Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • Current Optics and Photonics
  • Vol. 5,
  • Issue 6,
  • pp. 686-698
  • (2021)

Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm

Open Access Open Access

Abstract

A camouflaged encryption scheme based on Hadamard matrix and ghost imaging is proposed. In the process of the encryption, an orthogonal matrix is used as the projection pattern of ghost imaging to improve the definition of the reconstructed images. The ciphertext of the secret image is constrained to the camouflaged image. The key of the camouflaged image is obtained by the method of sparse decomposition by principal component orthogonal basis and the constrained ciphertext. The information of the secret image is hidden into the information of the camouflaged image which can improve the security of the system. In the decryption process, the authorized user needs to extract the key of the secret image according to the obtained random sequences. The real encrypted information can be obtained. Otherwise, the obtained image is the camouflaged image. In order to verify the feasibility, security and robustness of the encryption system, binary images and gray-scale images are selected for simulation and experiment. The results show that the proposed encryption system simplifies the calculation process, and also improves the definition of the reconstructed images and the security of the encryption system.

© 2021 Optical Society of Korea

PDF Article

References

  • View by:

  1. O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128‒1148 (2009)
    [Crossref]
  2. S. Liua, C. Guo, J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327‒342 (2014)
    [Crossref]
  3. A. Alfalou, C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589‒636 (2009)
    [Crossref]
  4. P. Refregier, B. Javidi, "Optical image encryption using input plane and Fourier plane random encoding," Opt. Lett. 20, 767‒769 (1995)
    [Crossref] [PubMed]
  5. V. Namias, "The fractional order Fourier transform and its application to quantum mechanics," IMA J. Appl. Math. 25, 241‒265 (1980)
    [Crossref]
  6. J.-J. Huang, H.-E. Hwang, C.-Y. Chen, C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238‒2244 (2012)
    [Crossref]
  7. S. K. Rajput, N. K. Nishchal, "Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform," Appl. Opt. 52, 871‒878 (2013)
    [Crossref] [PubMed]
  8. Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
    [Crossref]
  9. L. Sui, K. Duan, J. Liang, X. Hei, "Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps," Opt. Express 22, 10605‒10621 (2014)
    [Crossref] [PubMed]
  10. G. Situ, J. Zhang, "Double random-phase encoding in the Fresnel domain.," Opt. Lett. 29, 1584‒1586 (2004)
    [Crossref] [PubMed]
  11. S. Liu, L. Yu, B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57‒63 (2001)
    [Crossref]
  12. Z. Liu, M. A. Ahmad, S. Liu, "Image encryption based on double random amplitude coding in random Hartley transform domain," Optik 121, 959‒964 (2010)
    [Crossref]
  13. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, J. Lancis, "Optical encryption based on computational ghost imaging," Opt. Lett. 35, 2391‒2393 (2010)
    [Crossref] [PubMed]
  14. M. Tanha, R. Kheradmand, S. Ahmadi-Kandjani, "Gray-scale and color optical encryption based on computational ghost imaging," Appl. Phys. Lett. 101, (2012)
    [Crossref]
  15. S. Liansheng, C. Yin, L. Bing, T. Ailing, A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, (2018)
    [Crossref]
  16. K. Yi, Z. Leihong, Z. Dawei, "Optical encryption based on ghost imaging and public key cryptography," Opt. Lasers Eng. 111, 58‒64 (2018)
    [Crossref]
  17. S. Dafu, Z. Wenjie, Z. Leihong, "Research on a big data information optical double encryption algorithm based on compressive ghost imaging," Laser Phys. Lett. 16, (2019)
    [Crossref]
  18. C. Zhang, W. He, B. Han, M. Liao, D. Lu, X. Peng, C. Xu, "Compressive optical steganography via single-pixel imaging," Opt. Express 27, 13469‒13478 (2019)
    [Crossref] [PubMed]
  19. K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, (2020)
    [Crossref]
  20. K. Shibuya, K. Nakae, Y. Mizutani, T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897‒902 (2015)
    [Crossref]
  21. L. Wang, S. Zhao, "Fast reconstructed and high-quality ghost imaging with fast Walsh-Hadamard transform," Photonics Res. 4, 240‒244 (2016)
    [Crossref]
  22. H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
    [Crossref]
  23. Y. Chen, W. Zheng, W. Li, Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1‒5 (2021)
    [Crossref]
  24. B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769‒793 (2020)
    [Crossref]
  25. C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822‒829 (2020)
    [Crossref]
  26. X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139‒146 (2021)
    [Crossref]
  27. J. Zhang, C. Shen, "Set-based obfuscation for strong PUFs against machine learning attacks," Regul. Pap. 68, 288‒300 (2021)
    [Crossref]
  28. B. Wang, L. L. Chen, "New results on fuzzy synchronization for a kind of disturbed memristive chaotic system," Complexity 2018, 3079108 (2018)
    [Crossref]
  29. J. Shi, Y. Lu, J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 39, 2138‒2151 (2020)
    [Crossref]
  30. B. Wang, F. C. Zou, J. Cheng, S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017)
    [Crossref]
  31. C. Zuo, Q. Chen, L. Tian, L. Waller, A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20‒32 (2015)
    [Crossref]
  32. W. K. Yu, "Super sub-Nyquist single-pixel imaging by means of cake-cutting Hadamard basis sort," Sensors 19, 4122 (2019)
    [Crossref] [PubMed]
  33. W. K. Pratt, J. Kane, H. C. Andrews, "Hadamard transform image coding," Proc. IEEE 57, 58‒68 (1969)
    [Crossref]
  34. Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, (2016)
    [Crossref]
  35. L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
    [Crossref]

