Abstract

A novel computational ghost imaging scheme based on specially designed phase-only masks, which can be efficiently applied to encrypt an original image into a series of measured intensities, is proposed in this paper. First, a Hadamard matrix with a certain order is generated, where the number of elements in each row is equal to the size of the original image to be encrypted. Each row of the matrix is rearranged into the corresponding 2D pattern. Then, each pattern is encoded into the phase-only masks by making use of an iterative phase retrieval algorithm. These specially designed masks can be wholly or partially used in the process of computational ghost imaging to reconstruct the original information with high quality. When a significantly small number of phase-only masks are used to record the measured intensities in a single-pixel bucket detector, the information can be authenticated without clear visualization by calculating the nonlinear correlation map between the original image and its reconstruction. The results illustrate the feasibility and effectiveness of the proposed computational ghost imaging mechanism, which will provide an effective alternative for enriching the related research on the computational ghost imaging technique.

Highlights

  • IntroductionKnown as correlated photon imaging [1, 2], ghost imaging is a most intriguing optical imaging technique that allows

  • We propose a novel computational ghost imaging scheme based on specially designed phase-only masks to encrypt original images

  • After the Hadamard matrix with order 2k is calculated with equations (5) and (6), each row can be rearranged into a 2D pattern image with M × N elements, from which a specially designed phase-only mask is retrieved using an iterative phase retrieval algorithm

Read more

Summary

Introduction

Known as correlated photon imaging [1, 2], ghost imaging is a most intriguing optical imaging technique that allows. Because random phase-only masks embedded into a spatial light modulator in the object beam path contain overlap information, the number of these masks would be huge to obtain the reconstructed image with high quality It is very inconvenient in storage and transmission when a large amount of phase-only masks are considered as secret keys. To overcome these shortcomings, we propose a novel computational ghost imaging scheme based on specially designed phase-only masks to encrypt original images. S Liansheng et al sharply decreases the redundancy between them Besides these masks, the setup parameters such as light wavelength and axis distance in the process of computational ghost imaging are applied as significant secret keys to enhance system security.

Scheme description
Results and analysis
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.