Ghost cytometry

S Ota, R Horisaki, Y Kawamura, M Ugawa, I Sato… - Science, 2018 - science.org
Ghost imaging is a technique used to produce an object's image without using a spatially
resolving detector. Here we develop a technique we term “ghost cytometry,” an image-free …

[PDF][PDF] 卷积神经网络在光学信息处理中的应用研究进展

邸江磊, 唐雎, 吴计, 王凯强, 任振波… - Laser & …, 2021 - researching.cn
摘要近年来, 深度学习技术的爆发式发展引领了机器学习的又一次浪潮. 深度神经网络具备抽象
特征的高效识别与提取能力, 强大的非线性拟合能力, 抗干扰鲁棒性及非凡的泛化能力 …

Gray-scale and color optical encryption based on computational ghost imaging

M Tanha, R Kheradmand… - Applied Physics Letters, 2012 - pubs.aip.org
We propose two approaches for optical encryption based on computational ghost imaging.
These methods have the capability of encoding ghost images reconstructed from gray-scale …

Fluorescence lifetime measurements using photon pair correlations generated via spontaneous parametric down conversion (SPDC)

A Eshun, X Yi, A Wilson, S Jeppson, JH Yoo… - Optics …, 2023 - opg.optica.org
We have used photon pair correlations generated via spontaneous parametric
downconversion (SPDC) to measure the fluorescence lifetime of the organic dye rhodamine …

Asymmetric image authentication algorithm using double random modulus decomposition and CGI

R Yadav, P Singh - Computational and Applied Mathematics, 2023 - Springer
In this paper, we have proposed asymmetric image encryption cum authentication
cryptosystem based on double random modulus decomposition using computational ghost …

Multiple layer encryption and steganography via multi-channel ghost imaging

H Ghanbari-Ghalehjoughi, M Eslami… - Optics and Lasers in …, 2020 - Elsevier
Multiple layers of information security are introduced based on computational ghost imaging
(CGI). We show, in the first step, that it is possible to design a very reliable image encryption …

Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing

X Yuan, L Zhang, J Chen, K Wang, D Zhang - Applied Physics B, 2019 - Springer
This paper proposes a multi-image encryption method based on ghost imaging of
Hadamard basis patterns and spatial multiplexing. In the encryption process, firstly, the …

Foveated ghost imaging based on deep learning

X Zhai, Z Cheng, Y Chen, Z Liang, Y Wei - Optics Communications, 2019 - Elsevier
Ghost imaging is an unconventional imaging mechanism that utilizes the high-order
correlation to reconstruct object's image. Limited by the maximum refresh rate of DMD or …

Computational imaging based on time-correlated single-photon-counting technique at low light level

Y Yang, J Shi, F Cao, J Peng, G Zeng - Applied optics, 2015 - opg.optica.org
Imaging at low light levels has drawn much attention. In this paper, a method is
experimentally demonstrated to realize computational imaging under weak illumination …

Effect of the collection range of a bucket detector on ghost imaging through turbulent atmosphere

W Tan, X Huang, S Nan, Y Bai, X Fu - JOSA A, 2019 - opg.optica.org
A model of the collection range of a bucket detector is proposed to investigate ghost imaging
through turbulent atmosphere. The influence of the collection range of a bucket detector on …