2021 (4)

Y. Chen, W. Zheng, W. Li, Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1‒5 (2021)
[Crossref]

X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139‒146 (2021)
[Crossref]

J. Zhang, C. Shen, "Set-based obfuscation for strong PUFs against machine learning attacks," Regul. Pap. 68, 288‒300 (2021)
[Crossref]

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

2020 (5)

J. Shi, Y. Lu, J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 39, 2138‒2151 (2020)
[Crossref]

B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769‒793 (2020)
[Crossref]

C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822‒829 (2020)
[Crossref]

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, (2020)
[Crossref]

2019 (3)

S. Dafu, Z. Wenjie, Z. Leihong, "Research on a big data information optical double encryption algorithm based on compressive ghost imaging," Laser Phys. Lett. 16, (2019)
[Crossref]

C. Zhang, W. He, B. Han, M. Liao, D. Lu, X. Peng, C. Xu, "Compressive optical steganography via single-pixel imaging," Opt. Express 27, 13469‒13478 (2019)
[Crossref] [PubMed]

W. K. Yu, "Super sub-Nyquist single-pixel imaging by means of cake-cutting Hadamard basis sort," Sensors 19, 4122 (2019)
[Crossref] [PubMed]

2018 (3)

B. Wang, L. L. Chen, "New results on fuzzy synchronization for a kind of disturbed memristive chaotic system," Complexity 2018, 3079108 (2018)
[Crossref]

S. Liansheng, C. Yin, L. Bing, T. Ailing, A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, (2018)
[Crossref]

K. Yi, Z. Leihong, Z. Dawei, "Optical encryption based on ghost imaging and public key cryptography," Opt. Lasers Eng. 111, 58‒64 (2018)
[Crossref]

2017 (1)

B. Wang, F. C. Zou, J. Cheng, S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017)
[Crossref]

2016 (2)

Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, (2016)
[Crossref]

L. Wang, S. Zhao, "Fast reconstructed and high-quality ghost imaging with fast Walsh-Hadamard transform," Photonics Res. 4, 240‒244 (2016)
[Crossref]

2015 (3)

K. Shibuya, K. Nakae, Y. Mizutani, T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897‒902 (2015)
[Crossref]

C. Zuo, Q. Chen, L. Tian, L. Waller, A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20‒32 (2015)
[Crossref]

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

2014 (2)

2013 (1)

2012 (2)

M. Tanha, R. Kheradmand, S. Ahmadi-Kandjani, "Gray-scale and color optical encryption based on computational ghost imaging," Appl. Phys. Lett. 101, (2012)
[Crossref]

J.-J. Huang, H.-E. Hwang, C.-Y. Chen, C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238‒2244 (2012)
[Crossref]

2010 (2)

Z. Liu, M. A. Ahmad, S. Liu, "Image encryption based on double random amplitude coding in random Hartley transform domain," Optik 121, 959‒964 (2010)
[Crossref]

P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, J. Lancis, "Optical encryption based on computational ghost imaging," Opt. Lett. 35, 2391‒2393 (2010)
[Crossref] [PubMed]

