Optical encryption based on computational ghost imaging

Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization o...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Optics letters 2010-07, Vol.35 (14), p.2391-2393
Hauptverfasser: CLEMENTE, Pere, DURAN, Vicente, TORRES-COMPANY, Victor, TAJAHUERCE, Enrique, LANCIS, Jesús
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2393
container_issue 14
container_start_page 2391
container_title Optics letters
container_volume 35
creator CLEMENTE, Pere
DURAN, Vicente
TORRES-COMPANY, Victor
TAJAHUERCE, Enrique
LANCIS, Jesús
description Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.
doi_str_mv 10.1364/ol.35.002391
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_733986476</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>733986476</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-f62658c2e991de9635837c877adb7ad15e69f388631a2b1a9cd5f28f45e2953</originalsourceid><addsrcrecordid>eNpFkEtLAzEUhYMotlZ3rmU24sapSW6eSym-oNCF7kMmk9SReTmZWfTfm9Kqi8s9XD4O5x6ErgleEhDsoauXwJcYU9DkBM0JB50zqdkpmmPCRK65pjN0EeMXxlhIgHM0o1gAUwzPkdz0Y-VsnfnWDbukuzYrbPRlloTrmn4a7f6YiO1nF8esauy2areX6CzYOvqr416g9-enj9Vrvt68vK0e17kDJcY8CCq4ctRrTUqvBXAF0ikpbVmkIdwLHUApAcTSgljtSh6oCox7qjks0N3BtR-678nH0TRVdL6ubeu7KZr0jVaCSZHI-wPphi7GwQfTDynqsDMEm31PZrM2wM2hp4TfHI2novHlH_xbTAJuj4CNqZ4w2NZV8Z8DCoynhD-F028a</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>733986476</pqid></control><display><type>article</type><title>Optical encryption based on computational ghost imaging</title><source>Optica Publishing Group Journals</source><creator>CLEMENTE, Pere ; DURAN, Vicente ; TORRES-COMPANY, Victor ; TAJAHUERCE, Enrique ; LANCIS, Jesús</creator><creatorcontrib>CLEMENTE, Pere ; DURAN, Vicente ; TORRES-COMPANY, Victor ; TAJAHUERCE, Enrique ; LANCIS, Jesús</creatorcontrib><description>Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.</description><identifier>ISSN: 0146-9592</identifier><identifier>EISSN: 1539-4794</identifier><identifier>DOI: 10.1364/ol.35.002391</identifier><identifier>PMID: 20634840</identifier><identifier>CODEN: OPLEDP</identifier><language>eng</language><publisher>Washington, DC: Optical Society of America</publisher><subject>Exact sciences and technology ; Fundamental areas of phenomenology (including applications) ; Optics ; Physics</subject><ispartof>Optics letters, 2010-07, Vol.35 (14), p.2391-2393</ispartof><rights>2015 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-f62658c2e991de9635837c877adb7ad15e69f388631a2b1a9cd5f28f45e2953</citedby><cites>FETCH-LOGICAL-c386t-f62658c2e991de9635837c877adb7ad15e69f388631a2b1a9cd5f28f45e2953</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,3245,27901,27902</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=23234595$$DView record in Pascal Francis$$Hfree_for_read</backlink><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/20634840$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>CLEMENTE, Pere</creatorcontrib><creatorcontrib>DURAN, Vicente</creatorcontrib><creatorcontrib>TORRES-COMPANY, Victor</creatorcontrib><creatorcontrib>TAJAHUERCE, Enrique</creatorcontrib><creatorcontrib>LANCIS, Jesús</creatorcontrib><title>Optical encryption based on computational ghost imaging</title><title>Optics letters</title><addtitle>Opt Lett</addtitle><description>Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.