• Acta Optica Sinica
  • Vol. 37, Issue 1, 111001 (2017)
Cao Fei* and Zhao Shengmei
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/aos201737.0111001 Cite this Article Set citation alerts
    Cao Fei, Zhao Shengmei. Optical Encryption Scheme with Double Secret Keys Based on Computational Ghost Imaging[J]. Acta Optica Sinica, 2017, 37(1): 111001 Copy Citation Text show less
    References

    [1] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(7): 767-769.

    [2] Goudail F, Bollaro F, Javidi B, et al. Influence of a perturbation in a double phase-encoding system[J]. Journal of the Optical Society of America A, 1998, 15(10): 2629-2638.

    [3] Wang B, Sun C C, Su W C. Shift-tolerance property of an optical double-random phase-encoding encryption system[J]. Applied Optics, 2000, 39(26): 4788-4793.

    [4] Javidi B, Sergent A, Zhang G, et al. Fault tolerance properties of a double phase encoding encryption technique[J]. Optical Engineering, 1997, 36(4): 992-998.

    [5] Pittman T B, Shih Y H, Strekalov D V, et al. Optical imaging by means of two-photon quantum entanglement[J]. Physical Review A, 1995, 52(5): R3429.

    [6] Abouraddy A F, Saleh B E A, Sergienko A V, et al. Role of entanglement in two-photon imaging[J]. Physical Review Letters, 2001, 87(12): 123602.

    [7] Shapiro J H, Boyd R W. The physics of ghost imaging[J]. Quantum Information Processing, 2012, 11(4): 949-993.

    [8] Bennink R S, Bentley S J, Boyd R W. “Two-photon” coincidence imaging with a classical source[J]. Physical Review Letters, 2002, 89(11): 113601.

    [9] Chen Mingliang, Li Enrong, Han Shensheng, et al. Ghost imaging based on sparse array pseudo thermal light system[J]. Acta Optica Sinica, 2012, 32(5): 0503001.

    [10] Mei Xiaodong, Gong Wenlin, Han Shensheng, et al. Experimental research on prebuilt three-dimensional ghost imaging lidar[J]. Chinese J Lasers, 2016, 43(7): 0710003.

    [11] Liu Xuefeng, Yao Xuri, Wu Ling’an, et al. The role of intensity fluctuations in thermal ghost imaging[J]. Acta Physica Sinica, 2013, 62(18): 184205.

    [12] Wang Sen, Li Hongguo, Wang Kaige, et al. The influence of rotational speed of ground-glass on the quality of ghost imaging with thermal light[J]. Acta Sinica Quantum Optica, 2015, 21(1): 9-13.

    [13] Tang Wenzhe, Cao Zhengwen, Zeng Guihua, et al. Back-side correlation imaging with digital micro mirror[J]. Acta Optica Sinica, 2015, 35(5): 0511004.

    [14] Erkmen B I, Shapiro J H. Unified theory of ghost imaging with Gaussian-state light[J]. Physical Review A, 2008, 77(4): 043809.

    [15] Bromberg Y, Katz O, Silberberg Y. Ghost imaging with a single detector[J]. Physical Review A, 2009, 79(5): 053840.

    [16] Clemente P, Durán V, Tajahuerce E, et al. Optical encryption based on computational ghost imaging[J]. Optics Letters, 2010, 35(14): 2391-2393.

    [17] Tanha M, Kheradmand R, Ahmadi-Kandjani S. Gray-scale and color optical encryption based on computational ghost imaging[J]. Applied Physics Letters, 2012, 101(10): 101108.

    [18] Zafari M, Ahmadi-Kandjani S. Optical encryption with selective computational ghost imaging[J]. Journal of Optics, 2014, 16(10): 105405.

    [19] Zhao S M, Wang L, Liang W, et al. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique[J]. Optics Communications, 2015, 353: 90-95.

    [20] Wu J J, Xie Z W, Liu Z J, et al. Multiple-image encryption based on computational ghost imaging[J]. Optics Communications, 2016, 359: 38-43.

    [21] Yuan S, Yao J B, Liu X M, et al. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging[J]. Optics Communications, 2016, 365: 180-185.

    [22] Rauhut H. Circulant and Toeplitz matrices in compressed sensing[EB/OL]. (2009-02-25)[2016-07-10]. http: ∥arxiv.org/pdf/0902.4394vl.pdf.

    [23] Haupt J, Bajwa W U, Raz G, et al. Toeplitz compressed sensing matrices with applications to sparse channel estimation[J]. IEEE Transactions on Information Theory, 2010, 56(11): 5862-5875.

    [24] Zhan Kejun, Song Jianxin. Performance comparison of commonly used measurement matrix in image compressed sensing[J]. TV Technology, 2014, 38(5): 1-4.

    Cao Fei, Zhao Shengmei. Optical Encryption Scheme with Double Secret Keys Based on Computational Ghost Imaging[J]. Acta Optica Sinica, 2017, 37(1): 111001
    Download Citation