D. J. Guan, Y. J. Wang, and E. S. Zhang, “Quantum key evolution and its applications,” Int. J. Quantum Inform. 10, 1250044 (2012).

[CrossRef]

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101, 101108 (2012).

[CrossRef]

G. Brida, M. V. Chekhova, G. A. Fornaro, M. Genovese, E. D. Lopaeva, and I. R. Berchera, “Systematic analysis of signal-to-noise ratio in bipartite ghost imaging with classical and quantum light,” Phys. Rev. A 83, 063807 (2011).

[CrossRef]

F. Ferri, D. Magatti, L. A. Lugiato, and A. Gatti, “Differential ghost imaging,” Phys. Rev. Lett. 104, 253603 (2010).

[CrossRef]

P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lanci, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[CrossRef]

O. Katz, Y. Bromberg, and Y. Silberberg, “Compressive ghost imaging,” Appl. Phys. Lett. 95, 131110 (2009).

[CrossRef]

M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25(2), 83–91 (2008).

[CrossRef]

W. L. Chan, K. Charan, D. Takhar, K. F. Kelly, R. G. Baraniuk, and D. M. Mittleman, “A single-pixel terahertz imaging system based on compressed sensing,” Appl. Phys. Lett. 93, 121105 (2008).

[CrossRef]

J. H. Shapiro, “Computational ghost imaging,” Phys. Rev. A 78, 061802R (2008).

[CrossRef]

B. I. Erkmen and J. H. Shapiro, “Unified theory of ghost imaging with Gaussian-state light,” Phys. Rev. A 77, 043809 (2008).

[CrossRef]

D. Donoho, “Compressed sensing,” IEEE Trans. Inf. Theory 52, 1289–1306 (2006).

[CrossRef]

D. Zhang, Y. H. Zhai, L. A. Wu, and X. H. Chen, “Correlated two-photon imaging with true thermal light,” Opt. Lett. 30, 2354–2356 (2005).

[CrossRef]

H. K. Lo, H. F. Chau, and M. Ardehali, “Efficient quantum key distribution scheme and a proof of its unconditional security,” J. Cryptol. 18, 133–165 (2005).

[CrossRef]

A. Gatti, E. Brambilla, M. Bache, and L. A. Lugiato, “Ghost imaging with thermal light: comparing entanglement and classical correlation,” Phys. Rev. Lett. 93, 093602 (2004).

[CrossRef]

W. Y. Hwang, I. G. Koh, and Y. D. Han, “Quantum cryptography without public announcement of bases,” Phys. Rev. A 244, 489–494 (1998).

T. B. Pittman, Y. H. Shih, D. V. Strekalov, and A. V. Sergienko, “Optical imaging by means of two-photon quantum entanglement,” Phys. Rev. A 52, R3429–R3432 (1995).

[CrossRef]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptol. 5, 3–28 (1992).

[CrossRef]

C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Phys. Rev. Lett. 68, 557–559 (1992).

[CrossRef]

C. H. Bennett, G. Brassard, and A. Ekert, “Quantum cryptography,” Sci. Am. 267, 50–57 (1992).

[CrossRef]

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101, 101108 (2012).

[CrossRef]

H. K. Lo, H. F. Chau, and M. Ardehali, “Efficient quantum key distribution scheme and a proof of its unconditional security,” J. Cryptol. 18, 133–165 (2005).

[CrossRef]

A. Gatti, E. Brambilla, M. Bache, and L. A. Lugiato, “Ghost imaging with thermal light: comparing entanglement and classical correlation,” Phys. Rev. Lett. 93, 093602 (2004).

[CrossRef]

W. L. Chan, K. Charan, D. Takhar, K. F. Kelly, R. G. Baraniuk, and D. M. Mittleman, “A single-pixel terahertz imaging system based on compressed sensing,” Appl. Phys. Lett. 93, 121105 (2008).

