Noise reduction in selective computational ghost imaging using genetic algorithm

Abstract Recently, we have presented a selective computational ghost imaging (SCGI) method as an advanced technique for enhancing the security level of the encrypted ghost images. In this paper, we propose a modified method to improve the ghost image quality reconstructed by SCGI technique. The method is based on background subtraction using genetic algorithm (GA) which eliminates background noise and gives background-free ghost images. Analyzing the universal image quality index by using experimental data proves the advantage of this modification method. In particular, the calculated value of the image quality index for modified SCGI over 4225 realization shows an 11 times improvement with respect to SCGI technique. This improvement is 20 times in comparison to conventional CGI technique.

[1]  A. Gatti,et al.  Differential ghost imaging. , 2010, Physical review letters.

[2]  A. Gatti,et al.  High-resolution ghost image and ghost diffraction experiments with thermal light. , 2005, Physical review letters.

[3]  J. Shapiro,et al.  Normalized ghost imaging , 2012, 1212.5041.

[4]  Wen Chen,et al.  Grayscale object authentication based on ghost imaging using binary signals , 2015 .

[5]  O. Katz,et al.  Compressive ghost imaging , 2009, 0905.0321.

[6]  M. Padgett,et al.  3D Computational Imaging with Single-Pixel Detectors , 2013, Science.

[7]  A. Gatti,et al.  Coherent imaging with pseudo-thermal incoherent light , 2005, quant-ph/0504082.

[8]  Y. Shih,et al.  Two-photon "ghost" imaging with thermal light , 2004, 2005 Quantum Electronics and Laser Science Conference.

[9]  A. Solov'yov,et al.  Atomic cluster collisions , 2013 .

[10]  J. Shapiro,et al.  Ghost imaging: from quantum to classical to computational , 2010 .

[11]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[12]  A. Gatti,et al.  Ghost imaging with thermal light: comparing entanglement and classical correlation. , 2003, Physical review letters.

[13]  Randy L. Haupt,et al.  Practical Genetic Algorithms , 1998 .

[14]  Reza Kheradmand,et al.  Fast ghost imaging and ghost encryption based on the discrete cosine transform , 2013 .

[15]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[16]  Jeffrey H. Shapiro,et al.  The physics of ghost imaging , 2012, Quantum Information Processing.

[17]  Jeffrey H. Shapiro,et al.  Unified theory of ghost imaging with Gaussian-state light , 2007, 0712.3554.

[18]  Wen Chen,et al.  Correlated-Photon Secured Imaging by Iterative Phase Retrieval Using Axially-Varying Distances , 2016, IEEE Photonics Technology Letters.

[19]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[20]  Reza Kheradmand,et al.  Gray-scale and color optical encryption based on computational ghost imaging , 2012 .

[21]  Zhou Wang,et al.  Why is image quality assessment so difficult? , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[22]  Douglas H. Werner,et al.  Genetic Algorithms in Electromagnetics , 2007 .

[23]  Wei Wang,et al.  Iterative ghost imaging. , 2014, Optics letters.

[24]  Shih,et al.  Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[25]  Mansour Eslami,et al.  High quality computational ghost imaging using multi-fluorescent screen. , 2015, Journal of the Optical Society of America. A, Optics, image science, and vision.

[26]  R. Boyd,et al.  "Two-Photon" coincidence imaging with a classical source. , 2002, Physical review letters.

[27]  Ling-An Wu,et al.  Iterative denoising of ghost imaging. , 2014, Optics express.

[28]  Reza Kheradmand,et al.  Computational fluorescence ghost imaging , 2013 .

[29]  Wen Chen Modulating Phase via Rotation for Optical Encoding Based on Correlated Photon Imaging , 2016, IEEE Photonics Technology Letters.

[30]  Jeffrey H. Shapiro,et al.  Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[31]  O. Katz,et al.  Ghost imaging with a single detector , 2008, 0812.2633.

[32]  Franz Rothlauf,et al.  Representations for genetic and evolutionary algorithms , 2002, Studies in Fuzziness and Soft Computing.

[33]  Reza Kheradmand,et al.  Optical encryption with selective computational ghost imaging , 2014 .