2009 (2)

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128‒1148 (2009)
[Crossref]

A. Alfalou, C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589‒636 (2009)
[Crossref]

2004 (1)

2001 (1)

S. Liu, L. Yu, B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57‒63 (2001)
[Crossref]

1995 (1)

1980 (1)

V. Namias, "The fractional order Fourier transform and its application to quantum mechanics," IMA J. Appl. Math. 25, 241‒265 (1980)
[Crossref]

1969 (1)

W. K. Pratt, J. Kane, H. C. Andrews, "Hadamard transform image coding," Proc. IEEE 57, 58‒68 (1969)
[Crossref]

Ahmad, M. A.

Z. Liu, M. A. Ahmad, S. Liu, "Image encryption based on double random amplitude coding in random Hartley transform domain," Optik 121, 959‒964 (2010)
[Crossref]

Ahmadi-Kandjani, S.

M. Tanha, R. Kheradmand, S. Ahmadi-Kandjani, "Gray-scale and color optical encryption based on computational ghost imaging," Appl. Phys. Lett. 101, (2012)
[Crossref]

Ailing, T.

S. Liansheng, C. Yin, L. Bing, T. Ailing, A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, (2018)
[Crossref]

Alfalou, A.

A. Alfalou, C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589‒636 (2009)
[Crossref]

Andrews, H. C.

W. K. Pratt, J. Kane, H. C. Andrews, "Hadamard transform image coding," Proc. IEEE 57, 58‒68 (1969)
[Crossref]

Asundi, A.

C. Zuo, Q. Chen, L. Tian, L. Waller, A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20‒32 (2015)
[Crossref]

Asundi, A. K.

S. Liansheng, C. Yin, L. Bing, T. Ailing, A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, (2018)
[Crossref]

Bing, L.

S. Liansheng, C. Yin, L. Bing, T. Ailing, A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, (2018)
[Crossref]

Brosseau, C.

A. Alfalou, C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589‒636 (2009)
[Crossref]

Cao, L.

C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822‒829 (2020)
[Crossref]

Chen, C.-M.

J.-J. Huang, H.-E. Hwang, C.-Y. Chen, C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238‒2244 (2012)
[Crossref]

Chen, C.-Y.

J.-J. Huang, H.-E. Hwang, C.-Y. Chen, C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238‒2244 (2012)
[Crossref]

Chen, L. L.

B. Wang, L. L. Chen, "New results on fuzzy synchronization for a kind of disturbed memristive chaotic system," Complexity 2018, 3079108 (2018)
[Crossref]

Chen, Q.

C. Zuo, Q. Chen, L. Tian, L. Waller, A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20‒32 (2015)
[Crossref]

Chen, Y.

Y. Chen, W. Zheng, W. Li, Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1‒5 (2021)
[Crossref]

Cheng, J.

B. Wang, F. C. Zou, J. Cheng, S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017)
[Crossref]

Cheng, L.

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

Clemente, P.

Conghuan, Y.

X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139‒146 (2021)
[Crossref]

Dafu, S.

S. Dafu, Z. Wenjie, Z. Leihong, "Research on a big data information optical double encryption algorithm based on compressive ghost imaging," Laser Phys. Lett. 16, (2019)
[Crossref]

Dawei, Z.

K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, (2020)
[Crossref]

K. Yi, Z. Leihong, Z. Dawei, "Optical encryption based on ghost imaging and public key cryptography," Opt. Lasers Eng. 111, 58‒64 (2018)
[Crossref]

Duan, K.

Durán, V.

Feng, Y.

C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822‒829 (2020)
[Crossref]

Guo, C.

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

S. Liua, C. Guo, J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327‒342 (2014)
[Crossref]

Han, B.

He, W.

Hei, X.

Hualong, Y.

K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, (2020)
[Crossref]

Huang, J.-J.

J.-J. Huang, H.-E. Hwang, C.-Y. Chen, C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238‒2244 (2012)
[Crossref]

Huang, Y.

Y. Chen, W. Zheng, W. Li, Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1‒5 (2021)
[Crossref]

Hwang, H.-E.

J.-J. Huang, H.-E. Hwang, C.-Y. Chen, C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238‒2244 (2012)
[Crossref]

Iwata, T.

Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, (2016)
[Crossref]

K. Shibuya, K. Nakae, Y. Mizutani, T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897‒902 (2015)
[Crossref]

Javidi, B.