[CrossRef]

M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25(2), 83–91 (2008).

[CrossRef]

C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Phys. Rev. Lett. 68, 557–559 (1992).

[CrossRef]

C. H. Bennett, G. Brassard, and A. Ekert, “Quantum cryptography,” Sci. Am. 267, 50–57 (1992).

[CrossRef]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptol. 5, 3–28 (1992).

[CrossRef]

C. H. Bennett and G. Brassard, “Quantum cryptography: public-key distribution and coin tossing,” in Proc. ICCSSP, Bangalore, India, 1984, pp. 175–179.

G. Brida, M. V. Chekhova, G. A. Fornaro, M. Genovese, E. D. Lopaeva, and I. R. Berchera, “Systematic analysis of signal-to-noise ratio in bipartite ghost imaging with classical and quantum light,” Phys. Rev. A 83, 063807 (2011).

[CrossRef]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptol. 5, 3–28 (1992).

[CrossRef]

A. Gatti, E. Brambilla, M. Bache, and L. A. Lugiato, “Ghost imaging with thermal light: comparing entanglement and classical correlation,” Phys. Rev. Lett. 93, 093602 (2004).

[CrossRef]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptol. 5, 3–28 (1992).

[CrossRef]

C. H. Bennett, G. Brassard, and A. Ekert, “Quantum cryptography,” Sci. Am. 267, 50–57 (1992).

[CrossRef]

C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Phys. Rev. Lett. 68, 557–559 (1992).

[CrossRef]

C. H. Bennett and G. Brassard, “Quantum cryptography: public-key distribution and coin tossing,” in Proc. ICCSSP, Bangalore, India, 1984, pp. 175–179.

G. Brida, M. V. Chekhova, G. A. Fornaro, M. Genovese, E. D. Lopaeva, and I. R. Berchera, “Systematic analysis of signal-to-noise ratio in bipartite ghost imaging with classical and quantum light,” Phys. Rev. A 83, 063807 (2011).

[CrossRef]

O. Katz, Y. Bromberg, and Y. Silberberg, “Compressive ghost imaging,” Appl. Phys. Lett. 95, 131110 (2009).

[CrossRef]

E. J. Candès, “Compressive sampling,” in Proceedings of the International Congress of Mathematics (European Mathematical Society, 2006), Vol. 3, p. 1433.

W. L. Chan, K. Charan, D. Takhar, K. F. Kelly, R. G. Baraniuk, and D. M. Mittleman, “A single-pixel terahertz imaging system based on compressed sensing,” Appl. Phys. Lett. 93, 121105 (2008).

[CrossRef]

W. L. Chan, K. Charan, D. Takhar, K. F. Kelly, R. G. Baraniuk, and D. M. Mittleman, “A single-pixel terahertz imaging system based on compressed sensing,” Appl. Phys. Lett. 93, 121105 (2008).

[CrossRef]

H. K. Lo, H. F. Chau, and M. Ardehali, “Efficient quantum key distribution scheme and a proof of its unconditional security,” J. Cryptol. 18, 133–165 (2005).

[CrossRef]

G. Brida, M. V. Chekhova, G. A. Fornaro, M. Genovese, E. D. Lopaeva, and I. R. Berchera, “Systematic analysis of signal-to-noise ratio in bipartite ghost imaging with classical and quantum light,” Phys. Rev. A 83, 063807 (2011).

[CrossRef]

M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25(2), 83–91 (2008).

[CrossRef]

D. Donoho, “Compressed sensing,” IEEE Trans. Inf. Theory 52, 1289–1306 (2006).

[CrossRef]

M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25(2), 83–91 (2008).

[CrossRef]

C. H. Bennett, G. Brassard, and A. Ekert, “Quantum cryptography,” Sci. Am. 267, 50–57 (1992).

[CrossRef]

B. I. Erkmen and J. H. Shapiro, “Unified theory of ghost imaging with Gaussian-state light,” Phys. Rev. A 77, 043809 (2008).

