2020
DOI: 10.1088/1674-1056/ab671a
|View full text |Cite
|
Sign up to set email alerts
|

Compressed ghost imaging based on differential speckle patterns*

Abstract: We propose a compressed ghost imaging scheme based on differential speckle patterns, named CGI-DSP. In the scheme, a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illuminate an unknown object. Then the differential speckle patterns (differential bucket detector signals) are obtained by taking the difference between present random speckle patterns (present bucket detector signals) and previous random speckle patterns (previous bucket detector signals). F… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Hence, according to the second-order correlation (2C) algorithm, [39] the estimation of š‘‚(x, y) can be obtained by…”
Section: -2mentioning
confidence: 99%
“…Hence, according to the second-order correlation (2C) algorithm, [39] the estimation of š‘‚(x, y) can be obtained by…”
Section: -2mentioning
confidence: 99%
“…To further eliminate the effect of noise from the bucket detector on the imaging of the periodic moving/state-changed object, differential speckle patterns are constructed according to Refs. [21,30]. The light source illuminates a digital micro-mirror device (DMD), which is controlled by a computer, to produce pairs of speckle patterns.…”
Section: Scheme Descriptionmentioning
confidence: 99%
“…Based on the previous discussion of image encryption algorithms based on CS, it is worth noting that while some algorithms have used CS to achieve efficient image compression, the trade-off is reduced image quality and potential security vulnerabilities in the encryption process. [32][33][34] This has led to a growing interest in designing image encryption algorithms that balance robustness and security. One approach that has gained attention is the use of optical encryption methods, such as the double random-phase encoding algorithm.…”
Section: Introductionmentioning
confidence: 99%