Abstract
Ghost imaging technology has a great application potential in optical security because of its non-local characteristics. In this paper, on the basis of computational ghost imaging, an optical authentication scheme is proposed that utilizes the correspondence imaging technique for the preliminary reconstruction of the object image, and then authenticates the image by a nonlinear correlation algorithm. Different from the previous optical authentication schemes that usually adopted random selection of measurements, this authentication method consciously selects the bucket detector measurement values with large fluctuation and can achieve authentication using ultra-low data volumes less than 1% of the Nyquist limit. In brief, this scheme is easy to implement and has a simpler algorithm and higher stability, which is a tremendous advantage in practical optical authentication systems. The simulation and physical experimental results demonstrate the feasibility of the scheme.
© 2023 Optica Publishing Group
Full Article | PDF ArticleMore Like This
Lin Zhang, Xiaogang Wang, Qingming Zhou, Jidong Xue, and Bijun Xu
Opt. Express 32(3) 4242-4253 (2024)
Zhipeng Chen, Jianhong Shi, and Guihua Zeng
Appl. Opt. 55(30) 8644-8650 (2016)
Yaoling Zhou, Yueer Sun, Mu Yang, Bei Zhou, Junzhao Hou, Tianyu Zeng, Zhaolin Xiao, and Liansheng Sui
Opt. Express 31(13) 20887-20904 (2023)