An optical multiple-image authentication based on computational ghost imaging and total-variation minimization
An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embe...
Main Authors: | Yaoling Zhou, Yueer Sun, Mu Yang, Junzhao Hou, Zhaolin Xiao, Asundi Anand, Liansheng Sui |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-07-01
|
Series: | Heliyon |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2405844023048909 |
Similar Items
Similar Items
-
Information encryption based on the customized data container under the framework of computational ghost imaging
by: Sui, Liansheng, et al.
Published: (2019) -
The Physics of Turbulence-Free Ghost Imaging
by: Yanhua Shih
Published: (2016-12-01) -
Self-Modulated Ghost Imaging in Dynamic Scattering Media
by: Ying Yu, et al.
Published: (2023-11-01) -
High-Quality Computational Ghost Imaging with a Conditional GAN
by: Ming Zhao, et al.
Published: (2023-03-01) -
Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling
by: Xianye Li, et al.
Published: (2016-01-01)