2015
DOI: 10.1364/ao.54.001657
|View full text |Cite
|
Sign up to set email alerts
|

Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
25
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(27 citation statements)
references
References 34 publications
1
25
0
Order By: Relevance
“…Especially, optical multiple-image encryption has received a considerable amount of attention by researchers due to its high efficiency of data transmission, in which several images can be encoded into one image. In this aspect, many digital or optical multiplexing approaches have been proposed for multiple-image encryption [17][18][19][20][21][22][23][24][25][26][27][28][29][30], which also helps to enhance system capacity. Situ et al proposed the concept of multiple image encryption by using wavelength multiplexing [24] and position multiplexing [27].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Especially, optical multiple-image encryption has received a considerable amount of attention by researchers due to its high efficiency of data transmission, in which several images can be encoded into one image. In this aspect, many digital or optical multiplexing approaches have been proposed for multiple-image encryption [17][18][19][20][21][22][23][24][25][26][27][28][29][30], which also helps to enhance system capacity. Situ et al proposed the concept of multiple image encryption by using wavelength multiplexing [24] and position multiplexing [27].…”
Section: Introductionmentioning
confidence: 99%
“…Deng et al reported multiple image security schemes based on phase retrieval and intermodulation in the Fourier domain [26]. In this scheme, images are encoded and then multiplexed into a single-phase data without involving cross-talk and loss of information [23], [25]- [29]. Kong et al proposed a multi-image encryption scheme based on the interference of a computer-generated hologram.…”
Section: Introductionmentioning
confidence: 99%
“…Especially since the double random-phase encryption method [1] was proposed, all kinds of random-phase encoding (RPE) schemes based on diffraction or interference principles have been booming [2][3][4][5][6][7][8][9][10][11][12][13]. As the accompanying complementary opposites, the corresponding security analyses have also been carried out and have promoted the further development of optical encryption techniques [14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…The former aims to recover a meaningful output image with good quality, resulting in a high correlation coefficient (CC) with the standard certification image [25][26][27]; the latter is designed to realize and retrieve insignificant or meaningless information, but it can result in a remarkable peak output in the nonlinear correlation coefficient (NCC) of the output image and the standard certification image, and the low-level authentication can provide an additional security layer for optical security system [28][29][30][31][32][33][34][35][36][37][38]. Since Chen and Chen proposed the object authentication method in computational ghost imaging with the realizations less than 5% of Nyquist limit [28], the lowlevel authentication has attracted much researchers' attention [29][30][31][32][33][34].…”
Section: Introductionmentioning
confidence: 99%
“…In 2014, based on modified Gerchberg-Saxton algorithm and random sampling strategy, Chen and Chen proposed an optical multiple-image low-level authentication scheme, in which the system capacity can be arbitrarily controlled by use of random sampling [36,37]. Recently, Rajptu et al [38] proposed an optical multiple-image low-level authentication method based on photon counting imaging, phase mask multiplexing, and phase retrieval algorithm in the fractional Fourier transform domain. To build versatile authentication system, here we present a kind of multilevel authentication system for multiple-image based on modulated real part synthesis and iterative phase multiplexing techniques, which can accomplish not only the low-level authentication but also the high-level authentication for multiple certification images.…”
Section: Introductionmentioning
confidence: 99%