鬼影成像
计算机科学
认证(法律)
探测器
计算机视觉
人工智能
极限(数学)
理论(学习稳定性)
方案(数学)
迭代重建
光学
算法
物理
数学
电信
计算机安全
数学分析
机器学习
作者
Jialin Zhang,Dan Zhao,Yue Li,Liu Yang,Mingze Sun,Xinjia Li,Zhan Yu,Xin Zhou
出处
期刊:Applied Optics
[Optica Publishing Group]
日期:2023-09-18
卷期号:62 (29): 7678-7678
被引量:2
摘要
Ghost imaging technology has a great application potential in optical security because of its non-local characteristics. In this paper, on the basis of computational ghost imaging, an optical authentication scheme is proposed that utilizes the correspondence imaging technique for the preliminary reconstruction of the object image, and then authenticates the image by a nonlinear correlation algorithm. Different from the previous optical authentication schemes that usually adopted random selection of measurements, this authentication method consciously selects the bucket detector measurement values with large fluctuation and can achieve authentication using ultra-low data volumes less than 1% of the Nyquist limit. In brief, this scheme is easy to implement and has a simpler algorithm and higher stability, which is a tremendous advantage in practical optical authentication systems. The simulation and physical experimental results demonstrate the feasibility of the scheme.
科研通智能强力驱动
Strongly Powered by AbleSci AI