Ghost identification based on single-pixel imaging in big data environment.

In recent years, single-pixel imaging has become one of the most interesting and promising imaging technologies for various applications. In this paper, a big data environment for the first time to my knowledge is designed and introduced into single-pixel ghost imaging for securing information. Many series of one-dimensional ciphertexts are recorded by a single-pixel bucket detector to form a big data environment. Several hidden inputs are further encoded based on ghost imaging by using hierarchical structure, and their corresponding ciphertexts are synthesized into the big data environment for verifying the hidden ghosts and identifying the targeted ghosts. This new finding could open up a different research perspective for exploring more applications based on single-pixel imaging.

[1]  Bahram Javidi,et al.  Advances in optical security systems , 2014 .

[2]  Wen Chen,et al.  Marked ghost imaging , 2014 .

[3]  J. Shapiro,et al.  Normalized ghost imaging , 2012, 1212.5041.

[4]  Y. Shih,et al.  Turbulence-free ghost imaging , 2011 .

[5]  Reza Kheradmand,et al.  Gray-scale and color optical encryption based on computational ghost imaging , 2012 .

[6]  N. Zhang,et al.  Dielectric-Grating-Coupled Surface Plasmon Resonance From the Back Side of the Metal Film for Ultrasensitive Sensing , 2016, IEEE Photonics Journal.

[7]  Hamid Latifi,et al.  Compressive ghost imaging in the presence of environmental noise , 2019, Optics Communications.

[8]  R. Boyd,et al.  "Two-Photon" coincidence imaging with a classical source. , 2002, Physical review letters.

[9]  Wen Chen,et al.  Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.

[10]  J. Shapiro,et al.  Ghost imaging: from quantum to classical to computational , 2010 .

[11]  Shih,et al.  Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[12]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[13]  B. Javidi Securing Information with Optical Technologies , 1997 .

[14]  Stephen Jesse,et al.  Big data in reciprocal space: Sliding fast Fourier transforms for determining periodicity , 2015 .

[15]  Wen Chen,et al.  Ghost imaging for three-dimensional optical security , 2013 .

[16]  A. Gatti,et al.  Ghost imaging with thermal light: comparing entanglement and classical correlation. , 2003, Physical review letters.

[17]  B. Erkmen Computational ghost imaging for remote sensing. , 2012, Journal of the Optical Society of America. A, Optics, image science, and vision.

[18]  Chunxiao Jiang,et al.  Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.

[19]  A. Gatti,et al.  Differential ghost imaging. , 2010, Physical review letters.

[20]  Yanhua Shih,et al.  Virtual ghost imaging through turbulence and obscurants using Bessel beam illumination , 2012 .

[21]  Takayuki Takahashi,et al.  Computational ghost imaging using deep learning , 2017, ArXiv.

[22]  B. Javidi,et al.  A polymeric optical pattern-recognition system for security verification , 1996, Nature.

[23]  Wen Chen,et al.  Grayscale object authentication based on ghost imaging using binary signals , 2015 .

[24]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[25]  R. Boyd,et al.  High-order thermal ghost imaging , 2009, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[26]  Ling-Jun Kong,et al.  Encryption of ghost imaging , 2013 .

[27]  Shih,et al.  Observation of two-photon "ghost" interference and diffraction. , 1995, Physical review letters.