Ghost identification based on single-pixel imaging in big data environment.
暂无分享,去创建一个
[1] Bahram Javidi,et al. Advances in optical security systems , 2014 .
[2] Wen Chen,et al. Marked ghost imaging , 2014 .
[3] J. Shapiro,et al. Normalized ghost imaging , 2012, 1212.5041.
[4] Y. Shih,et al. Turbulence-free ghost imaging , 2011 .
[5] Reza Kheradmand,et al. Gray-scale and color optical encryption based on computational ghost imaging , 2012 .
[6] N. Zhang,et al. Dielectric-Grating-Coupled Surface Plasmon Resonance From the Back Side of the Metal Film for Ultrasensitive Sensing , 2016, IEEE Photonics Journal.
[7] Hamid Latifi,et al. Compressive ghost imaging in the presence of environmental noise , 2019, Optics Communications.
[8] R. Boyd,et al. "Two-Photon" coincidence imaging with a classical source. , 2002, Physical review letters.
[9] Wen Chen,et al. Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.
[10] J. Shapiro,et al. Ghost imaging: from quantum to classical to computational , 2010 .
[11] Shih,et al. Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[12] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[13] B. Javidi. Securing Information with Optical Technologies , 1997 .
[14] Stephen Jesse,et al. Big data in reciprocal space: Sliding fast Fourier transforms for determining periodicity , 2015 .
[15] Wen Chen,et al. Ghost imaging for three-dimensional optical security , 2013 .
[16] A. Gatti,et al. Ghost imaging with thermal light: comparing entanglement and classical correlation. , 2003, Physical review letters.
[17] B. Erkmen. Computational ghost imaging for remote sensing. , 2012, Journal of the Optical Society of America. A, Optics, image science, and vision.
[18] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[19] A. Gatti,et al. Differential ghost imaging. , 2010, Physical review letters.
[20] Yanhua Shih,et al. Virtual ghost imaging through turbulence and obscurants using Bessel beam illumination , 2012 .
[21] Takayuki Takahashi,et al. Computational ghost imaging using deep learning , 2017, ArXiv.
[22] B. Javidi,et al. A polymeric optical pattern-recognition system for security verification , 1996, Nature.
[23] Wen Chen,et al. Grayscale object authentication based on ghost imaging using binary signals , 2015 .
[24] Jesús Lancis,et al. Optical encryption based on computational ghost imaging. , 2010, Optics letters.
[25] R. Boyd,et al. High-order thermal ghost imaging , 2009, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.
[26] Ling-Jun Kong,et al. Encryption of ghost imaging , 2013 .
[27] Shih,et al. Observation of two-photon "ghost" interference and diffraction. , 1995, Physical review letters.