Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Optical authentication method based on correspondence ghost imaging

Not Accessible

Your library or personal account may give you access

Abstract

Ghost imaging technology has a great application potential in optical security because of its non-local characteristics. In this paper, on the basis of computational ghost imaging, an optical authentication scheme is proposed that utilizes the correspondence imaging technique for the preliminary reconstruction of the object image, and then authenticates the image by a nonlinear correlation algorithm. Different from the previous optical authentication schemes that usually adopted random selection of measurements, this authentication method consciously selects the bucket detector measurement values with large fluctuation and can achieve authentication using ultra-low data volumes less than 1% of the Nyquist limit. In brief, this scheme is easy to implement and has a simpler algorithm and higher stability, which is a tremendous advantage in practical optical authentication systems. The simulation and physical experimental results demonstrate the feasibility of the scheme.

© 2023 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Optical cryptosystem based on computational ghost imaging and nonlinear authentication

Lin Zhang, Xiaogang Wang, Qingming Zhou, Jidong Xue, and Bijun Xu
Opt. Express 32(3) 4242-4253 (2024)

Object authentication based on compressive ghost imaging

Zhipeng Chen, Jianhong Shi, and Guihua Zeng
Appl. Opt. 55(30) 8644-8650 (2016)

Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation

Yaoling Zhou, Yueer Sun, Mu Yang, Bei Zhou, Junzhao Hou, Tianyu Zeng, Zhaolin Xiao, and Liansheng Sui
Opt. Express 31(13) 20887-20904 (2023)

Data availability

The data that support the findings of this study are available upon reasonable request from the authors.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (15)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (10)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.