Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Optical encryption based on computational ghost imaging

Not Accessible

Your library or personal account may give you access

Abstract

Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.

© 2010 Optical Society of America

Full Article  |  PDF Article
More Like This
Forgery attack on optical encryption based on computational ghost imaging

Sheng Yuan, Lanjie Wang, Xuemei Liu, and Xin Zhou
Opt. Lett. 45(14) 3917-3920 (2020)

Inverse computational ghost imaging for image encryption

Peixia Zheng, Qilong Tan, and Hong-chao Liu
Opt. Express 29(14) 21290-21299 (2021)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (4)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (2)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Metrics

Select as filters


Select Topics Cancel
© Copyright 2022 | Optica Publishing Group. All Rights Reserved