Abstract
Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.
© 2010 Optical Society of America
Full Article | PDF ArticleMore Like This
Sheng Yuan, Lanjie Wang, Xuemei Liu, and Xin Zhou
Opt. Lett. 45(14) 3917-3920 (2020)
Junyao Ma, Zhe Li, Shengmei Zhao, and Le Wang
Opt. Express 31(7) 11717-11728 (2023)
Yichen Liu, Peixia Zheng, and Hong-Chao Liu
Opt. Express 30(9) 14073-14087 (2022)