Ghost identification based on single-pixel imaging in big data environment

被引:47
作者
Chen, Wen [1 ,2 ]
机构
[1] Hong Kong Polytech Univ, Dept Elect & Informat Engn, Hong Kong, Hong Kong, Peoples R China
[2] Hong Kong Polytech Univ, Shenzhen Res Inst, Shenzhen 518057, Peoples R China
基金
中国国家自然科学基金;
关键词
OBJECT AUTHENTICATION; INFORMATION; SECURITY;
D O I
10.1364/OE.25.016509
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In recent years, single-pixel imaging has become one of the most interesting and promising imaging technologies for various applications. In this paper, a big data environment for the first time to my knowledge is designed and introduced into single-pixel ghost imaging for securing information. Many series of one-dimensional ciphertexts are recorded by a single-pixel bucket detector to form a big data environment. Several hidden inputs are further encoded based on ghost imaging by using hierarchical structure, and their corresponding ciphertexts are synthesized into the big data environment for verifying the hidden ghosts and identifying the targeted ghosts. This new finding could open up a different research perspective for exploring more applications based on single-pixel imaging. (C) 2017 Optical Society of America
引用
收藏
页码:16509 / 16516
页数:8
相关论文
共 28 条
[1]   Two-photon coincidence imaging with a classical source [J].
Bennink, RS ;
Bentley, SJ ;
Boyd, RW .
PHYSICAL REVIEW LETTERS, 2002, 89 (11)
[2]   High-order thermal ghost imaging [J].
Chan, Kam Wai Clifford ;
O'Sullivan, Malcolm N. ;
Boyd, Robert W. .
OPTICS LETTERS, 2009, 34 (21) :3343-3345
[3]   Grayscale object authentication based on ghost imaging using binary signals [J].
Chen, Wen ;
Chen, Xudong .
EPL, 2015, 110 (04)
[4]   Advances in optical security systems [J].
Chen, Wen ;
Javidi, Bahram ;
Chen, Xudong .
ADVANCES IN OPTICS AND PHOTONICS, 2014, 6 (02) :120-155
[5]   Marked ghost imaging [J].
Chen, Wen ;
Chen, Xudong .
APPLIED PHYSICS LETTERS, 2014, 104 (25)
[6]   Ghost imaging for three-dimensional optical security [J].
Chen, Wen ;
Chen, Xudong .
APPLIED PHYSICS LETTERS, 2013, 103 (22)
[7]   Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit [J].
Chen, Wen ;
Chen, Xudong .
OPTICS LETTERS, 2013, 38 (04) :546-548
[8]   Optical encryption based on computational ghost imaging [J].
Clemente, Pere ;
Duran, Vicente ;
Torres-Company, Victor ;
Tajahuerce, Enrique ;
Lancis, Jesus .
OPTICS LETTERS, 2010, 35 (14) :2391-2393
[9]   Computational ghost imaging for remote sensing [J].
Erkmen, Baris I. .
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, 2012, 29 (05) :782-789
[10]   Ghost imaging: from quantum to classical to computational [J].
Erkmen, Baris I. ;
Shapiro, Jeffrey H. .
ADVANCES IN OPTICS AND PHOTONICS, 2010, 2 (04) :405-450