Residential College | false |
Status | 已發表Published |
Inverse computational ghost imaging for image encryption | |
Zheng, P![]() ![]() | |
2021-06-22 | |
Source Publication | Optics Express
![]() |
ISSN | 1094-4087 |
Pages | 21290-21299 |
Abstract | Computer-generated random patterns and bucket detection are two key characteristics of computational ghost imaging (GI), which offer it a potential application in optical encryption. Here, we propose an inverse computational GI scheme, in which bucket signals are firstly selected and then random patterns are calculated correspondingly. Different GI reconstruction algorithms are used to test the inverse computational GI, and the relationship between imaging quality and error ratio factor is discussed as well. Compared with computational GI, our inverse one not only has disguised bucket signals but also provides an opportunity to combine with other cryptographies, both of which enrich the GI-based encryption process and enhance the security simultaneously. |
Keyword | Ghost Imaging Image Encryption |
URL | View the original |
Language | 英語English |
The Source to Article | PB_Publication |
Document Type | Journal article |
Collection | INSTITUTE OF APPLIED PHYSICS AND MATERIALS ENGINEERING |
Corresponding Author | Liu, H. |
Recommended Citation GB/T 7714 | Zheng, P,Tan, Q,Liu, H.. Inverse computational ghost imaging for image encryption[J]. Optics Express, 2021, 21290-21299. |
APA | Zheng, P., Tan, Q., & Liu, H. (2021). Inverse computational ghost imaging for image encryption. Optics Express, 21290-21299. |
MLA | Zheng, P,et al."Inverse computational ghost imaging for image encryption".Optics Express (2021):21290-21299. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment