Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain
暂无分享,去创建一个
Wenqi He | Yurong Wang | Xiang Peng | Xianye Li | Xiangfeng Meng | Yongkai Yin | Xiulun Yang | Guoyan Dong | Hongyi Chen | Xiang Peng | Xianye Li | Xiangfeng Meng | Xiulun Yang | Yongkai Yin | Yurong Wang | G. Dong | Hongyi Chen | W. He
[1] Shih,et al. Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[2] Wen Chen,et al. Optical Multiple-Image Encryption Using Three-Dimensional Space , 2016, IEEE Photonics Journal.
[3] M. Biyajima. A possible modification of the Koonin formula of two-proton interferometry including an effect of two-proton clusters with a short range correlation , 1983 .
[4] Thong T. Do,et al. Sparsity adaptive matching pursuit algorithm for practical compressed sensing , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[5] Jingjuan Zhang,et al. Position multiplexing for multiple-image encryption , 2006 .
[6] Lu-Zhong Cai,et al. Information security system by iterative multiple-phase retrieval and pixel random permutation. , 2006, Applied optics.
[7] N. E. Day. Linear and quadratic discrimination in pattern recognition (Corresp.) , 1969, IEEE Trans. Inf. Theory.
[8] L Z Cai,et al. Two-step phase-shifting interferometry and its application in image encryption. , 2006, Optics letters.
[9] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[10] Qu Wang,et al. Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain. , 2013, Applied optics.
[11] Ting Sun,et al. Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..
[12] Wen Chen. Modulating Phase via Rotation for Optical Encoding Based on Correlated Photon Imaging , 2016, IEEE Photonics Technology Letters.
[13] A. Alfalou,et al. Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption. , 2010, Optics letters.
[14] Yuan Zhao,et al. Heterodyne 3D ghost imaging , 2016 .
[15] Kwok-Wo Wong,et al. Embedding cryptographic features in compressive sensing , 2014, Neurocomputing.
[16] Jiantao Zhou,et al. A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.
[17] Yan Zhang,et al. Multiple-image encryption based on computational ghost imaging , 2016 .
[18] Jingjuan Zhang,et al. Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.
[19] B. Javidi,et al. Encrypting three-dimensional information with digital holography. , 2000, Applied optics.
[20] A. Gatti,et al. Ghost imaging with thermal light: comparing entanglement and classical correlation. , 2004, Physical review letters.
[21] Xudong Chen,et al. Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation , 2015 .
[22] Xiang Peng,et al. Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling , 2016, IEEE Photonics Journal.
[23] Bo Wang,et al. Optical image encryption based on interference. , 2008, Optics letters.
[24] Li-Hua Gong,et al. Novel optical image encryption scheme based on fractional Mellin transform , 2011 .
[25] S Liu,et al. Optical image encryption with multistage and multichannel fractional Fourier-domain filtering. , 2001, Optics letters.
[26] Wen Chen. Optical cryptosystem based on single-pixel encoding using the modified Gerchberg-Saxton algorithm with a cascaded structure. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.
[27] O. Katz,et al. Compressive ghost imaging , 2009, 0905.0321.
[28] D. Donoho,et al. Atomic Decomposition by Basis Pursuit , 2001 .
[29] V. Torres-Company,et al. Optical encryption with compressive ghost imaging , 2011, 2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC).
[30] X. F. Meng,et al. Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain , 2007 .
[31] D. Klyshko. Combine EPR and two-slit experiments: Interference of advanced waves , 1988 .
[32] Wenqi He,et al. Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. , 2013, Applied optics.
[33] Wen Chen,et al. Correlated-Photon Secured Imaging by Iterative Phase Retrieval Using Axially-Varying Distances , 2016, IEEE Photonics Technology Letters.
[34] Adi Shamir,et al. How to share a secret , 1979, CACM.
[35] Zhengjun Liu,et al. Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.
[36] O. Katz,et al. Ghost imaging with a single detector , 2008, 0812.2633.
[37] Myrian Tebaldi,et al. Multiplexing encryption–decryption via lateral shifting of a random phase mask , 2006 .
[38] Wen Chen,et al. Marked ghost imaging , 2014 .
[39] Joel A. Tropp,et al. Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.