Research on Multiple-image Encryption Scheme Based on Fourier Transform and Ghost Imaging Algorithm |
Zhang, Leihong
(University of Shanghai for Science and Technology)
Yuan, Xiao (University of Shanghai for Science and Technology) Zhang, Dawei (University of Shanghai for Science and Technology) Chen, Jian (Anhui Province Key Laboratory of Nondestructive Evaluation) |
1 | J. J. Wu, Z. W. Xie, Z. J. Liu, W. Liu, Y. Zhang, and S. T. Liu, "Multipleimage encryption based on computational ghost imaging," Opt. Commun. 359, 38-43 (2016). DOI |
2 | I.-H. Lee and M. Cho, "Double random phase encryption using orthogonal encoding for multipleimage transmission," J. Opt. Soc. Korea 18, 201-206 (2014). DOI |
3 | X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, "Multiple-image encryption based on compressive ghost imaging and coordinate sampling," IEEE Photon. J. 8, 900511 (2016). |
4 | J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, "Multiple-image encryption based on computational ghost imaging," Opt. Commun. 359, 38-43 (2016). DOI |
5 | S. Yuan, X. Liu, X. Zhou, and Z. Li, "Multiple-image encryption scheme with a single-pixel detector," J. Mod. Opt. 63, 1457-1465 (2016). DOI |
6 | W. Chen and X. Chen, "Ghost imaging for three-dimensional optical security," Appl. Phys. Lett. 103, 221106 (2013). DOI |
7 | Z. Liu, C. Shen, J. Tan, and S. Liu, "A recovery method of double random phase encoding system with a parallel phase retrieval," IEEE Photon. J. 8, 7801807 (2016). |
8 | I.-H. Lee and M. Cho, "Optical encryption and information authentication of 3D objects considering wireless channel characteristics," J. Opt. Soc. Korea 17, 494-499 (2013). DOI |
9 | M. Cho and B. Javidi, "Three-dimensional photon counting double random phase encryption," Opt. Lett. 38, 3198-3201 (2013). DOI |
10 | I.-H. Lee and M. Cho, "Double random phase encryption based orthogonal encoding technique for color images," J. Opt. Soc. Korea 18, 129-133 (2014). DOI |
11 | D. N. Klyshko, "Combine EPR and two-slit experiments: Interference of advanced waves," Phys. Lett. A 132, 199-304 (1999). |
12 | M. Tanha, S. Ahmadi-Kandjani, R. Kheradmand, and H. Ghanbari, "Computational fluorescence ghost imaging," Eur. Phys. J. D 67, 44 (2013). |
13 | O. Katz, Y. Bromberg, and Y. Silberberg, "Compressive ghost imaging," Appl. Phys. Lett. 95, 131110-131113 (2009). DOI |
14 | S. Yuan, J. Yao, X. Liu, X. Zhou, and Z. Li, "Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging," Opt. Commun. 365, 180-185 (2016). DOI |
15 | V. Katkovnik and J. Astola, "Compressive sensing computational ghost imaging," J. Opt. Soc. Korea A 29, 1556-1567 (2012). DOI |
16 | J. H. Shapiro and R. W. Boyd, "The physics of ghost imaging," Quantum. Inf. Process. 11, 949-993 (2012). DOI |
17 | J. Garnier, "Ghost imaging in the random paraxial regime," Inverse Probl. Imaging 10, 409-432 (2017). |
18 | Y Wang and Y Liu, "High speed computational ghost imaging via spatial sweeping," Sci Rep. 7, 45325 (2017). DOI |
19 | P. Refregier and B. Javidi, "Optical-image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). DOI |
20 | Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). DOI |