Optical encryption based on computational ghost imaging
Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization o...
Gespeichert in:
Veröffentlicht in: | Optics letters 2010-07, Vol.35 (14), p.2391-2393 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2393 |
---|---|
container_issue | 14 |
container_start_page | 2391 |
container_title | Optics letters |
container_volume | 35 |
creator | CLEMENTE, Pere DURAN, Vicente TORRES-COMPANY, Victor TAJAHUERCE, Enrique LANCIS, Jesús |
description | Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed. |
doi_str_mv | 10.1364/ol.35.002391 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_733986476</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>733986476</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-f62658c2e991de9635837c877adb7ad15e69f388631a2b1a9cd5f28f45e2953</originalsourceid><addsrcrecordid>eNpFkEtLAzEUhYMotlZ3rmU24sapSW6eSym-oNCF7kMmk9SReTmZWfTfm9Kqi8s9XD4O5x6ErgleEhDsoauXwJcYU9DkBM0JB50zqdkpmmPCRK65pjN0EeMXxlhIgHM0o1gAUwzPkdz0Y-VsnfnWDbukuzYrbPRlloTrmn4a7f6YiO1nF8esauy2areX6CzYOvqr416g9-enj9Vrvt68vK0e17kDJcY8CCq4ctRrTUqvBXAF0ikpbVmkIdwLHUApAcTSgljtSh6oCox7qjks0N3BtR-678nH0TRVdL6ubeu7KZr0jVaCSZHI-wPphi7GwQfTDynqsDMEm31PZrM2wM2hp4TfHI2novHlH_xbTAJuj4CNqZ4w2NZV8Z8DCoynhD-F028a</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>733986476</pqid></control><display><type>article</type><title>Optical encryption based on computational ghost imaging</title><source>Optica Publishing Group Journals</source><creator>CLEMENTE, Pere ; DURAN, Vicente ; TORRES-COMPANY, Victor ; TAJAHUERCE, Enrique ; LANCIS, Jesús</creator><creatorcontrib>CLEMENTE, Pere ; DURAN, Vicente ; TORRES-COMPANY, Victor ; TAJAHUERCE, Enrique ; LANCIS, Jesús</creatorcontrib><description>Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.</description><identifier>ISSN: 0146-9592</identifier><identifier>EISSN: 1539-4794</identifier><identifier>DOI: 10.1364/ol.35.002391</identifier><identifier>PMID: 20634840</identifier><identifier>CODEN: OPLEDP</identifier><language>eng</language><publisher>Washington, DC: Optical Society of America</publisher><subject>Exact sciences and technology ; Fundamental areas of phenomenology (including applications) ; Optics ; Physics</subject><ispartof>Optics letters, 2010-07, Vol.35 (14), p.2391-2393</ispartof><rights>2015 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-f62658c2e991de9635837c877adb7ad15e69f388631a2b1a9cd5f28f45e2953</citedby><cites>FETCH-LOGICAL-c386t-f62658c2e991de9635837c877adb7ad15e69f388631a2b1a9cd5f28f45e2953</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,3245,27901,27902</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=23234595$$DView record in Pascal Francis$$Hfree_for_read</backlink><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/20634840$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>CLEMENTE, Pere</creatorcontrib><creatorcontrib>DURAN, Vicente</creatorcontrib><creatorcontrib>TORRES-COMPANY, Victor</creatorcontrib><creatorcontrib>TAJAHUERCE, Enrique</creatorcontrib><creatorcontrib>LANCIS, Jesús</creatorcontrib><title>Optical encryption based on computational ghost imaging</title><title>Optics letters</title><addtitle>Opt Lett</addtitle><description>Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.