• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

具有从三维到零维图案压缩的计算鬼成像加密

Computational ghost imaging encryption with a pattern compression from 3D to 0D.

作者信息

Zheng Peixia, Ye Zhiyuan, Xiong Jun, Liu Hong-Chao

出版信息

Opt Express. 2022 Jun 6;30(12):21866-21875. doi: 10.1364/OE.455975.

DOI:10.1364/OE.455975
PMID:36224898
Abstract

The principle of computational ghost imaging (GI) offers a potential application in optical encryption. Nevertheless, large numbers of keys composed of random or specific patterns set an obstacle to its application. Here, we propose a series of pattern compression methods based on computational GI, in which thousands of patterns are replaced by a single standard image (i.e., two-dimensional data), a sequence of numbers (i.e., one-dimensional data) or the fractional part of an irrational number (i.e., zero-dimensional data). Different pattern compression methods are tested in both simulations and experiments, and their error tolerances in encryption are further discussed. Our proposed methods can greatly reduce the pattern amount and enhance encryption security, which pushes forward the application of computational GI, especially in optical encryption.

摘要

计算鬼成像(GI)原理在光学加密领域具有潜在应用价值。然而,由随机或特定图案组成的大量密钥成为其应用的障碍。在此,我们提出了一系列基于计算鬼成像的图案压缩方法,其中数千个图案可被单个标准图像(即二维数据)、数字序列(即一维数据)或无理数的小数部分(即零维数据)所替代。在模拟和实验中对不同的图案压缩方法进行了测试,并进一步讨论了它们在加密中的容错能力。我们提出的方法能够大幅减少图案数量并增强加密安全性,推动了计算鬼成像的应用,尤其是在光学加密方面。

相似文献

1
Computational ghost imaging encryption with a pattern compression from 3D to 0D.具有从三维到零维图案压缩的计算鬼成像加密
Opt Express. 2022 Jun 6;30(12):21866-21875. doi: 10.1364/OE.455975.
2
Inverse computational ghost imaging for image encryption.用于图像加密的逆计算鬼成像
Opt Express. 2021 Jul 5;29(14):21290-21299. doi: 10.1364/OE.428036.
3
Anti-loss-compression image encryption based on computational ghost imaging using discrete cosine transform and orthogonal patterns.基于离散余弦变换和正交模式的计算鬼成像抗损失压缩图像加密
Opt Express. 2022 Apr 25;30(9):14073-14087. doi: 10.1364/OE.455736.
4
Optical cryptosystem based on computational ghost imaging and nonlinear authentication.基于计算鬼成像和非线性认证的光学密码系统。
Opt Express. 2024 Jan 29;32(3):4242-4253. doi: 10.1364/OE.510356.
5
Joint Lossless Image Compression and Encryption Scheme Based on CALIC and Hyperchaotic System.基于CALIC和超混沌系统的联合无损图像压缩加密方案
Entropy (Basel). 2021 Aug 23;23(8):1096. doi: 10.3390/e23081096.
6
Imaging reconstruction comparison of different ghost imaging algorithms.不同鬼成像算法的成像重建比较
Sci Rep. 2020 Sep 3;10(1):14626. doi: 10.1038/s41598-020-71642-2.
7
Information encryption based on the customized data container under the framework of computational ghost imaging.基于计算鬼成像框架下定制数据容器的信息加密
Opt Express. 2019 Jun 10;27(12):16493-16506. doi: 10.1364/OE.27.016493.
8
Multi-Image Compression-Encryption Algorithm Based on Compressed Sensing and Optical Encryption.基于压缩感知与光学加密的多图像压缩加密算法
Entropy (Basel). 2022 Jun 2;24(6):784. doi: 10.3390/e24060784.
9
Single-pixel computational ghost imaging with helicity-dependent metasurface hologram.基于螺旋度相关超表面全息图的单像素计算鬼成像
Sci Adv. 2017 Sep 8;3(9):e1701477. doi: 10.1126/sciadv.1701477. eCollection 2017 Sep.
10
Forgery attack on optical encryption based on computational ghost imaging.基于计算鬼成像的光学加密伪造攻击
Opt Lett. 2020 Jul 15;45(14):3917-3920. doi: 10.1364/OL.392424.

引用本文的文献

1
Application of the Five-Step Phase-Shifting Method in Reflective Ghost Imaging for Efficient Phase Reconstruction.五步相移法在反射式鬼成像中用于高效相位重建的应用
Sensors (Basel). 2024 Jan 5;24(2):0. doi: 10.3390/s24020320.
2
Phase Retrieval Based on Shaped Incoherent Sources.基于成形非相干光源的相位恢复
Sensors (Basel). 2023 Nov 25;23(23):9405. doi: 10.3390/s23239405.