</description><subject>Exact sciences and technology</subject><subject>Fundamental areas of phenomenology (including applications)</subject><subject>Optics</subject><subject>Physics</subject><issn>0146-9592</issn><issn>1539-4794</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><recordid>eNpFkEtLAzEUhYMotlZ3rmU24sapSW6eSym-oNCF7kMmk9SReTmZWfTfm9Kqi8s9XD4O5x6ErgleEhDsoauXwJcYU9DkBM0JB50zqdkpmmPCRK65pjN0EeMXxlhIgHM0o1gAUwzPkdz0Y-VsnfnWDbukuzYrbPRlloTrmn4a7f6YiO1nF8esauy2areX6CzYOvqr416g9-enj9Vrvt68vK0e17kDJcY8CCq4ctRrTUqvBXAF0ikpbVmkIdwLHUApAcTSgljtSh6oCox7qjks0N3BtR-678nH0TRVdL6ubeu7KZr0jVaCSZHI-wPphi7GwQfTDynqsDMEm31PZrM2wM2hp4TfHI2novHlH_xbTAJuj4CNqZ4w2NZV8Z8DCoynhD-F028a</recordid><startdate>20100715</startdate><enddate>20100715</enddate><creator>CLEMENTE, Pere</creator><creator>DURAN, Vicente</creator><creator>TORRES-COMPANY, Victor</creator><creator>TAJAHUERCE, Enrique</creator><creator>LANCIS, Jesús</creator><general>Optical Society of America</general><scope>IQODW</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope></search><sort><creationdate>20100715</creationdate><title>Optical encryption based on computational ghost imaging</title><author>CLEMENTE, Pere ; DURAN, Vicente ; TORRES-COMPANY, Victor ; TAJAHUERCE, Enrique ; LANCIS, Jesús</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-f62658c2e991de9635837c877adb7ad15e69f388631a2b1a9cd5f28f45e2953</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Exact sciences and technology</topic><topic>Fundamental areas of phenomenology (including applications)</topic><topic>Optics</topic><topic>Physics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>CLEMENTE, Pere</creatorcontrib><creatorcontrib>DURAN, Vicente</creatorcontrib><creatorcontrib>TORRES-COMPANY, Victor</creatorcontrib><creatorcontrib>TAJAHUERCE, Enrique</creatorcontrib><creatorcontrib>LANCIS, Jesús</creatorcontrib><collection>Pascal-Francis</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><jtitle>Optics letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>CLEMENTE, Pere</au><au>DURAN, Vicente</au><au>TORRES-COMPANY, Victor</au><au>TAJAHUERCE, Enrique</au><au>LANCIS, Jesús</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optical encryption based on computational ghost imaging</atitle><jtitle>Optics letters</jtitle><addtitle>Opt Lett</addtitle><date>2010-07-15</date><risdate>2010</risdate><volume>35</volume><issue>14</issue><spage>2391</spage><epage>2393</epage><pages>2391-2393</pages><issn>0146-9592</issn><eissn>1539-4794</eissn><coden>OPLEDP</coden><abstract>Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.</abstract><cop>Washington, DC</cop><pub>Optical Society of America</pub><pmid>20634840</pmid><doi>10.1364/ol.35.002391</doi><tpages>3</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0146-9592
ispartof Optics letters, 2010-07, Vol.35 (14), p.2391-2393
issn 0146-9592
1539-4794
language eng
recordid cdi_proquest_miscellaneous_733986476
source Optica Publishing Group Journals
subjects Exact sciences and technology
Fundamental areas of phenomenology (including applications)
Optics
Physics
title Optical encryption based on computational ghost imaging
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T02%3A22%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optical%20encryption%20based%20on%20computational%20ghost%20imaging&rft.jtitle=Optics%20letters&rft.au=CLEMENTE,%20Pere&rft.date=2010-07-15&rft.volume=35&rft.issue=14&rft.spage=2391&rft.epage=2393&rft.pages=2391-2393&rft.issn=0146-9592&rft.eissn=1539-4794&rft.coden=OPLEDP&rft_id=info:doi/10.1364/ol.35.002391&rft_dat=%3Cproquest_cross%3E733986476%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=733986476&rft_id=info:pmid/20634840&rfr_iscdi=true