2019
DOI: 10.1007/s00340-019-7362-1
|View full text |Cite|
|
Sign up to set email alerts
|

Optical image compression and encryption transmission-based ondeep learning and ghost imaging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(20 citation statements)
references
References 20 publications
2
18
0
Order By: Relevance
“…[3][4][5] Later, many experimental efforts have been made to improve the low-temperature performance of n-type Mg 3+ Sb 2−x Bi x . [6][7][8][9][10][11][12][13] Theoretically, accurate electronic structure, [14,15] chemical bonding, [16][17][18] and phonon transport properties [19,20] have been revealed for understanding the outstanding TE properties of n-type Mg 3 Sb 2 -based TE materials. Despite many significant studies on ntype Te-doped Mg 3 Sb 2 -based compounds, the optimization of transport properties requires efficient n-type dopants for the broad tunability of carrier density.…”
Section: Doi: 101002/advs202002867mentioning
confidence: 99%
“…[3][4][5] Later, many experimental efforts have been made to improve the low-temperature performance of n-type Mg 3+ Sb 2−x Bi x . [6][7][8][9][10][11][12][13] Theoretically, accurate electronic structure, [14,15] chemical bonding, [16][17][18] and phonon transport properties [19,20] have been revealed for understanding the outstanding TE properties of n-type Mg 3 Sb 2 -based TE materials. Despite many significant studies on ntype Te-doped Mg 3 Sb 2 -based compounds, the optimization of transport properties requires efficient n-type dopants for the broad tunability of carrier density.…”
Section: Doi: 101002/advs202002867mentioning
confidence: 99%
“…e chaotic system has many unique features similar to the counterpart of the cryptosystem, such as bulky data capacity and high redundancy [4], which are difficult to handle by using text encryption techniques. In the last two decades, many new image encryption schemes were proposed, and researchers proposed many image encryption schemes by applying various technologies, such as compressive sensing [5][6][7], DNA coding [8][9][10][11][12][13], quantum theory [14][15][16][17], chaos systems [18][19][20][21][22][23][24][25][26][27][28], S-box [29], and networks [30,31].…”
Section: Introductionmentioning
confidence: 99%
“…al. reported a new scheme for image compression and encryption, and they demonstrated that the degraded image caused by ghost-imaging transmission can be substantially improved by DL [25]. In particular, because the optical ciphertext is of more randomness than natural image or hologram, the compression of it becomes extremely difficult.…”
Section: Introductionmentioning
confidence: 99%