Correlated-Photon Secured Imaging by Iterative Phase Retrieval Using Axially-Varying Distances

Correlated-photon imaging (also called ghost imaging) has attracted much attention in various fields, and its characteristics, such as single-pixel detection, have been extensively explored. In this letter, correlated-photon imaging is presented by using iterative phase retrieval with axially varying distances for optical encryption. A series of phase-only masks are iteratively extracted by modulating the pre-generated random intensity-only maps, and propagation distances are axially varied in a random manner. It is illustrated that the setup parameter can be applied as one of significant keys rather than just complementary one, and the iterative phase retrieval algorithm is applied to flexibly generate phase-only masks for the encoding.

[1]  Quanying Wu,et al.  Information encryption in phase space. , 2015, Optics letters.

[2]  Wen Chen,et al.  Grayscale object authentication based on ghost imaging using binary signals , 2015 .

[3]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[4]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[5]  Xudong Chen,et al.  Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation , 2015 .

[6]  Shih,et al.  Observation of two-photon "ghost" interference and diffraction. , 1995, Physical review letters.

[7]  Ling-An Wu,et al.  Adaptive compressive ghost imaging based on wavelet trees and sparse representation. , 2014, Optics express.

[8]  J. Shapiro,et al.  Normalized ghost imaging , 2012, 1212.5041.

[9]  Wen Chen,et al.  Ghost imaging for three-dimensional optical security , 2013 .

[10]  A. Gatti,et al.  Ghost imaging with thermal light: comparing entanglement and classical correlation. , 2004, Physical review letters.

[11]  Bahram Javidi,et al.  Full-phase photon-counting double-random-phase encryption. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[12]  O. Katz,et al.  Compressive ghost imaging , 2009, 0905.0321.

[13]  Wen Chen Optical Data Security System Using Phase Extraction Scheme via Single-Pixel Detection , 2016, IEEE Photonics Journal.

[14]  Bahram Javidi,et al.  Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.

[15]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[16]  Jeffrey H. Shapiro,et al.  Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[17]  Bahram Javidi,et al.  Three-dimensional recognition of photon-starved events using computational integral imaging and statistical sampling. , 2009, Optics letters.

[18]  Wen Chen,et al.  Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.

[19]  B. Erkmen Computational ghost imaging for remote sensing. , 2012, Journal of the Optical Society of America. A, Optics, image science, and vision.

[20]  Ying Wang,et al.  Pattern recognition based on the correlated intensity fluctuations of thermal light. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[21]  Reza Kheradmand,et al.  Gray-scale and color optical encryption based on computational ghost imaging , 2012 .

[22]  A. Gatti,et al.  Differential ghost imaging. , 2010, Physical review letters.

[23]  Y. Shih,et al.  Two-photon "ghost" imaging with thermal light , 2004, 2005 Quantum Electronics and Laser Science Conference.

[24]  Wen Chen,et al.  Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption , 2015 .

[25]  Robert W. Boyd,et al.  High-order thermal ghost imaging , 2009 .

[26]  J. Goodman Introduction to Fourier optics , 1969 .

[27]  Shih,et al.  Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[28]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.