2016
DOI: 10.1016/j.optcom.2016.01.026
|View full text |Cite
|
Sign up to set email alerts
|

Optical image hiding based on computational ghost imaging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1
1

Relationship

3
7

Authors

Journals

citations
Cited by 54 publications
(28 citation statements)
references
References 29 publications
0
25
0
Order By: Relevance
“…A ghost imaging system can be employed for information security applications by employing the recorded intensity values as ciphertext and the reference patterns as key. The ghost imaging system output (intensity values recorded by the single pixel detector) can be embedded into a host image for watermarking application [38]. Furthermore, the ghost imaging output of one object image can be hidden into the ghost imaging output of another object image [39,40].…”
Section: Optical Watermarking With Ghost Imaging Systemmentioning
confidence: 99%
“…A ghost imaging system can be employed for information security applications by employing the recorded intensity values as ciphertext and the reference patterns as key. The ghost imaging system output (intensity values recorded by the single pixel detector) can be embedded into a host image for watermarking application [38]. Furthermore, the ghost imaging output of one object image can be hidden into the ghost imaging output of another object image [39,40].…”
Section: Optical Watermarking With Ghost Imaging Systemmentioning
confidence: 99%
“…GI offers great promise for its higher spatial resolution [3], [4] and higher detection sensitivity [5]. Thus, the past years have witnessed a rapidly growing interest in the applications of GI, ranging from laser radars [6], [7], microscopes [8], [9], object edges extraction [10]- [13], image hiding methods [14]- [16] to optical encryption schemes [17]- [20].…”
Section: Introductionmentioning
confidence: 99%
“…The technique has particular potential for imaging under turbulent [4][5][6][7] or low-light-level conditions [8] as well as in harsh environments where conventional imaging methods are hard or impossible to implement [9]. Recently, ghost imaging has been demonstrated in such diverse applications as x-ray [10], atom [11], and neutron [12] imaging, as well as in encryption [13], spectroscopy [14], ellipsometry [15,16], and polarimetry using Stokes correlations [17].…”
Section: Introductionmentioning
confidence: 99%