2023
DOI: 10.1016/j.optcom.2022.129190
|View full text |Cite
|
Sign up to set email alerts
|

Computational ghost imaging with key-patterns for image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 48 publications
0
3
0
Order By: Relevance
“…Singh et al [10] proposed a grayscale image encryption scheme based on jigsaw transform and chaos, in which the random intensity mask was generated from the chaotic Logistic map. In addition to the DRPE-based and CRPE-based encryption schemes, researchers have also proposed a series of optical image encryption schemes based on digital holography [11,12], computer-generated holography [13,14], phase retrieval algorithm [15], interference [16], joint transform correlator [17], diffractive imaging [18], computational ghost imaging [19], single pixel imaging [20], ptychography [21], integral imaging [22] and deep learning [23].…”
Section: Introductionmentioning
confidence: 99%
“…Singh et al [10] proposed a grayscale image encryption scheme based on jigsaw transform and chaos, in which the random intensity mask was generated from the chaotic Logistic map. In addition to the DRPE-based and CRPE-based encryption schemes, researchers have also proposed a series of optical image encryption schemes based on digital holography [11,12], computer-generated holography [13,14], phase retrieval algorithm [15], interference [16], joint transform correlator [17], diffractive imaging [18], computational ghost imaging [19], single pixel imaging [20], ptychography [21], integral imaging [22] and deep learning [23].…”
Section: Introductionmentioning
confidence: 99%
“…When light passes through a scattering medium, the ballistic light decays rapidly, and target information will be severely corrupted. In order to get imaging results that are as clear as possible, many typical imaging techniques have been proposed, including transmission matrices [8,9], wavefront shaping [10], light storage effects [11,12], and ghost imaging [13][14][15][16]. However, these methods have certain limitations and so do not work better in complex scattering media situations.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we introduce a random illuminated pattern into the Improved U-net (IU-net) based PCGI scheme, and the inputs of IU-net are the values obtained by bucket detector after orthonormalization [12,41,42], which can be called as the random-pattern orthonormalization for the IU-net based PCGI (RPO-IU-PCGI). It is worth noting that the random pattern indicates irregular distribution of the pattern, which is generated by a digital micromirror device (DMD) instead of a thermal or pseudo-thermal light.…”
Section: Introductionmentioning
confidence: 99%