Computational ghost imaging encryption based on fingerprint phase mask
暂无分享,去创建一个
[1] R. Boyd,et al. "Two-Photon" coincidence imaging with a classical source. , 2002, Physical review letters.
[2] E. Cuche,et al. Simultaneous amplitude-contrast and quantitative phase-contrast microscopy by numerical reconstruction of Fresnel off-axis holograms. , 1999, Applied optics.
[3] Zhengjun Liu,et al. Optical secure image verification system based on ghost imaging , 2017 .
[4] Xiang Peng,et al. Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.
[5] Wen Chen,et al. Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption , 2015 .
[6] B Javidi,et al. Securing information by use of digital holography. , 2000, Optics letters.
[7] Aloka Sinha,et al. Securing information using optically generated biometric keys , 2016 .
[8] Ling-Jun Kong,et al. Encryption of ghost imaging , 2013 .
[9] Yangjian Cai,et al. Ghost imaging with incoherent and partially coherent light radiation. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[10] Free-space Fresnel diffraction for the approximation of fractional Fourier transform , 2002 .
[11] Kazuya Nakano,et al. Encoding plaintext by Fourier transform hologram in double random phase encoding using fingerprint keys , 2012 .
[12] Yi Qin,et al. Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation , 2017, IEEE Photonics Journal.
[13] Qindong Sun,et al. Double-image encryption using discrete fractional random transform and logistic maps , 2014 .
[14] Reza Kheradmand,et al. Optical encryption with selective computational ghost imaging , 2014 .
[15] P. Pellat-Finet. Fresnel diffraction and the fractional-order Fourier transform. , 1994, Optics letters.
[16] Zhengjun Liu,et al. Image encryption scheme by using iterative random phase encoding in gyrator transform domains , 2011 .
[17] A. Gatti,et al. Ghost imaging with thermal light: comparing entanglement and classical correlation. , 2003, Physical review letters.
[18] Jeffrey H. Shapiro,et al. Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.
[19] Zhengjun Liu,et al. Double image encryption based on iterative fractional Fourier transform , 2007 .
[20] Yushu Zhang,et al. Self-adaptive permutation and combined global diffusion for chaotic color image encryption , 2014 .
[21] O. Katz,et al. Compressive ghost imaging , 2009, 0905.0321.
[22] Jesús Lancis,et al. Optical encryption based on computational ghost imaging. , 2010, Optics letters.
[23] 曹非 Cao Fei,et al. Optical Encryption Scheme with Double Secret Keys Based on Computational Ghost Imaging , 2017 .
[24] Yan Zhang,et al. Multiple-image encryption based on computational ghost imaging , 2016 .
[25] Zilan Pan,et al. Optical Cryptography-Based Temporal Ghost Imaging With Chaotic Laser , 2017, IEEE Photonics Technology Letters.
[26] Shih,et al. Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.