Secured single-pixel ghost holography
暂无分享,去创建一个
[1] E. Cuche,et al. Digital holographic microscopy: a noninvasive contrast imaging technique allowing quantitative visualization of living cells with subwavelength axial accuracy. , 2005, Optics letters.
[2] Myungjin Cho,et al. Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.
[3] M. Chekhova,et al. High-visibility, high-order lensless ghost imaging with thermal light. , 2009, Optics letters.
[4] Chi-Ching Chang,et al. Three-dimensional information encryption and anticounterfeiting using digital holography. , 2015, Applied optics.
[5] Bahram Javidi,et al. Compression of encrypted three-dimensional objects using digital holography , 2004 .
[6] Kazuya Nakano,et al. Encrypted Sensing Based on Digital Holography for Fingerprint Images , 2015 .
[7] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[8] M. Padgett,et al. Fast full-color computational imaging with single-pixel detectors. , 2013, Optics express.
[9] Bahram Javidi,et al. Advances in optical security systems , 2014 .
[10] Mark A. Neifeld,et al. Digital wavefront reconstruction and its application to image encryption , 2000 .
[11] Ayman Alfalou,et al. Optical image compression and encryption methods , 2009 .
[12] John T Sheridan,et al. Phase-retrieval-based attacks on linear-canonical-transform-based DRPE systems. , 2016, Applied optics.
[13] Wei Liu,et al. Correlated-imaging-based chosen plaintext attack on general cryptosystems composed of linear canonical transforms and phase encodings , 2015 .
[14] Xudong Chen,et al. Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation , 2015 .
[15] Jingjuan Zhang,et al. Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.
[16] Wen Chen,et al. Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.
[17] A. Gatti,et al. Differential ghost imaging. , 2010, Physical review letters.
[18] Xudong Chen,et al. Computational Methods for Electromagnetic Inverse Scattering , 2018 .
[19] Wen Chen,et al. Grayscale object authentication based on ghost imaging using binary signals , 2015 .
[20] Xiaogang Wang,et al. Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase , 2015 .
[21] Arturo Carnicer,et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.
[22] Wen Chen,et al. 3D Gerchberg-Saxton Optical Correlation , 2018, IEEE Photonics Journal.
[23] N. Tian,et al. Fluorescence ghost imaging with pseudothermal light. , 2011, Optics letters.
[24] Ting Sun,et al. Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..
[25] Jeffrey H. Shapiro,et al. Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.
[26] Christian Depeursinge,et al. Simultaneous cell morphometry and refractive index measurement with dual-wavelength digital holographic microscopy and dye-enhanced dispersion of perfusion medium. , 2008, Optics letters.
[27] M. Padgett,et al. 3D Computational Imaging with Single-Pixel Detectors , 2013, Science.
[28] B. Kemper,et al. Digital holographic microscopy for live cell applications and technical inspection. , 2008, Applied optics.
[29] Reza Kheradmand,et al. Gray-scale and color optical encryption based on computational ghost imaging , 2012 .
[30] Graham M Gibson,et al. Improving the signal-to-noise ratio of single-pixel imaging using digital microscanning. , 2016, Optics express.
[31] Wenqi He,et al. Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium , 2017, Scientific Reports.
[32] Jingang Zhong,et al. Single-pixel imaging by means of Fourier spectrum acquisition , 2015, Nature Communications.
[33] O. Katz,et al. Ghost imaging with a single detector , 2008, 0812.2633.
[34] J. Goodman. Introduction to Fourier optics , 1969 .
[35] Wenlin Gong,et al. Correlated imaging through atmospheric turbulence , 2010, 1005.5011.
[36] Unnikrishnan Gopinathan,et al. Three-dimensional object recognition from digital Fresnel hologram by wavelet matched filtering , 2006 .
[37] Jesús Lancis,et al. Optical encryption based on computational ghost imaging. , 2010, Optics letters.
[38] Wen Chen. Hierarchically optical double-image correlation using 3D phase retrieval algorithm in fractional Fourier transform domain , 2018 .
[39] Peng Zhang,et al. Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.
[40] Osamu Matoba,et al. Optical Techniques for Information Security , 2009, Proceedings of the IEEE.
[41] J. Shapiro,et al. Normalized ghost imaging , 2012, 1212.5041.
[42] B. Javidi. Nonlinear joint power spectrum based optical correlation. , 1989, Applied optics.
[43] Wen Chen,et al. Ghost imaging for three-dimensional optical security , 2013 .
[44] Naveen K Nishchal,et al. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. , 2013, Applied optics.