Correlated-Photon Secured Imaging by Iterative Phase Retrieval Using Axially-Varying Distances

被引:30
作者
Chen, Wen [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Elect & Informat Engn, Hong Kong, Hong Kong, Peoples R China
关键词
Correlated-photon secured imaging; iterative phase retrieval; optical encryption; axially-varying distances; OPTICAL ENCRYPTION; OBJECT AUTHENTICATION; GHOST; RECOGNITION; DOMAIN;
D O I
10.1109/LPT.2016.2577596
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Correlated-photon imaging (also called ghost imaging) has attracted much attention in various fields, and its characteristics, such as single-pixel detection, have been extensively explored. In this letter, correlated-photon imaging is presented by using iterative phase retrieval with axially varying distances for optical encryption. A series of phase-only masks are iteratively extracted by modulating the pre-generated random intensity-only maps, and propagation distances are axially varied in a random manner. It is illustrated that the setup parameter can be applied as one of significant keys rather than just complementary one, and the iterative phase retrieval algorithm is applied to flexibly generate phase-only masks for the encoding.
引用
收藏
页码:1932 / 1935
页数:4
相关论文
共 28 条
[1]   High-order thermal ghost imaging [J].
Chan, Kam Wai Clifford ;
O'Sullivan, Malcolm N. ;
Boyd, Robert W. .
OPTICS LETTERS, 2009, 34 (21) :3343-3345
[2]   Optical Data Security System Using Phase Extraction Scheme via Single-Pixel Detection [J].
Chen, Wen .
IEEE PHOTONICS JOURNAL, 2016, 8 (01)
[3]   Grayscale object authentication based on ghost imaging using binary signals [J].
Chen, Wen ;
Chen, Xudong .
EPL, 2015, 110 (04)
[4]   Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation [J].
Chen, Wen ;
Chen, Xudong .
OPTICS AND LASERS IN ENGINEERING, 2015, 73 :123-127
[5]   Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption [J].
Chen, Wen ;
Chen, Xudong .
EPL, 2015, 109 (01)
[6]   Ghost imaging for three-dimensional optical security [J].
Chen, Wen ;
Chen, Xudong .
APPLIED PHYSICS LETTERS, 2013, 103 (22)
[7]   Optical encryption using multiple intensity samplings in the axial domain [J].
Chen, Wen ;
Chen, Xudong ;
Anand, Arun ;
Javidi, Bahram .
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, 2013, 30 (05) :806-812
[8]   Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit [J].
Chen, Wen ;
Chen, Xudong .
OPTICS LETTERS, 2013, 38 (04) :546-548
[9]   Optical encryption based on computational ghost imaging [J].
Clemente, Pere ;
Duran, Vicente ;
Torres-Company, Victor ;
Tajahuerce, Enrique ;
Lancis, Jesus .
OPTICS LETTERS, 2010, 35 (14) :2391-2393
[10]   Computational ghost imaging for remote sensing [J].
Erkmen, Baris I. .
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, 2012, 29 (05) :782-789