Optical Instruments, Volume. 45, Issue 1, 60(2023)

Multiple image encryption studies based on a cascaded phase retrieval and ghost imaging

Leihong ZHANG1... Yahui SU2,*, Kaimin WANG1, Dawei ZHANG1, Wei PENG3, Fengshou WU3 and Jie ZHOU4 |Show fewer author(s)
Author Affiliations
  • 1School of Optical-Electrical and computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
  • 2College of Communication and Art Design, University of Shanghai for Science and Technology, Shanghai 200093, China
  • 3China Shipbuilding Industry Institute of the Engineering Investigation and Design Co., Ltd., Shanghai 200063, China
  • 4Library, Shanghai University of Engineering Science, Shanghai 201620, China
  • show less
    References(14)

    [1] MATOBA O, NOMURA T, PEREZ-CABRE E, et al. Optical techniques for information security[J]. Proceedings of the IEEE, 97, 1128-1148(2009).

    [2] XIAO D, LI X W, LIU S J, et al. Encryption and display of multiple-image information using computer-generated holography with modified GS iterative algorithm[J]. Optics Communications, 410, 488-495(2018).

    [3] JAVIDI B. Optical information processing for encryption and security systems[J]. Optics & Photonics News, 8, 28(1997).

    [4] LI X Y, MENG X F, YANG X L, et al. Multiple-image encryption based on compressive ghost imaging and coordinate sampling[J]. IEEE Photonics Journal, 8, 3900511(2016).

    [5] LI X Y, MENG X F, YANG X L, et al. Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme[J]. Optics and Lasers in Engineering, 102, 106-111(2018).

    [6] WU J J, XIE Z W, LIU Z J, et al. Multiple-image encryption based on computational ghost imaging[J]. Optics Communications, 359, 38-43(2016).

    [7] ZHANG L H, ZHANG Z S, YE H L, et al. Multi-image holographic encryption based on phase recovery algorithm and ghost imaging[J]. Applied Physics B, 126, 136(2020).

    [8] SUI L S, ZHAO X Y, HUANG C T, et al. An optical multiple-image authentication based on transport of intensity equation[J]. Optics and Lasers in Engineering, 116, 116-124(2019).

    [9] [9] WANG Y, ZHANG L H, ZHANG D W, et al. Research on multipleimage encryption scheme based on joint power spectral division multiplexing ghost imaging[J]. Laser Physics, 2021, 31(5): 055204 (12pp).

    [10] ZHAO T Y, CHI Y Y. Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm[J]. Multimedia Tools and Applications, 79, 12165-12181(2020).

    [11] MEI X D, WANG C L, FANG Y M, et al. Influence of the source’s energy fluctuation on computational ghost imaging and effective correction approaches[J]. Chinese Optics Letters, 18, 042602(2020).

    [12] HAZER A, YILDIRIM R. A review of single and multiple optical image encryption techniques[J]. Journal of Optics, 23, 113501(2021).

    [13] XIAO Y L, ZHOU X, YUAN S, et al. Multiple-image optical encryption: an improved encoding approach[J]. Applied Optics, 48, 2686-2692(2009).

    [14] KANG Y, ZHANG L H, YE H L, et al. One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access[J]. Photonics Research, 7, 1370-1380(2019).

    Tools

    Get Citation

    Copy Citation Text

    Leihong ZHANG, Yahui SU, Kaimin WANG, Dawei ZHANG, Wei PENG, Fengshou WU, Jie ZHOU. Multiple image encryption studies based on a cascaded phase retrieval and ghost imaging[J]. Optical Instruments, 2023, 45(1): 60

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: DESIGN AND RESEARCH

    Received: Sep. 8, 2022

    Accepted: --

    Published Online: Mar. 20, 2023

    The Author Email: SU Yahui (yhsucn@163.com)

    DOI:10.3969/j.issn.1005-5630.2023.001.009

    Topics