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128‒1148 (2009)
[Crossref]

P. Refregier, B. Javidi, "Optical image encryption using input plane and Fourier plane random encoding," Opt. Lett. 20, 767‒769 (1995)
[Crossref] [PubMed]

Kaibin, Z.

X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139‒146 (2021)
[Crossref]

Kane, J.

W. K. Pratt, J. Kane, H. C. Andrews, "Hadamard transform image coding," Proc. IEEE 57, 58‒68 (1969)
[Crossref]

Kang, Y.

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

Kanwal, S.

K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, (2020)
[Crossref]

Kheradmand, R.

M. Tanha, R. Kheradmand, S. Ahmadi-Kandjani, "Gray-scale and color optical encryption based on computational ghost imaging," Appl. Phys. Lett. 101, (2012)
[Crossref]

Lancis, J.

Leihong, Z.

K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, (2020)
[Crossref]

S. Dafu, Z. Wenjie, Z. Leihong, "Research on a big data information optical double encryption algorithm based on compressive ghost imaging," Laser Phys. Lett. 16, (2019)
[Crossref]

K. Yi, Z. Leihong, Z. Dawei, "Optical encryption based on ghost imaging and public key cryptography," Opt. Lasers Eng. 111, 58‒64 (2018)
[Crossref]

Li, B.-H.

B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769‒793 (2020)
[Crossref]

Li, W.

Y. Chen, W. Zheng, W. Li, Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1‒5 (2021)
[Crossref]

Liang, J.

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

L. Sui, K. Duan, J. Liang, X. Hei, "Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps," Opt. Express 22, 10605‒10621 (2014)
[Crossref] [PubMed]

Liang, R.

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

Liansheng, S.

S. Liansheng, C. Yin, L. Bing, T. Ailing, A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, (2018)
[Crossref]

Liao, M.

Liu, S.

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

Z. Liu, M. A. Ahmad, S. Liu, "Image encryption based on double random amplitude coding in random Hartley transform domain," Optik 121, 959‒964 (2010)
[Crossref]

S. Liu, L. Yu, B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57‒63 (2001)
[Crossref]

Liu, W.

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

Liu, Y.

B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769‒793 (2020)
[Crossref]

Liu, Z.

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

Z. Liu, M. A. Ahmad, S. Liu, "Image encryption based on double random amplitude coding in random Hartley transform domain," Optik 121, 959‒964 (2010)
[Crossref]

Liua, S.

S. Liua, C. Guo, J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327‒342 (2014)
[Crossref]

Lu, D.

Lu, Y.

J. Shi, Y. Lu, J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 39, 2138‒2151 (2020)
[Crossref]

Mantong, Z.

K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, (2020)
[Crossref]

Matoba, O.

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128‒1148 (2009)
[Crossref]

Mi, C.

C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822‒829 (2020)
[Crossref]

Millan, M. S.

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128‒1148 (2009)
[Crossref]

Mizutani, Y.

Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, (2016)
[Crossref]

K. Shibuya, K. Nakae, Y. Mizutani, T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897‒902 (2015)
[Crossref]

Nakae, K.

K. Shibuya, K. Nakae, Y. Mizutani, T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897‒902 (2015)
[Crossref]

Namias, V.

V. Namias, "The fractional order Fourier transform and its application to quantum mechanics," IMA J. Appl. Math. 25, 241‒265 (1980)
[Crossref]

Nishchal, N. K.

Nomura, T.

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128‒1148 (2009)
[Crossref]

Pan, L.

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

Peng, X.

Perez-Cabre, E.

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128‒1148 (2009)
[Crossref]

Pratt, W. K.

W. K. Pratt, J. Kane, H. C. Andrews, "Hadamard transform image coding," Proc. IEEE 57, 58‒68 (1969)
[Crossref]

Rajput, S. K.

Refregier, P.

Shen, C.

J. Zhang, C. Shen, "Set-based obfuscation for strong PUFs against machine learning attacks," Regul. Pap. 68, 288‒300 (2021)
[Crossref]

Sheridan, J. T.

S. Liua, C. Guo, J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327‒342 (2014)
[Crossref]

Shi, J.

J. Shi, Y. Lu, J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 39, 2138‒2151 (2020)
[Crossref]

Shibuya, K.

Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, (2016)
[Crossref]

K. Shibuya, K. Nakae, Y. Mizutani, T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897‒902 (2015)
[Crossref]

Situ, G.

Sui, L.

Taguchi, H.

Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, (2016)
[Crossref]

Tajahuerce, E.

Takaya, Y.

Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, (2016)
[Crossref]

Tan, J.

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

Tanha, M.

M. Tanha, R. Kheradmand, S. Ahmadi-Kandjani, "Gray-scale and color optical encryption based on computational ghost imaging," Appl. Phys. Lett. 101, (2012)
[Crossref]

Tian, L.

C. Zuo, Q. Chen, L. Tian, L. Waller, A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20‒32 (2015)
[Crossref]

Torres-Company, V.

Waller, L.

C. Zuo, Q. Chen, L. Tian, L. Waller, A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20‒32 (2015)
[Crossref]

Wan, S.

B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769‒793 (2020)
[Crossref]

Wang, B.

B. Wang, L. L. Chen, "New results on fuzzy synchronization for a kind of disturbed memristive chaotic system," Complexity 2018, 3079108 (2018)
[Crossref]

B. Wang, F. C. Zou, J. Cheng, S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017)
[Crossref]

Wang, D.

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

Wang, K.

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

Wang, L.

L. Wang, S. Zhao, "Fast reconstructed and high-quality ghost imaging with fast Walsh-Hadamard transform," Photonics Res. 4, 240‒244 (2016)
[Crossref]

Wang, R.

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

Wang, W.-H.

B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769‒793 (2020)
[Crossref]

Wang, Y.

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

Wenjie, Z.

S. Dafu, Z. Wenjie, Z. Leihong, "Research on a big data information optical double encryption algorithm based on compressive ghost imaging," Laser Phys. Lett. 16, (2019)
[Crossref]

Wu, H.

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

Wu, J.

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

Wu, Q.

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

Wu, Y.

C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822‒829 (2020)
[Crossref]

Xiao, H.

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

Xiaowen, C.

X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139‒146 (2021)
[Crossref]

Xu, C.

Xu, R.

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

Xue-min, Z.

X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139‒146 (2021)
[Crossref]

Yao, L.

C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822‒829 (2020)
[Crossref]

Yasui, T.

Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, (2016)
[Crossref]

Ye, H.

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

Yi, K.

K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, (2020)
[Crossref]

K. Yi, Z. Leihong, Z. Dawei, "Optical encryption based on ghost imaging and public key cryptography," Opt. Lasers Eng. 111, 58‒64 (2018)
[Crossref]

Yin, C.

S. Liansheng, C. Yin, L. Bing, T. Ailing, A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, (2018)
[Crossref]

Yu, L.

S. Liu, L. Yu, B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57‒63 (2001)
[Crossref]

Yu, W. K.

W. K. Yu, "Super sub-Nyquist single-pixel imaging by means of cake-cutting Hadamard basis sort," Sensors 19, 4122 (2019)
[Crossref] [PubMed]

Zenggang, X.

X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139‒146 (2021)
[Crossref]

Zhang, A.-M.

B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769‒793 (2020)
[Crossref]

Zhang, C.

Zhang, D.

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

Zhang, J.

J. Zhang, C. Shen, "Set-based obfuscation for strong PUFs against machine learning attacks," Regul. Pap. 68, 288‒300 (2021)
[Crossref]

J. Shi, Y. Lu, J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 39, 2138‒2151 (2020)
[Crossref]

G. Situ, J. Zhang, "Double random-phase encoding in the Fresnel domain.," Opt. Lett. 29, 1584‒1586 (2004)
[Crossref] [PubMed]

Zhang, L.

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

Zhang, Z.

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822‒829 (2020)
[Crossref]

Zhao, G.

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

Zhao, S.

L. Wang, S. Zhao, "Fast reconstructed and high-quality ghost imaging with fast Walsh-Hadamard transform," Photonics Res. 4, 240‒244 (2016)
[Crossref]

Zheng, W.

Y. Chen, W. Zheng, W. Li, Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1‒5 (2021)
[Crossref]

Zhiwen, T.

X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139‒146 (2021)
[Crossref]

Zhong, S. M.

B. Wang, F. C. Zou, J. Cheng, S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017)
[Crossref]

Zhu, B.

S. Liu, L. Yu, B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57‒63 (2001)
[Crossref]

Zou, F. C.

