Correlated-Photon Secured Imaging by Iterative Phase Retrieval Using Axially-Varying Distances
暂无分享,去创建一个
[1] Quanying Wu,et al. Information encryption in phase space. , 2015, Optics letters.
[2] Wen Chen,et al. Grayscale object authentication based on ghost imaging using binary signals , 2015 .
[3] B Javidi,et al. Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.
[4] Jesús Lancis,et al. Optical encryption based on computational ghost imaging. , 2010, Optics letters.
[5] Xudong Chen,et al. Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation , 2015 .
[6] Shih,et al. Observation of two-photon "ghost" interference and diffraction. , 1995, Physical review letters.
[7] Ling-An Wu,et al. Adaptive compressive ghost imaging based on wavelet trees and sparse representation. , 2014, Optics express.
[8] J. Shapiro,et al. Normalized ghost imaging , 2012, 1212.5041.
[9] Wen Chen,et al. Ghost imaging for three-dimensional optical security , 2013 .
[10] A. Gatti,et al. Ghost imaging with thermal light: comparing entanglement and classical correlation. , 2003, Physical review letters.
[11] Bahram Javidi,et al. Full-phase photon-counting double-random-phase encryption. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.
[12] O. Katz,et al. Compressive ghost imaging , 2009, 0905.0321.
[13] Wen Chen. Optical Data Security System Using Phase Extraction Scheme via Single-Pixel Detection , 2016, IEEE Photonics Journal.
[14] Bahram Javidi,et al. Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.
[15] Myungjin Cho,et al. Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.
[16] Jeffrey H. Shapiro,et al. Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.
[17] Bahram Javidi,et al. Three-dimensional recognition of photon-starved events using computational integral imaging and statistical sampling. , 2009, Optics letters.
[18] Wen Chen,et al. Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.
[19] B. Erkmen. Computational ghost imaging for remote sensing. , 2012, Journal of the Optical Society of America. A, Optics, image science, and vision.
[20] Ying Wang,et al. Pattern recognition based on the correlated intensity fluctuations of thermal light. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.
[21] Reza Kheradmand,et al. Gray-scale and color optical encryption based on computational ghost imaging , 2012 .
[22] A. Gatti,et al. Differential ghost imaging. , 2010, Physical review letters.
[23] Y. Shih,et al. Two-photon "ghost" imaging with thermal light , 2004, 2005 Quantum Electronics and Laser Science Conference.
[24] Wen Chen,et al. Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption , 2015 .
[25] Robert W. Boyd,et al. High-order thermal ghost imaging , 2009 .
[26] J. Goodman. Introduction to Fourier optics , 1969 .
[27] Shih,et al. Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[28] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.