</description><subject>Exact sciences and technology</subject><subject>Fundamental areas of phenomenology (including applications)</subject><subject>Optics</subject><subject>Physics</subject><issn>0146-9592</issn><issn>1539-4794</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><recordid>eNpFkEtLAzEUhYMotlZ3rmU24sapSW6eSym-oNCF7kMmk9SReTmZWfTfm9Kqi8s9XD4O5x6ErgleEhDsoauXwJcYU9DkBM0JB50zqdkpmmPCRK65pjN0EeMXxlhIgHM0o1gAUwzPkdz0Y-VsnfnWDbukuzYrbPRlloTrmn4a7f6YiO1nF8esauy2areX6CzYOvqr416g9-enj9Vrvt68vK0e17kDJcY8CCq4ctRrTUqvBXAF0ikpbVmkIdwLHUApAcTSgljtSh6oCox7qjks0N3BtR-678nH0TRVdL6ubeu7KZr0jVaCSZHI-wPphi7GwQfTDynqsDMEm31PZrM2wM2hp4TfHI2novHlH_xbTAJuj4CNqZ4w2NZV8Z8DCoynhD-F028a</recordid><startdate>20100715</startdate><enddate>20100715</enddate><creator>CLEMENTE, Pere</creator><creator>DURAN, Vicente</creator><creator>TORRES-COMPANY, Victor</creator><creator>TAJAHUERCE, Enrique</creator><creator>LANCIS, Jesús</creator><general>Optical Society of America</general><scope>IQODW</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope></search><sort><creationdate>20100715</creationdate><title>Optical encryption based on computational ghost imaging</title><author>CLEMENTE, Pere ; DURAN, Vicente ; TORRES-COMPANY, Victor ; TAJAHUERCE, Enrique ; LANCIS, Jesús</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-f62658c2e991de9635837c877adb7ad15e69f388631a2b1a9cd5f28f45e2953</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Exact sciences and technology</topic><topic>Fundamental areas of phenomenology (including applications)</topic><topic>Optics</topic><topic>Physics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>CLEMENTE, Pere</creatorcontrib><creatorcontrib>DURAN, Vicente</creatorcontrib><creatorcontrib>TORRES-COMPANY, Victor</creatorcontrib><creatorcontrib>TAJAHUERCE, Enrique</creatorcontrib><creatorcontrib>LANCIS, Jesús</creatorcontrib><collection>Pascal-Francis</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><jtitle>Optics letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>CLEMENTE, Pere</au><au>DURAN, Vicente</au><au>TORRES-COMPANY, Victor</au><au>TAJAHUERCE, Enrique</au><au>LANCIS, Jesús</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optical encryption based on computational ghost imaging</atitle><jtitle>Optics letters</jtitle><addtitle>Opt Lett</addtitle><date>2010-07-15</date><risdate>2010</risdate><volume>35</volume><issue>14</issue><spage>2391</spage><epage>2393</epage><pages>2391-2393</pages><issn>0146-9592</issn><eissn>1539-4794</eissn><coden>OPLEDP</coden><abstract>Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.</abstract><cop>Washington, DC</cop><pub>Optical Society of America</pub><pmid>20634840</pmid><doi>10.1364/ol.35.002391</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0146-9592 |
ispartof | Optics letters, 2010-07, Vol.35 (14), p.2391-2393 |
issn | 0146-9592 1539-4794 |
language | eng |
recordid | cdi_proquest_miscellaneous_733986476 |
source | Optica Publishing Group Journals |
subjects | Exact sciences and technology Fundamental areas of phenomenology (including applications) Optics Physics |
title | Optical encryption based on computational ghost imaging |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T02%3A22%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optical%20encryption%20based%20on%20computational%20ghost%20imaging&rft.jtitle=Optics%20letters&rft.au=CLEMENTE,%20Pere&rft.date=2010-07-15&rft.volume=35&rft.issue=14&rft.spage=2391&rft.epage=2393&rft.pages=2391-2393&rft.issn=0146-9592&rft.eissn=1539-4794&rft.coden=OPLEDP&rft_id=info:doi/10.1364/ol.35.002391&rft_dat=%3Cproquest_cross%3E733986476%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=733986476&rft_id=info:pmid/20634840&rfr_iscdi=true |