Multi‐image encryption and authentication using computational ghost imaging and singular value decomposition
Abstract The non‐local imaging characteristics of computational ghost imaging (CGI) make it widely used in the field of information security. However, the information processing method based on traditional CGI has some problems in the process of multi‐image encryption, such as low efficiency and uns...
Saved in:
| Main Authors: | Hong Huang, ZhiGuang Han |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2024-11-01
|
| Series: | IET Image Processing |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ipr2.13214 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Computational Ghost Imaging With Bessel Beam for Axial Objects
by: Jingjing Wu, et al.
Published: (2024-01-01) -
Hiding image with inception transformer
by: Yunyun Dong, et al.
Published: (2024-11-01) -
Packet-loss robust scalable authentication algorithm for compressed image streaming
by: Xiao-wei YI, et al.
Published: (2014-04-01) -
Accelerated decoding method in fractal image coding
by: Qiang Wang
Published: (2024-12-01) -
Simulation‐Training‐Based Deep Learning Approach to Microscopic Ghost Imaging
by: Binyu Li, et al.
Published: (2024-12-01)