Chinese Journal of Lasers, Volume. 48, Issue 12, 1212001(2021)

Temporal Ghost Imaging and Its Application

Baoqing Sun* and Yupeng Wang
Author Affiliations
  • School of Information Science and Engineering, Shandong University, Qingdao, Shandong 266237, China
  • show less
    Figures & Tables(20)
    Comparison of classical spatial and temporal GI experimental set-ups[26]. (a) Spatial set-up; (b) temporal set-up
    Experimental results temporal ghost imaging[26]. (a) Comparison of temporal ghost imaging and direct imaging measured with the fast detector; (b) comparison of temporal ghost imaging and direct imaging when a multimode fiber is added between the object and the detector
    Schematic diagram of intensity-only detection computational temporal ghost imaging[31]
    Experimental results of intensity-only detection computational temporal ghost imaging[31]
    Schematic diagram of thermal temporal ghost imaging[32]
    Experimental results of thermal temporal ghost imaging(insert: the transmission spectrum of the bandwidth-variable tunable filter)[32]
    Schematic diagram of magnified time-domain ghost imaging[27]
    Experimental results of magnified time-domain ghost imaging[27]
    Experimental setup for temporal ghost imaging with wavelength conversion[34]
    Experimental ghost image of temporal objects[34]. (a) and (b) are two examples of different bit sequences (The solid lines represent the ghost image; the dashed lines correspond to the direct measurement results with the 2 μm fast detector)
    Experimental setup for detecting a temporal signal via computational temporal ghost imaging[42]
    Comparison of results of direct detection and computational temporal GI[42]. (a) Bandwidth is 10 MHz; (b) bandwidth is 1 MHz; (c) bandwidth is 300 kHz; (d) bandwidth is 100 kHz; (e) bandwidth is 10 kHz; (f) bandwidth is 1 kHz
    Schematic diagram of VLC encryption and decryption process based on computational temporal ghost imaging[53]
    Experimental results of communication security scheme based on computational temporal ghost imaging[53]
    Schematic diagram of spatial multiplexing computational temporal ghost imaging[58]
    Algorithmic framework of the encryption scheme based on spatial multiplexing computational temporal ghost imaging[46]. (a) Encryption procedure; (b) decryption procedure
    Experimental results of the security scheme[46]. (a) Original image to be encrypted; (b) one binary random pattern of the secret key sequence; (c) image after encrypted; (d) reconstructed image with correct key; (e) decrypted image using the key with completely different spatial distribution; (f) decrypted image using wrong order of the key
    Experimental results of robustness testing[46]. (a) Encrypted image with 25% occlusion; (b) reconstructed image by the incomplete ciphertext; (c) ciphertext after adding zero-mean white additive Gaussian noise; (d) reconstructed image by the ciphertext with noise; (e) decrypted image using 20% patterns in proper order; (f) decrypted image using the right secret key but without demodulation of ciphertext when additional modulation on the ciphertext is introduced
    Camera acquisition process of the high speed imaging scheme[68]
    Results of image recovery[68]. (a) Rotating Rubik’s Cube taken by the camera directly; (b) reconstruction of 64 frames of images based on spatial multiplexing computational temporal ghost imaging
    Tools

    Get Citation

    Copy Citation Text

    Baoqing Sun, Yupeng Wang. Temporal Ghost Imaging and Its Application[J]. Chinese Journal of Lasers, 2021, 48(12): 1212001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: quantum optics

    Received: Mar. 5, 2021

    Accepted: Apr. 21, 2021

    Published Online: Jun. 11, 2021

    The Author Email: Sun Baoqing (Baoqing.sun@sdu.edu.cn)

    DOI:10.3788/CJL202148.1212001

    Topics