2018
DOI: 10.1016/j.optcom.2018.03.014
|View full text |Cite
|
Sign up to set email alerts
|

Computational ghost imaging encryption based on fingerprint phase mask

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 28 publications
0
15
0
Order By: Relevance
“…To date, many strategies have been developed to support TiO 2 onto porous substrates or incorporate Ti species into mesoporous framework. [11][12][13] The removal of UDMH over activated carbon nanotube foams loaded with Ag/TiO 2 was reported by Zhang et al 14 They found that adsorption synergetic effect played a vital role in photodegradation. More recently, SBA-15 mesoporous silica used as photocatalyst support is widely researched due to ultraviolet transparent, high specic surface area (600-1100 m 2 g À1 ), adjustable pore diameter (2-30 nm), and uniform mesoporous hexagonal pore size distribution.…”
Section: Introductionmentioning
confidence: 89%
“…To date, many strategies have been developed to support TiO 2 onto porous substrates or incorporate Ti species into mesoporous framework. [11][12][13] The removal of UDMH over activated carbon nanotube foams loaded with Ag/TiO 2 was reported by Zhang et al 14 They found that adsorption synergetic effect played a vital role in photodegradation. More recently, SBA-15 mesoporous silica used as photocatalyst support is widely researched due to ultraviolet transparent, high specic surface area (600-1100 m 2 g À1 ), adjustable pore diameter (2-30 nm), and uniform mesoporous hexagonal pore size distribution.…”
Section: Introductionmentioning
confidence: 89%
“…[22] This offline computational ghost imaging scheme makes the application of ghost imaging in optical encryption field possible. [23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38] For instance, Clemente et al proposed a computational ghost imaging optical encryption (CGI-OE) scheme based on the concepts of CGI in 2010, [23] in which the information of an object is encrypted into the intensities of signal light. In 2012, Tanha et al proposed a gray and a color optical encryption scheme to improve the security and develop the application.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, optical encryption systems combined with biometric technology or other technologies have become a research focus of many researchers [31]- [42]. In the modern world, biometrics techniques have been widely deployed in public and private sectors because biometrics characteristics are unique and permanent throughout the life of a human being [32], [36], [38]- [42].…”
Section: Introductionmentioning
confidence: 99%