OPTICS & OPTOELECTRONIC TECHNOLOGY, Volume. 20, Issue 1, 77(2022)
Image Hiding Method Based on Binary Calculation of Ghost Imaging
[1] [1] Javidi B, Carnicer A, Yamaguchi M, et al. Roadmap on optical security[J]. Journal of Optics, 2016, 18(8): 083001.
[2] [2] Chen W, Javidi B, Chen X. Advances in optical security systems[J]. Advances in Optics and Photonics, 2014, 6(2): 120-155.
[3] [3] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics letters, 1995, 20(7): 767-769.
[4] [4] Situ G, Zhang J. Double random-phase encoding in the Fresnel domain[J]. Optics Letters, 2004, 29(14): 1584-1586.
[5] [5] Zhang Y, Wang B. Optical image encryption based on interference[J]. Optics Letters, 2008, 33(21): 2443-2445.
[6] [6] Wang X, Zhao D. Optical image hiding with silhouette removal based on the optical interference principle[J]. Applied optics, 2012, 51(6): 686-691.
[7] [7] Xie P, Shi X, Huang X, et al. Binary detection in ghost imaging with preserved grayscale[J]. The European Physical Journal D, 2019, 73(5): 102.
[8] [8] Chen W, Chen X. Ghost imaging for three-dimensional optical security[J]. Applied Physics Letters, 2013, 103(22): 221106.
[9] [9] Wu J, Xie Z, Liu Z, et al. Multiple-image encryption based on computational ghost imaging[J]. Optics Communications, 2016, 359(2): 38-43.
[10] [10] Chen W, Chen X. Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption[J]. EPL (Europhysics Letters), 2015, 109(1): 14001.
[11] [11] Li J P, Song L, Chen L, et al. Quadratic polar coordinate transform technique for the demodulation of circular carrier interferogram[J]. Optics Communications, 2015, 336(8): 166-172.
[12] [12] Li J, Li H, Li J, et al. Compressive optical image encryption with two-step-only quadrature phase-shifting digital holography[J]. Optics Communications, 2015, 344(2): 166-171.
[13] [13] Li X, Meng X, Yang X, et al. Multiple-image encryption based on compressive ghost imaging and coordinate sampling[J]. IEEE Photonics Journal, 2016, 8(4): 1-11.
[14] [14] Clemente P, Durán V, Tajahuerce E, et al. Optical encryption based on computational ghost imaging[J]. Optics letters, 2010, 35(14): 2391-2393.
[15] [15] Chen W, Chen X. Marked ghost imaging[J]. Applied Physics Letters, 2014, 104(25): 251109.
[16] [16] Wang L, Zhao S, Cheng W, et al. Optical image hiding based on computational ghost imaging[J]. Optics Communications, 2016, 366(6): 314-320.
[17] [17] Liansheng S, Yin C, Ailing T, et al. An optical watermarking scheme with two-layer framework based on computational ghost imaging[J]. Optics and Lasers in Engineering, 2018, 107(3): 38-45.
[18] [18] Yuan S, Magayane D A, Liu X, et al. A blind watermarking scheme based on computational ghost imaging in wavelet domain[J]. Optics Communications, 2021, 482(5): 126568.
Get Citation
Copy Citation Text
YANG Zhong-zhuo, BAI Xing, YU Zhan, WANG Yu-jie, CHEN Xing-yu, ZHOU Xin. Image Hiding Method Based on Binary Calculation of Ghost Imaging[J]. OPTICS & OPTOELECTRONIC TECHNOLOGY, 2022, 20(1): 77
Category:
Received: Aug. 13, 2021
Accepted: --
Published Online: Mar. 16, 2022
The Author Email:
CSTR:32186.14.