We propose two approaches for optical encryption based on computational ghost imaging. These methods have the capability of encoding ghost images reconstructed from gray-scale …
A Eshun, X Yi, A Wilson, S Jeppson, JH Yoo… - Optics …, 2023 - opg.optica.org
We have used photon pair correlations generated via spontaneous parametric downconversion (SPDC) to measure the fluorescence lifetime of the organic dye rhodamine …
R Yadav, P Singh - Computational and Applied Mathematics, 2023 - Springer
In this paper, we have proposed asymmetric image encryption cum authentication cryptosystem based on double random modulus decomposition using computational ghost …
Multiple layers of information security are introduced based on computational ghost imaging (CGI). We show, in the first step, that it is possible to design a very reliable image encryption …
X Yuan, L Zhang, J Chen, K Wang, D Zhang - Applied Physics B, 2019 - Springer
This paper proposes a multi-image encryption method based on ghost imaging of Hadamard basis patterns and spatial multiplexing. In the encryption process, firstly, the …
X Zhai, Z Cheng, Y Chen, Z Liang, Y Wei - Optics Communications, 2019 - Elsevier
Ghost imaging is an unconventional imaging mechanism that utilizes the high-order correlation to reconstruct object's image. Limited by the maximum refresh rate of DMD or …
Y Yang, J Shi, F Cao, J Peng, G Zeng - Applied optics, 2015 - opg.optica.org
Imaging at low light levels has drawn much attention. In this paper, a method is experimentally demonstrated to realize computational imaging under weak illumination …
W Tan, X Huang, S Nan, Y Bai, X Fu - JOSA A, 2019 - opg.optica.org
A model of the collection range of a bucket detector is proposed to investigate ghost imaging through turbulent atmosphere. The influence of the collection range of a bucket detector on …