[CrossRef]

F. Ferri, D. Magatti, L. A. Lugiato, and A. Gatti, “Differential ghost imaging,” Phys. Rev. Lett. 104, 253603 (2010).

[CrossRef]

G. Brida, M. V. Chekhova, G. A. Fornaro, M. Genovese, E. D. Lopaeva, and I. R. Berchera, “Systematic analysis of signal-to-noise ratio in bipartite ghost imaging with classical and quantum light,” Phys. Rev. A 83, 063807 (2011).

[CrossRef]

F. Ferri, D. Magatti, L. A. Lugiato, and A. Gatti, “Differential ghost imaging,” Phys. Rev. Lett. 104, 253603 (2010).

[CrossRef]

A. Gatti, E. Brambilla, M. Bache, and L. A. Lugiato, “Ghost imaging with thermal light: comparing entanglement and classical correlation,” Phys. Rev. Lett. 93, 093602 (2004).

[CrossRef]

G. Brida, M. V. Chekhova, G. A. Fornaro, M. Genovese, E. D. Lopaeva, and I. R. Berchera, “Systematic analysis of signal-to-noise ratio in bipartite ghost imaging with classical and quantum light,” Phys. Rev. A 83, 063807 (2011).

[CrossRef]

D. J. Guan, Y. J. Wang, and E. S. Zhang, “Quantum key evolution and its applications,” Int. J. Quantum Inform. 10, 1250044 (2012).

[CrossRef]

W. Y. Hwang, I. G. Koh, and Y. D. Han, “Quantum cryptography without public announcement of bases,” Phys. Rev. A 244, 489–494 (1998).

W. Y. Hwang, I. G. Koh, and Y. D. Han, “Quantum cryptography without public announcement of bases,” Phys. Rev. A 244, 489–494 (1998).

O. Katz, Y. Bromberg, and Y. Silberberg, “Compressive ghost imaging,” Appl. Phys. Lett. 95, 131110 (2009).

[CrossRef]

W. L. Chan, K. Charan, D. Takhar, K. F. Kelly, R. G. Baraniuk, and D. M. Mittleman, “A single-pixel terahertz imaging system based on compressed sensing,” Appl. Phys. Lett. 93, 121105 (2008).

[CrossRef]

M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25(2), 83–91 (2008).

[CrossRef]

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101, 101108 (2012).

[CrossRef]

W. Y. Hwang, I. G. Koh, and Y. D. Han, “Quantum cryptography without public announcement of bases,” Phys. Rev. A 244, 489–494 (1998).

M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25(2), 83–91 (2008).

[CrossRef]

C. B. Li, “An efficient algorithm for total variation regularization with applications to the single pixel camera and compressive sensing,” Masters of Science thesis (Rice University, 2010).

H. K. Lo, H. F. Chau, and M. Ardehali, “Efficient quantum key distribution scheme and a proof of its unconditional security,” J. Cryptol. 18, 133–165 (2005).

[CrossRef]

G. Brida, M. V. Chekhova, G. A. Fornaro, M. Genovese, E. D. Lopaeva, and I. R. Berchera, “Systematic analysis of signal-to-noise ratio in bipartite ghost imaging with classical and quantum light,” Phys. Rev. A 83, 063807 (2011).

[CrossRef]

F. Ferri, D. Magatti, L. A. Lugiato, and A. Gatti, “Differential ghost imaging,” Phys. Rev. Lett. 104, 253603 (2010).

[CrossRef]

A. Gatti, E. Brambilla, M. Bache, and L. A. Lugiato, “Ghost imaging with thermal light: comparing entanglement and classical correlation,” Phys. Rev. Lett. 93, 093602 (2004).

[CrossRef]

F. Ferri, D. Magatti, L. A. Lugiato, and A. Gatti, “Differential ghost imaging,” Phys. Rev. Lett. 104, 253603 (2010).

[CrossRef]

C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Phys. Rev. Lett. 68, 557–559 (1992).