B. Wang, F. C. Zou, J. Cheng, S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017)
[Crossref]

Zuo, C.

C. Zuo, Q. Chen, L. Tian, L. Waller, A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20‒32 (2015)
[Crossref]

Adv. Differ. Equ. (1)

B. Wang, F. C. Zou, J. Cheng, S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017)
[Crossref]

Adv. Opt. Photonics (1)

A. Alfalou, C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589‒636 (2009)
[Crossref]

Appl. Opt. (1)

Appl. Phys. Lett. (1)

M. Tanha, R. Kheradmand, S. Ahmadi-Kandjani, "Gray-scale and color optical encryption based on computational ghost imaging," Appl. Phys. Lett. 101, (2012)
[Crossref]

Complexity (1)

B. Wang, L. L. Chen, "New results on fuzzy synchronization for a kind of disturbed memristive chaotic system," Complexity 2018, 3079108 (2018)
[Crossref]

IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. (1)

J. Shi, Y. Lu, J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 39, 2138‒2151 (2020)
[Crossref]

IMA J. Appl. Math. (1)

V. Namias, "The fractional order Fourier transform and its application to quantum mechanics," IMA J. Appl. Math. 25, 241‒265 (1980)
[Crossref]

J. Coast. Res. (1)

C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822‒829 (2020)
[Crossref]

J. Comput. Sci. Technol. (1)

B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769‒793 (2020)
[Crossref]

J. Signal Process. Syst. (1)

X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139‒146 (2021)
[Crossref]

Laser Phys. Lett. (2)

S. Liansheng, C. Yin, L. Bing, T. Ailing, A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, (2018)
[Crossref]

S. Dafu, Z. Wenjie, Z. Leihong, "Research on a big data information optical double encryption algorithm based on compressive ghost imaging," Laser Phys. Lett. 16, (2019)
[Crossref]

Opt. Commun. (1)

S. Liu, L. Yu, B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57‒63 (2001)
[Crossref]

Opt. Eng. (1)

L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, (2021)
[Crossref]

Opt. Express (2)

Opt. Laser Technol. (2)

J.-J. Huang, H.-E. Hwang, C.-Y. Chen, C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238‒2244 (2012)
[Crossref]

S. Liua, C. Guo, J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327‒342 (2014)
[Crossref]

Opt. Lasers Eng. (5)

Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87‒92 (2015)
[Crossref]

K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, (2020)
[Crossref]

C. Zuo, Q. Chen, L. Tian, L. Waller, A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20‒32 (2015)
[Crossref]

K. Yi, Z. Leihong, Z. Dawei, "Optical encryption based on ghost imaging and public key cryptography," Opt. Lasers Eng. 111, 58‒64 (2018)
[Crossref]

H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, (2020)
[Crossref]

Opt. Lett. (3)

Opt. Rev. (1)

K. Shibuya, K. Nakae, Y. Mizutani, T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897‒902 (2015)
[Crossref]

Optik (1)

Z. Liu, M. A. Ahmad, S. Liu, "Image encryption based on double random amplitude coding in random Hartley transform domain," Optik 121, 959‒964 (2010)
[Crossref]

Pattern Recognit. Lett. (1)

Y. Chen, W. Zheng, W. Li, Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1‒5 (2021)
[Crossref]

Photonics Res. (1)

L. Wang, S. Zhao, "Fast reconstructed and high-quality ghost imaging with fast Walsh-Hadamard transform," Photonics Res. 4, 240‒244 (2016)
[Crossref]

Proc. IEEE (2)

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128‒1148 (2009)
[Crossref]

W. K. Pratt, J. Kane, H. C. Andrews, "Hadamard transform image coding," Proc. IEEE 57, 58‒68 (1969)
[Crossref]

Proc. SPIE (1)

Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, (2016)
[Crossref]

Regul. Pap. (1)

J. Zhang, C. Shen, "Set-based obfuscation for strong PUFs against machine learning attacks," Regul. Pap. 68, 288‒300 (2021)
[Crossref]

Sensors (1)

W. K. Yu, "Super sub-Nyquist single-pixel imaging by means of cake-cutting Hadamard basis sort," Sensors 19, 4122 (2019)
[Crossref] [PubMed]

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.


Select as filters


Select Topics Cancel
© Copyright 2022 | Optica Publishing Group. All Rights Reserved