OPTICS & OPTOELECTRONIC TECHNOLOGY, Volume. 20, Issue 1, 77(2022)

Image Hiding Method Based on Binary Calculation of Ghost Imaging

YANG Zhong-zhuo, BAI Xing, YU Zhan, WANG Yu-jie, CHEN Xing-yu, and ZHOU Xin
Author Affiliations
  • [in Chinese]
  • show less
    References(18)

    [1] [1] Javidi B, Carnicer A, Yamaguchi M, et al. Roadmap on optical security[J]. Journal of Optics, 2016, 18(8): 083001.

    [2] [2] Chen W, Javidi B, Chen X. Advances in optical security systems[J]. Advances in Optics and Photonics, 2014, 6(2): 120-155.

    [3] [3] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics letters, 1995, 20(7): 767-769.

    [4] [4] Situ G, Zhang J. Double random-phase encoding in the Fresnel domain[J]. Optics Letters, 2004, 29(14): 1584-1586.

    [5] [5] Zhang Y, Wang B. Optical image encryption based on interference[J]. Optics Letters, 2008, 33(21): 2443-2445.

    [6] [6] Wang X, Zhao D. Optical image hiding with silhouette removal based on the optical interference principle[J]. Applied optics, 2012, 51(6): 686-691.

    [7] [7] Xie P, Shi X, Huang X, et al. Binary detection in ghost imaging with preserved grayscale[J]. The European Physical Journal D, 2019, 73(5): 102.

    [8] [8] Chen W, Chen X. Ghost imaging for three-dimensional optical security[J]. Applied Physics Letters, 2013, 103(22): 221106.

    [9] [9] Wu J, Xie Z, Liu Z, et al. Multiple-image encryption based on computational ghost imaging[J]. Optics Communications, 2016, 359(2): 38-43.

    [10] [10] Chen W, Chen X. Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption[J]. EPL (Europhysics Letters), 2015, 109(1): 14001.

    [11] [11] Li J P, Song L, Chen L, et al. Quadratic polar coordinate transform technique for the demodulation of circular carrier interferogram[J]. Optics Communications, 2015, 336(8): 166-172.

    [12] [12] Li J, Li H, Li J, et al. Compressive optical image encryption with two-step-only quadrature phase-shifting digital holography[J]. Optics Communications, 2015, 344(2): 166-171.

    [13] [13] Li X, Meng X, Yang X, et al. Multiple-image encryption based on compressive ghost imaging and coordinate sampling[J]. IEEE Photonics Journal, 2016, 8(4): 1-11.

    [14] [14] Clemente P, Durán V, Tajahuerce E, et al. Optical encryption based on computational ghost imaging[J]. Optics letters, 2010, 35(14): 2391-2393.

    [15] [15] Chen W, Chen X. Marked ghost imaging[J]. Applied Physics Letters, 2014, 104(25): 251109.

    [16] [16] Wang L, Zhao S, Cheng W, et al. Optical image hiding based on computational ghost imaging[J]. Optics Communications, 2016, 366(6): 314-320.

    [17] [17] Liansheng S, Yin C, Ailing T, et al. An optical watermarking scheme with two-layer framework based on computational ghost imaging[J]. Optics and Lasers in Engineering, 2018, 107(3): 38-45.

    [18] [18] Yuan S, Magayane D A, Liu X, et al. A blind watermarking scheme based on computational ghost imaging in wavelet domain[J]. Optics Communications, 2021, 482(5): 126568.

    Tools

    Get Citation

    Copy Citation Text

    YANG Zhong-zhuo, BAI Xing, YU Zhan, WANG Yu-jie, CHEN Xing-yu, ZHOU Xin. Image Hiding Method Based on Binary Calculation of Ghost Imaging[J]. OPTICS & OPTOELECTRONIC TECHNOLOGY, 2022, 20(1): 77

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Aug. 13, 2021

    Accepted: --

    Published Online: Mar. 16, 2022

    The Author Email:

    DOI:

    CSTR:32186.14.

    Topics