2015
DOI: 10.1016/bs.po.2015.02.002
|View full text |Cite
|
Sign up to set email alerts
|

Recent Advances in Optical Image Processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
17
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(17 citation statements)
references
References 235 publications
0
17
0
Order By: Relevance
“…By the van Cittert-Zernike theorem, the speckle size at the object plane can be calculated with δ (z) = λz/πω and ω is the laser beam waist, which roughly leads to 20 µm. Figure 3(a) shows a typical pattern generated from one row of the Hadamard matrix with order 2 12 , which indicates that the size of the pattern is 64 × 64 pixels. Figure 3(b) shows its corresponding phase-only mask retrieved with the modified Gerchberg-Saxton algorithm.…”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…By the van Cittert-Zernike theorem, the speckle size at the object plane can be calculated with δ (z) = λz/πω and ω is the laser beam waist, which roughly leads to 20 µm. Figure 3(a) shows a typical pattern generated from one row of the Hadamard matrix with order 2 12 , which indicates that the size of the pattern is 64 × 64 pixels. Figure 3(b) shows its corresponding phase-only mask retrieved with the modified Gerchberg-Saxton algorithm.…”
Section: Results and Analysismentioning
confidence: 99%
“…Since Refregier and Javidi proposed the famous image encryption architecture based on double random phase encoding in the Fourier transform domain [11], numerous optical techniques have been widely applied in the field of information security owing to their high speed parallel processing and multidimensional capabilities [12][13][14][15]. Meanwhile, various optical transforms such as fractional Fourier transform, Fresnel transform, gyrator transform, and other means have been applied, where additional parameters can be considered the secret keys to enhance the level of security [16][17][18][19][20][21][22][23][24][25][26][27][28].…”
Section: Introductionmentioning
confidence: 99%
“…Optical image encryption [1]- [16] has made significant advances in recent decades. The interference-based encryption (IBE) scheme [17] proposed by Zhang and Wang is useful for optical image encryption because of its simple structure and an encryption process that does not involve iteration.…”
Section: Introductionmentioning
confidence: 99%
“…While acoustic methods offer the undoubted advantage to cover larger volumes of water at low resolution, optical systems are needed for habitat mapping and monitoring, as their richer data accommodates more accessible analyses, for instance in terms of species identification, enumeration, and distributions. High-definition camera sensors, improved artificial illumination systems, LIDAR sensors for bathymetry, range-gated imaging systems, and holography are all aspects in which underwater vision technology has greatly advanced in the recent years to improve coastal and open ocean habitat mapping [4][5][6][7][8][9]. Light source is often considered a critical element in these applications, and imaging systems are distinguished as passive when they rely on natural lighting, or active when artificial illumination is used.…”
mentioning
confidence: 99%