Acknowledgement
This research is supported by Natural Science Foundation of Shanghai (Grant No. 18ZR1425800), and the National Natural Science Foundation of China (NSFC) (Grant No. 61875125).
References
- O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128-1148 (2009). https://doi.org/10.1109/JPROC.2009.2018367
- S. Liua, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327-342 (2014). https://doi.org/10.1016/j.optlastec.2013.05.023
- A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589-636 (2009). https://doi.org/10.1364/AOP.1.000589
- P. Refregier and B. Javidi, "Optical image encryption using input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- V. Namias, "The fractional order Fourier transform and its application to quantum mechanics," IMA J. Appl. Math. 25, 241-265 (1980). https://doi.org/10.1093/imamat/25.3.241
- J.-J. Huang, H.-E. Hwang, C.-Y. Chen, and C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238-2244 (2012). https://doi.org/10.1016/j.optlastec.2012.02.032
- S. K. Rajput and N. K. Nishchal, "Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform," Appl. Opt. 52, 871-878 (2013). https://doi.org/10.1364/AO.52.000871
- Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, and S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87-92 (2015). https://doi.org/10.1016/j.optlaseng.2014.12.022
- L. Sui, K. Duan, J. Liang, and X. Hei, "Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps," Opt. Express 22, 10605-10621 (2014). https://doi.org/10.1364/OE.22.010605
- G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain." Opt. Lett. 29, 1584-1586 (2004). https://doi.org/10.1364/OL.29.001584
- S. Liu, L. Yu, and B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57-63 (2001). https://doi.org/10.1016/S0030-4018(00)01093-2
- Z. Liu, M. A. Ahmad, and S. Liu, "Image encryption based on double random amplitude coding in random Hartley transform domain," Optik 121, 959-964 (2010). https://doi.org/10.1016/j.ijleo.2008.12.006
- P. Clemente, V. Duran, V. Torres-Company, E. Tajahuerce, and J. Lancis, "Optical encryption based on computational ghost imaging," Opt. Lett. 35, 2391-2393 (2010). https://doi.org/10.1364/OL.35.002391
- M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, "Grayscale and color optical encryption based on computational ghost imaging," Appl. Phys. Lett. 101, 101108 (2012). https://doi.org/10.1063/1.4748875
- S. Liansheng, C. Yin, L. Bing, T. Ailing, and A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, 075204 (2018). https://doi.org/10.1088/1612-202X/aac002
- K. Yi, Z. Leihong, and Z. Dawei, "Optical encryption based on ghost imaging and public key cryptography," Opt. Lasers Eng. 111, 58-64 (2018). https://doi.org/10.1016/j.optlaseng.2018.07.014
- S. Dafu, Z. Wenjie, and Z. Leihong, "Research on a big data information optical double encryption algorithm based on compressive ghost imaging," Laser Phys. Lett. 16, 085201 (2019). https://doi.org/10.1088/1612-202x/ab1feb
- C. Zhang, W. He, B. Han, M. Liao, D. Lu, X. Peng, and C. Xu, "Compressive optical steganography via single-pixel imaging," Opt. Express 27, 13469-13478 (2019). https://doi.org/10.1364/oe.27.013469
- K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, and Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, 106154 (2020). https://doi.org/10.1016/j.optlaseng.2020.106154
- K. Shibuya, K. Nakae, Y. Mizutani, and T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897-902 (2015). https://doi.org/10.1007/s10043-015-0138-x
- L. Wang and S. Zhao, "Fast reconstructed and high-quality ghost imaging with fast Walsh-Hadamard transform," Photonics Res. 4, 240-244 (2016). https://doi.org/10.1364/PRJ.4.000240
- H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, and R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, 106105 (2020). https://doi.org/10.1016/j.optlaseng.2020.106105
- Y. Chen, W. Zheng, W. Li, and Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1-5 (2021). https://doi.org/10.1016/j.patrec.2021.01.008
- B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, and S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769-793 (2020). https://doi.org/10.1007/s11390-020-0350-4
- C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, and Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822-829 (2020). https://doi.org/10.2112/si103-170.1
- X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, and Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139-146 (2021). https://doi.org/10.1007/s11265-019-01508-y
- J. Zhang and C. Shen, "Set-based obfuscation for strong PUFs against machine learning attacks," IEEE Trans. Circuits Sys. I: Regul. Pap. 68, 288-300 (2021). https://doi.org/10.1109/TCSI.2020.3028508
- B. Wang and L. L. Chen, "New results on fuzzy synchronization for a kind of disturbed memristive chaotic system," Complexity 2018, 3079108, (2018).
- J. Shi, Y. Lu, and J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 39, 2138-2151 (2020). https://doi.org/10.1109/tcad.2019.2962115
- B. Wang, F. C. Zou, J. Cheng, and S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017). https://doi.org/10.1186/s13662-017-1313-0
- C. Zuo, Q. Chen, L. Tian, L. Waller, and A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20-32 (2015). https://doi.org/10.1016/j.optlaseng.2015.03.006
- W. K. Yu, "Super sub-Nyquist single-pixel imaging by means of cake-cutting Hadamard basis sort," Sensors 19, 4122 (2019). https://doi.org/10.3390/s19194122
- W. K. Pratt, J. Kane, and H. C. Andrews, "Hadamard transform image coding," Proc. IEEE 57, 58-68 (1969). https://doi.org/10.1109/PROC.1969.6869
- Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, and T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, 100210B (2016).
- L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, and K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, 013110 (2021).