• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643627)   Today's Articles (368)   Subscriber (50572)
For: Chen W, Chen X. Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. Opt Lett 2013;38:546-548. [PMID: 23455131 DOI: 10.1364/ol.38.000546] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
Number Cited by Other Article(s)
1
Zhang J, Zhao D, Li Y, Liu Y, Sun M, Li X, Yu Z, Zhou X. Optical authentication method based on correspondence ghost imaging. APPLIED OPTICS 2023;62:7678-7688. [PMID: 37855475 DOI: 10.1364/ao.501263] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/24/2023] [Accepted: 09/17/2023] [Indexed: 10/20/2023]
2
Cao JN, Zuo YH, Wang HH, Feng WD, Yang ZX, Ma J, Du HR, Gao L, Zhang Z. Single-pixel neural network object classification of sub-Nyquist ghost imaging. APPLIED OPTICS 2021;60:9180-9187. [PMID: 34624000 DOI: 10.1364/ao.438392] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/21/2021] [Accepted: 09/14/2021] [Indexed: 06/13/2023]
3
Xiao Y, Zhou L, Chen W. Optical information authentication using phase-only patterns with single-pixel optical detection. APPLIED OPTICS 2021;60:B1-B7. [PMID: 33798130 DOI: 10.1364/ao.414419] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/13/2020] [Accepted: 12/21/2020] [Indexed: 06/12/2023]
4
Yuan S, Wang L, Liu X, Zhou X. Forgery attack on optical encryption based on computational ghost imaging. OPTICS LETTERS 2020;45:3917-3920. [PMID: 32667318 DOI: 10.1364/ol.392424] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/10/2020] [Accepted: 06/15/2020] [Indexed: 06/11/2023]
5
Rizvi S, Cao J, Zhang K, Hao Q. DeepGhost: real-time computational ghost imaging via deep learning. Sci Rep 2020;10:11400. [PMID: 32647246 PMCID: PMC7347564 DOI: 10.1038/s41598-020-68401-8] [Citation(s) in RCA: 24] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/03/2020] [Accepted: 05/21/2020] [Indexed: 11/09/2022]  Open
6
Xiao Y, Zhou L, Chen W. Experimental demonstration of ghost-imaging-based authentication in scattering media. OPTICS EXPRESS 2019;27:20558-20566. [PMID: 31510147 DOI: 10.1364/oe.27.020558] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/24/2019] [Accepted: 05/30/2019] [Indexed: 06/10/2023]
7
Study on the performance of three-dimensional ghost image affected by target. Pattern Recognit Lett 2019. [DOI: 10.1016/j.patrec.2019.06.014] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
8
Liansheng S, Jiahao W, Ailing T, Asundi A. Optical image hiding under framework of computational ghost imaging based on an expansion strategy. OPTICS EXPRESS 2019;27:7213-7225. [PMID: 30876289 DOI: 10.1364/oe.27.007213] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/18/2018] [Accepted: 02/18/2019] [Indexed: 06/09/2023]
9
Klein Y, Schori A, Dolbnya IP, Sawhney K, Shwartz S. X-ray computational ghost imaging with single-pixel detector. OPTICS EXPRESS 2019;27:3284-3293. [PMID: 30732352 DOI: 10.1364/oe.27.003284] [Citation(s) in RCA: 17] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/06/2023]
10
Chen W. Computer-generated hologram marked by correlated photon imaging. APPLIED OPTICS 2018;57:1196-1201. [PMID: 29469864 DOI: 10.1364/ao.57.001196] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2017] [Accepted: 01/11/2018] [Indexed: 06/08/2023]
11
Chen W. Computer-generated hologram using binary phase with an aperture. APPLIED OPTICS 2017;56:9126-9131. [PMID: 29131203 DOI: 10.1364/ao.56.009126] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/07/2017] [Accepted: 10/17/2017] [Indexed: 06/07/2023]
12
Chen W. Ghost identification based on single-pixel imaging in big data environment. OPTICS EXPRESS 2017;25:16509-16516. [PMID: 28789154 DOI: 10.1364/oe.25.016509] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/24/2017] [Accepted: 05/18/2017] [Indexed: 06/07/2023]
13
Liu J, Zhou Y, Zheng H, Chen H, Li FL, Xu Z. Studying fermionic ghost imaging with independent photons. OPTICS EXPRESS 2016;24:29226-29236. [PMID: 27958584 DOI: 10.1364/oe.24.029226] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
14
Chen Z, Shi J, Zeng G. Object authentication based on compressive ghost imaging. APPLIED OPTICS 2016;55:8644-8650. [PMID: 27828147 DOI: 10.1364/ao.55.008644] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
15
Chen W, Chen X. Digital holography-secured scheme using only binary phase or amplitude as ciphertext. APPLIED OPTICS 2016;55:6740-6746. [PMID: 27556997 DOI: 10.1364/ao.55.006740] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
16
Moon I, Yi F, Han M, Lee J. Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms. APPLIED OPTICS 2016;55:4328-4335. [PMID: 27411183 DOI: 10.1364/ao.55.004328] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
17
Spectral Camera based on Ghost Imaging via Sparsity Constraints. Sci Rep 2016;6:25718. [PMID: 27180619 PMCID: PMC4867594 DOI: 10.1038/srep25718] [Citation(s) in RCA: 47] [Impact Index Per Article: 5.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/04/2015] [Accepted: 04/20/2016] [Indexed: 11/24/2022]  Open
18
Xue YL, Wan RG, Feng F, Zhang TY. Standoff two-color quantum ghost imaging through turbulence. APPLIED OPTICS 2014;53:3035-3042. [PMID: 24922023 DOI: 10.1364/ao.53.003035] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/28/2014] [Accepted: 04/03/2014] [Indexed: 06/03/2023]
19
Fan D, Meng X, Wang Y, Yang X, Peng X, He W, Dong G, Chen H. Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. APPLIED OPTICS 2013;52:5645-5652. [PMID: 23938413 DOI: 10.1364/ao.52.005645] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/29/2013] [Accepted: 07/12/2013] [Indexed: 06/02/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA