Abstract

Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.

© 2010 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Information encryption based on the customized data container under the framework of computational ghost imaging

Sui Liansheng, Du Cong, Xu Minjie, Tian Ailing, and Asundi Anand
Opt. Express 27(12) 16493-16506 (2019)

Noise reduction in computational ghost imaging by interpolated monitoring

Zhaohua Yang, Yuzhe Sun, Shaofan Qu, Yuanjin Yu, Ruitao Yan, Ai-Xin Zhang, and Ling-An Wu
Appl. Opt. 57(21) 6097-6101 (2018)

Optical image hiding under framework of computational ghost imaging based on an expansion strategy

Sui Liansheng, Wang Jiahao, Tian Ailing, and Anand Asundi
Opt. Express 27(5) 7213-7225 (2019)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (4)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (2)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription