Ghost imaging for three-dimensional optical security

Ghost imaging has become increasingly popular in quantum and optical application fields. Here, we report three-dimensional (3D) optical security using ghost imaging. The series of random phase-only masks are sparsified, which are further converted into particle-like distributions placed in 3D space. We show that either an optical or digital approach can be employed for the encoding. The results illustrate that a larger key space can be generated due to the application of 3D space compared with previous works.

[1]  R. Gerchberg A practical algorithm for the determination of phase from image and diffraction plane pictures , 1972 .

[2]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[3]  Shih,et al.  Observation of two-photon "ghost" interference and diffraction. , 1995, Physical review letters.

[4]  Shih,et al.  Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[5]  B. Javidi Securing Information with Optical Technologies , 1997 .

[6]  R. Boyd,et al.  "Two-Photon" coincidence imaging with a classical source. , 2002, Physical review letters.

[7]  Giuliano Scarcelli,et al.  Can two-photon correlation of chaotic light be considered as correlation of intensity fluctuations? , 2006, Physical review letters.

[8]  Bahram Javidi,et al.  Physics of Automatic Target Recognition , 2007 .

[9]  Yanhua Shih,et al.  Ghost-imaging experiment by measuring reflected photons , 2008 .

[10]  Jeffrey H. Shapiro,et al.  Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[11]  Carlos García-Meca,et al.  Metamaterials for optical security , 2009 .

[12]  O. Katz,et al.  Ghost imaging with a single detector , 2008, 0812.2633.

[13]  Yangjian Cai,et al.  Ghost imaging with twisted Gaussian Schell-model beam. , 2009, Optics express.

[14]  O. Katz,et al.  Compressive ghost imaging , 2009, 0905.0321.

[15]  Robert W Boyd,et al.  Optimization of thermal ghost imaging: high-order correlations vs. background subtraction. , 2010, Optics express.

[16]  A. Gatti,et al.  Differential ghost imaging. , 2010, Physical review letters.

[17]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[18]  J. Shapiro,et al.  Ghost imaging: from quantum to classical to computational , 2010 .

[19]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[20]  Wenlin Gong,et al.  Improving imaging resolution of shaking targets by Fourier-transform ghost diffraction , 2012, 1207.6201.

[21]  E. Tajahuerce,et al.  Single-pixel digital ghost holography , 2012, 1305.7069.

[22]  Reza Kheradmand,et al.  Gray-scale and color optical encryption based on computational ghost imaging , 2012 .

[23]  Yanhua Shih,et al.  Virtual ghost imaging through turbulence and obscurants using Bessel beam illumination , 2012 .

[24]  J. Shapiro,et al.  Normalized ghost imaging , 2012, 1212.5041.

[25]  Ling-Jun Kong,et al.  Encryption of ghost imaging , 2013 .

[26]  A. Gatti,et al.  Backscattering differential ghost imaging in turbid media. , 2012, Physical review letters.

[27]  Wen Chen,et al.  Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.