[CrossRef]

W. L. Chan, K. Charan, D. Takhar, K. F. Kelly, R. G. Baraniuk, and D. M. Mittleman, “A single-pixel terahertz imaging system based on compressed sensing,” Appl. Phys. Lett. 93, 121105 (2008).

[CrossRef]

T. B. Pittman, Y. H. Shih, D. V. Strekalov, and A. V. Sergienko, “Optical imaging by means of two-photon quantum entanglement,” Phys. Rev. A 52, R3429–R3432 (1995).

[CrossRef]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptol. 5, 3–28 (1992).

[CrossRef]

T. B. Pittman, Y. H. Shih, D. V. Strekalov, and A. V. Sergienko, “Optical imaging by means of two-photon quantum entanglement,” Phys. Rev. A 52, R3429–R3432 (1995).

[CrossRef]

J. H. Shapiro, “Computational ghost imaging,” Phys. Rev. A 78, 061802R (2008).

[CrossRef]

B. I. Erkmen and J. H. Shapiro, “Unified theory of ghost imaging with Gaussian-state light,” Phys. Rev. A 77, 043809 (2008).

[CrossRef]

T. B. Pittman, Y. H. Shih, D. V. Strekalov, and A. V. Sergienko, “Optical imaging by means of two-photon quantum entanglement,” Phys. Rev. A 52, R3429–R3432 (1995).

[CrossRef]

O. Katz, Y. Bromberg, and Y. Silberberg, “Compressive ghost imaging,” Appl. Phys. Lett. 95, 131110 (2009).

[CrossRef]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptol. 5, 3–28 (1992).

[CrossRef]

T. B. Pittman, Y. H. Shih, D. V. Strekalov, and A. V. Sergienko, “Optical imaging by means of two-photon quantum entanglement,” Phys. Rev. A 52, R3429–R3432 (1995).

[CrossRef]

M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25(2), 83–91 (2008).

[CrossRef]

M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25(2), 83–91 (2008).

[CrossRef]

W. L. Chan, K. Charan, D. Takhar, K. F. Kelly, R. G. Baraniuk, and D. M. Mittleman, “A single-pixel terahertz imaging system based on compressed sensing,” Appl. Phys. Lett. 93, 121105 (2008).

[CrossRef]

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101, 101108 (2012).

[CrossRef]

J. Walker, “Ent: a pseudorandom number sequence test program,” Tech. Rep. (1998), http://www.fourmilab.ch/random .

D. J. Guan, Y. J. Wang, and E. S. Zhang, “Quantum key evolution and its applications,” Int. J. Quantum Inform. 10, 1250044 (2012).

[CrossRef]

S. Li, X. R. Yao, W. K. Yu, L. A. Wu, and G. J. Zhai, “High-speed secure key distribution over an optical network based on computational correlation imaging,” Opt. Lett. 38, 2144–2146 (2013).

[CrossRef]

D. Zhang, Y. H. Zhai, L. A. Wu, and X. H. Chen, “Correlated two-photon imaging with true thermal light,” Opt. Lett. 30, 2354–2356 (2005).

[CrossRef]

D. J. Guan, Y. J. Wang, and E. S. Zhang, “Quantum key evolution and its applications,” Int. J. Quantum Inform. 10, 1250044 (2012).

[CrossRef]

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101, 101108 (2012).

[CrossRef]

W. L. Chan, K. Charan, D. Takhar, K. F. Kelly, R. G. Baraniuk, and D. M. Mittleman, “A single-pixel terahertz imaging system based on compressed sensing,” Appl. Phys. Lett. 93, 121105 (2008).

[CrossRef]

O. Katz, Y. Bromberg, and Y. Silberberg, “Compressive ghost imaging,” Appl. Phys. Lett. 95, 131110 (2009).

[CrossRef]

M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25(2), 83–91 (2008).

