Ghost imaging for three-dimensional optical security
暂无分享,去创建一个
[1] R. Gerchberg. A practical algorithm for the determination of phase from image and diffraction plane pictures , 1972 .
[2] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[3] Shih,et al. Observation of two-photon "ghost" interference and diffraction. , 1995, Physical review letters.
[4] Shih,et al. Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[5] B. Javidi. Securing Information with Optical Technologies , 1997 .
[6] R. Boyd,et al. "Two-Photon" coincidence imaging with a classical source. , 2002, Physical review letters.
[7] Giuliano Scarcelli,et al. Can two-photon correlation of chaotic light be considered as correlation of intensity fluctuations? , 2006, Physical review letters.
[8] Bahram Javidi,et al. Physics of Automatic Target Recognition , 2007 .
[9] Yanhua Shih,et al. Ghost-imaging experiment by measuring reflected photons , 2008 .
[10] Jeffrey H. Shapiro,et al. Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.
[11] Carlos García-Meca,et al. Metamaterials for optical security , 2009 .
[12] O. Katz,et al. Ghost imaging with a single detector , 2008, 0812.2633.
[13] Yangjian Cai,et al. Ghost imaging with twisted Gaussian Schell-model beam. , 2009, Optics express.
[14] O. Katz,et al. Compressive ghost imaging , 2009, 0905.0321.
[15] Robert W Boyd,et al. Optimization of thermal ghost imaging: high-order correlations vs. background subtraction. , 2010, Optics express.
[16] A. Gatti,et al. Differential ghost imaging. , 2010, Physical review letters.
[17] Jesús Lancis,et al. Optical encryption based on computational ghost imaging. , 2010, Optics letters.
[18] J. Shapiro,et al. Ghost imaging: from quantum to classical to computational , 2010 .
[19] Myungjin Cho,et al. Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.
[20] Wenlin Gong,et al. Improving imaging resolution of shaking targets by Fourier-transform ghost diffraction , 2012, 1207.6201.
[21] E. Tajahuerce,et al. Single-pixel digital ghost holography , 2012, 1305.7069.
[22] Reza Kheradmand,et al. Gray-scale and color optical encryption based on computational ghost imaging , 2012 .
[23] Yanhua Shih,et al. Virtual ghost imaging through turbulence and obscurants using Bessel beam illumination , 2012 .
[24] J. Shapiro,et al. Normalized ghost imaging , 2012, 1212.5041.
[25] Ling-Jun Kong,et al. Encryption of ghost imaging , 2013 .
[26] A. Gatti,et al. Backscattering differential ghost imaging in turbid media. , 2012, Physical review letters.
[27] Wen Chen,et al. Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.