“Ghost imaging is an optical technique in which the information of an object is encoded in the correlation of the intensity fluctuations of light. The computational version of this fascinating phenomenon emulates, offline, the optical propagation through the reference arm, enabling 3D visualization of a complex object whose transmitted light is measured by a bucket detector. In this Letter, we show how computational ghost imaging can be used to encrypt and transmit object information to a remote party. Important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.”
Restricted Access
You are currently viewing a placeholder content from Vimeo. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from Facebook. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from Google Maps. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from Google Maps. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from Mapbox. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from OpenStreetMap. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from X. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information