Forgery attack on optical encryption based on computational ghost imaging.
暂无分享,去创建一个
Xin Zhou | Sheng Yuan | Xuemei Liu | Lanjie Wang | Xiaoxia Zhou | Sheng Yuan | Xue-Mei Liu | Lanjie Wang
[1] Kang Yi,et al. Optical encryption based on ghost imaging and public key cryptography , 2018, Optics and Lasers in Engineering.
[2] Yonghui Tian,et al. Simulation and Demonstration of Directed XOR/XNOR Logic Gates Using Two Cascaded Microring Resonators , 2016 .
[3] Wenqi He,et al. Two-level image authentication by two-step phase-shifting interferometry and compressive sensing , 2018 .
[4] Guohua Wu,et al. Binary sampling ghost imaging: add random noise to fight quantization caused image quality decline , 2017, 1702.08687.
[5] Le Wang,et al. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique , 2015 .
[6] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[7] Wen Chen,et al. Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.
[8] C. Zhang,et al. Simultaneously performing optical and electrical responses from a plasmonic sensor based on gold/silicon Schottky junction. , 2019, Optics express.
[9] Xiang Peng,et al. Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.
[10] Ting Lei,et al. Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging , 2019, IEEE Access.
[11] Jingjuan Zhang,et al. Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.
[12] Jesús Lancis,et al. Optical encryption based on computational ghost imaging. , 2010, Optics letters.
[13] Wen Chen,et al. Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption , 2015 .
[14] Shuming Jiao,et al. Visual cryptography in single-pixel imaging , 2020, Optics express.
[15] Zhengjun Liu,et al. Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.
[16] O. Katz,et al. Ghost imaging with a single detector , 2008, 0812.2633.
[17] Wen Chen,et al. Ghost imaging for three-dimensional optical security , 2013 .
[18] Zhongyang Li,et al. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging , 2016 .
[19] Yan Zhang,et al. Multiple-image encryption based on computational ghost imaging , 2016 .
[20] Anand Asundi,et al. An optical watermarking scheme with two-layer framework based on computational ghost imaging , 2018, Optics and Lasers in Engineering.
[21] Wen Chen,et al. Grayscale object authentication based on ghost imaging using binary signals , 2015 .
[22] Hong Guo,et al. Image quality recovery in binary ghost imaging by adding random noise. , 2017, Optics letters.
[23] Jeffrey H. Shapiro,et al. Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.
[24] Ayman Alfalou,et al. Optical image compression and encryption methods , 2009 .
[25] Xiquan Fu,et al. Binary detection in ghost imaging with preserved grayscale , 2019, The European Physical Journal D.
[26] Xiang Peng,et al. Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling , 2016, IEEE Photonics Journal.