[CrossRef]

D. Donoho, “Compressed sensing,” IEEE Trans. Inf. Theory 52, 1289–1306 (2006).

[CrossRef]

D. J. Guan, Y. J. Wang, and E. S. Zhang, “Quantum key evolution and its applications,” Int. J. Quantum Inform. 10, 1250044 (2012).

[CrossRef]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptol. 5, 3–28 (1992).

[CrossRef]

H. K. Lo, H. F. Chau, and M. Ardehali, “Efficient quantum key distribution scheme and a proof of its unconditional security,” J. Cryptol. 18, 133–165 (2005).

[CrossRef]

D. Zhang, Y. H. Zhai, L. A. Wu, and X. H. Chen, “Correlated two-photon imaging with true thermal light,” Opt. Lett. 30, 2354–2356 (2005).

[CrossRef]

P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lanci, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[CrossRef]

S. Li, X. R. Yao, W. K. Yu, L. A. Wu, and G. J. Zhai, “High-speed secure key distribution over an optical network based on computational correlation imaging,” Opt. Lett. 38, 2144–2146 (2013).

[CrossRef]

W. Y. Hwang, I. G. Koh, and Y. D. Han, “Quantum cryptography without public announcement of bases,” Phys. Rev. A 244, 489–494 (1998).

T. B. Pittman, Y. H. Shih, D. V. Strekalov, and A. V. Sergienko, “Optical imaging by means of two-photon quantum entanglement,” Phys. Rev. A 52, R3429–R3432 (1995).

[CrossRef]

B. I. Erkmen and J. H. Shapiro, “Unified theory of ghost imaging with Gaussian-state light,” Phys. Rev. A 77, 043809 (2008).

[CrossRef]

G. Brida, M. V. Chekhova, G. A. Fornaro, M. Genovese, E. D. Lopaeva, and I. R. Berchera, “Systematic analysis of signal-to-noise ratio in bipartite ghost imaging with classical and quantum light,” Phys. Rev. A 83, 063807 (2011).

[CrossRef]

J. H. Shapiro, “Computational ghost imaging,” Phys. Rev. A 78, 061802R (2008).

[CrossRef]

A. Gatti, E. Brambilla, M. Bache, and L. A. Lugiato, “Ghost imaging with thermal light: comparing entanglement and classical correlation,” Phys. Rev. Lett. 93, 093602 (2004).

[CrossRef]

C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Phys. Rev. Lett. 68, 557–559 (1992).

[CrossRef]

F. Ferri, D. Magatti, L. A. Lugiato, and A. Gatti, “Differential ghost imaging,” Phys. Rev. Lett. 104, 253603 (2010).

[CrossRef]

C. H. Bennett, G. Brassard, and A. Ekert, “Quantum cryptography,” Sci. Am. 267, 50–57 (1992).

[CrossRef]

C. B. Li, “An efficient algorithm for total variation regularization with applications to the single pixel camera and compressive sensing,” Masters of Science thesis (Rice University, 2010).

J. Walker, “Ent: a pseudorandom number sequence test program,” Tech. Rep. (1998), http://www.fourmilab.ch/random .

Texas Instruments., “DLP 0.95 1080p type A DMD (Rev. B),” Tech. Rep. (2013), http://www.ti.com/lit/ds/dlps025b/dlps025b.pdf .

Texas Instruments, “DLP discovery 4100 chipset data sheet (Rev. A),” Tech. Rep. (2013), http://www.ti.com/lit/er/dlpu008a/dlpu008a.pdf .

E. J. Candès, “Compressive sampling,” in Proceedings of the International Congress of Mathematics (European Mathematical Society, 2006), Vol. 3, p. 1433.

C. H. Bennett and G. Brassard, “Quantum cryptography: public-key distribution and coin tossing,” in Proc. ICCSSP, Bangalore, India, 1984, pp. 175–179.