Optical multilevel authentication based on singular value decomposition ghost imaging and secret sharing cryptography
暂无分享,去创建一个
Wenqi He | Xiulun Yang | Yurong Wang | Xiangfeng Meng | Huazheng Wu | Hongyi Chen | Xiangru Liu | Xiangfeng Meng | Xiulun Yang | Yurong Wang | Hongyi Chen | Huazheng Wu | Xian Liu | W. He
[1] A. Gatti,et al. Experimental evidence of high-resolution ghost imaging and ghost diffraction with classical thermal light , 2004, quant-ph/0408021.
[2] Chi Zhang,et al. Object reconstitution using pseudo-inverse for ghost imaging. , 2014, Optics express.
[3] A. Gatti,et al. Differential ghost imaging. , 2010, Physical review letters.
[4] Shih,et al. Observation of two-photon "ghost" interference and diffraction. , 1995, Physical review letters.
[5] Y. Shih. Quantum Imaging , 2007, IEEE Journal of Selected Topics in Quantum Electronics.
[6] Ching-Nung Yang,et al. Steganography and authentication in image sharing without parity bits , 2012 .
[7] Enrico Brambilla,et al. Correlated imaging, quantum and classical , 2004 .
[8] Giuseppe Schirripa Spagnolo,et al. Content fragile watermarking based on a computer generated hologram coding technique , 2005 .
[9] Zhang Leihong,et al. High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform , 2016 .
[10] Lu-Zhong Cai,et al. Information security system by iterative multiple-phase retrieval and pixel random permutation. , 2006, Applied optics.
[11] Wenlin Gong. High-resolution pseudo-inverse ghost imaging , 2015 .
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Qionghai Dai,et al. Multispectral imaging using a single bucket detector , 2015, Scientific Reports.
[14] Wenqi He,et al. Optical information encoding and image watermarking scheme based on phase-shifting interferometry and singular value decomposition , 2013 .
[15] Naveen K. Nishchal,et al. Image encryption and authentication verification using fractional nonconventional joint transform correlator , 2012 .
[16] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[17] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[18] Jesús Lancis,et al. Optical encryption based on computational ghost imaging. , 2010, Optics letters.
[19] Xiang Peng,et al. Singular value decomposition ghost imaging. , 2018, Optics express.
[20] John T. Sheridan,et al. A review of optical image encryption techniques , 2014 .
[21] Bahram Javidi,et al. Advances in optical security systems , 2014 .
[22] Wen Chen,et al. Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.
[23] Bahram Javidi,et al. Guest Editorial: Special Section on Optical Pattern Recognition , 1994 .
[24] Qionghai Dai,et al. High Speed Computational Ghost Imaging via Spatial Sweeping , 2017, Scientific Reports.
[25] Linfei Chen,et al. Image encryption based on singular value decomposition and Arnold transform in fractional domain , 2013 .
[26] Min-Shian Hwang,et al. A new approach to the secret image sharing with steganography and authentication , 2009 .
[27] Osamu Matoba,et al. Optical Techniques for Information Security , 2009, Proceedings of the IEEE.
[28] Jinli Suo,et al. Gerchberg-Saxton-like ghost imaging. , 2015, Optics express.
[29] Jeffrey H. Shapiro,et al. Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.
[30] Chih-Chin Lai,et al. An improved SVD-based watermarking scheme using human visual characteristics , 2011 .
[31] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[32] Lina Zhou,et al. Secured single-pixel ghost holography , 2020 .
[33] Wen Chen,et al. Ghost imaging for three-dimensional optical security , 2013 .
[34] Zhenfu Cao,et al. Survey of information security , 2007, Science in China Series F: Information Sciences.
[35] Wen Chen,et al. Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption , 2015 .
[36] Naveen K. Nishchal,et al. Flexible optical encryption with multiple users and multiple security levels , 2011 .
[37] Graham M. Gibson,et al. Simultaneous real-time visible and infrared video with single-pixel detectors , 2015, Scientific Reports.
[38] William Puech,et al. Application of Homomorphism to Secure Image Sharing , 2011 .
[39] Joseph L. Horner. Optical Pattern Recognition , 2016 .
[40] Wenlin Gong,et al. A method to improve the visibility of ghost images obtained by thermal light , 2010 .
[41] Graham M Gibson,et al. Improving the signal-to-noise ratio of single-pixel imaging using digital microscanning. , 2016, Optics express.
[42] Naveen K. Nishchal,et al. Optical asymmetric cryptosystem based on photon counting and phase-truncated Fresnel transforms , 2017 .
[43] Zhongyang Li,et al. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging , 2016 .
[44] X C Cheng,et al. Security enhancement of double-random phase encryption by amplitude modulation. , 2008, Optics letters.
[45] Wenqi He,et al. Multilevel image authentication using shared secret threshold and phase retrieval , 2014 .
[46] Shih,et al. Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[47] Bahram Javidi,et al. Optical encryption using a joint transform correlator architecture , 2000 .
[48] A. Gatti,et al. Correlated imaging, quantum and classical , 2003, quant-ph/0307187.
[49] Wen Chen. Optical cryptosystem based on single-pixel encoding using the modified Gerchberg-Saxton algorithm with a cascaded structure. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.
[50] M. Padgett,et al. 3D Computational Imaging with Single-Pixel Detectors , 2013, Science.
[51] Bahram Javidi,et al. Roadmap on optical security , 2016 .
[52] Wen Chen. Modulating Phase via Rotation for Optical Encoding Based on Correlated Photon Imaging , 2016, IEEE Photonics Technology Letters.
[53] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[54] B Javidi,et al. Securing information by use of digital holography. , 2000, Optics letters.
[55] Bahram Javidi,et al. Watermarking of three-dimensional objects by digital holography. , 2003, Optics letters.
[56] Wenqi He,et al. Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. , 2013, Applied optics.
[57] A. Stern,et al. Phase-Modulated Optical System With Sparse Representation for Information Encoding and Authentication , 2013, IEEE Photonics Journal.
[58] Yanhua Shih,et al. Quantum imaging , 2007, 2007 Conference on Lasers and Electro-Optics - Pacific Rim.
[59] José A. Rodrigo,et al. Applications of gyrator transform for image processing , 2007 .
[60] Guohai Situ,et al. Deep-learning-based ghost imaging , 2017, Scientific Reports.
[61] X. F. Meng,et al. Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain , 2007 .