Abstract
Computer-generated random patterns and bucket detection are two key characteristics of computational ghost imaging (GI), which offer it a potential application in optical encryption. Here, we propose an inverse computational GI scheme, in which bucket signals are firstly selected and then random patterns are calculated correspondingly. Different GI reconstruction algorithms are used to test the inverse computational GI, and the relationship between imaging quality and error ratio factor is discussed as well. Compared with computational GI, our inverse one not only has disguised bucket signals but also provides an opportunity to combine with other cryptographies, both of which enrich the GI-based encryption process and enhance the security simultaneously.
Cite
CITATION STYLE
Zheng, P., Tan, Q., & Liu, H. (2021). Inverse computational ghost imaging for image encryption. Optics Express, 29(14), 21290. https://doi.org/10.1364/oe.428036
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.