DC FieldValueLanguage
dc.contributorDepartment of Electronic and Information Engineering-
dc.creatorXiao, Y-
dc.creatorZhou, L-
dc.creatorChen, W-
dc.date.accessioned2021-05-13T08:32:04Z-
dc.date.available2021-05-13T08:32:04Z-
dc.identifier.issn0143-8166-
dc.identifier.urihttp://hdl.handle.net/10397/89893-
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.subjectExperimental demonstrationen_US
dc.subjectGhost holographyen_US
dc.subjectOptical authenticationen_US
dc.subjectOptical encryptionen_US
dc.subjectOptical securityen_US
dc.subjectSingle-pixel detectionen_US
dc.titleSecured single-pixel ghost holographyen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume128-
dc.identifier.doi10.1016/j.optlaseng.2020.106045-
dcterms.abstractIn this paper, we propose and experimentally demonstrate a new optical security method using single-pixel ghost holography. The plaintext is optically encoded into a series of single-pixel data using the designed single-pixel ghost holography, and then a digital hologram just before spatial light modulator (SLM) is retrieved by using a correlation algorithm with all recorded single-pixel data to be stored as a reference in a database. Subsequently, some recorded single-pixel data are randomly selected, and random amplitude-only patterns corresponding to those selected single-pixel data serve as principal security keys. Other parameters, e.g., wavelength and axial distance, can be used as additional security keys. The 1-bit quantization operation is further applied to process those randomly-selected single-pixel data in order to generate binary signals as ciphertext. Finally, different strategies are developed and applied for optical authentication of the decrypted holograms or decrypted objects. Numerical analyses and optical experiments demonstrate that the proposed method possesses high security, high flexibility and high discrimination capability. It is also illustrated that the proposed method possesses high robustness against contaminations. It is believed that the proposed method can provide a promising strategy for greatly enriching optical security field.-
dcterms.accessRightsembargoed access-
dcterms.bibliographicCitationOptics and lasers in engineering, May 2020, v. 128, 106045-
dcterms.isPartOfOptics and lasers in engineering-
dcterms.issued2020-05-
dc.identifier.scopus2-s2.0-85079091516-
dc.identifier.artn106045-
dc.description.validate202105 bchy-
dc.description.oaNot applicable-
dc.identifier.FolderNumbera0739-n08-
dc.identifier.SubFormID1336-
dc.description.fundingSourceRGC-
dc.description.fundingSourceOthers-
dc.description.fundingTextRGC: 25201416-
dc.description.fundingTextOthers: R2016A030, R2016A009-
dc.description.pubStatusPublished-
dc.date.embargo2022.05.31en_US
Appears in Collections:Journal/Magazine Article
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.