Inverse computational ghost imaging for image encryption

  • Zheng P
  • Tan Q
  • Liu H
31Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Computer-generated random patterns and bucket detection are two key characteristics of computational ghost imaging (GI), which offer it a potential application in optical encryption. Here, we propose an inverse computational GI scheme, in which bucket signals are firstly selected and then random patterns are calculated correspondingly. Different GI reconstruction algorithms are used to test the inverse computational GI, and the relationship between imaging quality and error ratio factor is discussed as well. Compared with computational GI, our inverse one not only has disguised bucket signals but also provides an opportunity to combine with other cryptographies, both of which enrich the GI-based encryption process and enhance the security simultaneously.

Cite

CITATION STYLE

APA

Zheng, P., Tan, Q., & Liu, H. (2021). Inverse computational ghost imaging for image encryption. Optics Express, 29(14), 21290. https://doi.org/10.1364/oe.428036

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free