence time of the randomized light source (τ l ) and the temporal resolution of D f , which is independent of the temporal resolution of the detector after the object. These features make TGI a potential technique for many applications, such as computational temporal imaging [36], optical secure imaging [37,38], detection efficiency evaluation of SPDs [39], and wavelength-conversion imaging [40].…”
Section: Principle Of Tgimentioning
confidence: 99%
“…( 1), the temporal resolution of the reconstruction image M (t) is determined by the coherence time of the randomized light source (τ l ) and the temporal resolution of D f , which is independent of the temporal resolution of the detector after the object. These features make TGI a potential technique for many applications, such as computational temporal imaging [36], optical secure imaging [37,38], detection efficiency evaluation of SPDs [39], and wavelength-conversion imaging [40].…”
Section: Principle Of Tgimentioning
confidence: 99%
“…However, a notorious cryptographic application of these systems is chaos based image encryption algorithms [6], [28], [32], [35]. The researchers claimed that new image encryption algorithms could be designed using the strong theoretical relationship between chaos and cryptography [1]- [3], [7]- [17], [19], [8], [24]- [26], [30], [31], [36]. However, this strong theoretical relationship has led to the emergence of unsecure designs due to misuse and lack of analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Optical encryption, authentication and watermarking systems [1][2][3] can be constructed for information security applications, with advantages such as multi-dimensional parallel processing capabilities, fast processing speed and direct processing of physical objects without digitalization. In previous works, an image encryption system can be physically implemented with various types of optical imaging systems, including but not limited to double random phase encoding (DRPE) [4], holography [5,6], integral imaging [7][8][9], ptychography [10,11], and single-pixel imaging [12][13][14][15][16][17][18][19][20][21]. In these systems, the plaintext image is converted to a light field, which is optically transformed into a ciphertext light field with certain physical encryption keys (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…For other types of optical encryption systems such as DRPE [4], various implementations of encryption systems [24][25][26][27][28] and various types of cryptanalysis [29][30][31][32][33][34][35] including CPA, KPA and COA have been extensively investigated. However, for encrypted SPI, many works have been conducted on the design of encryption systems [12][13][14][15][16][17][18][19][20][21] since the earliest attempt [12] but little cryptanalysis has been investigated previously. As far as the author knows, only one such work [36] can be found, in which some CPA methods are proposed.…”
Section: Introductionmentioning
confidence: 99%