Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/55476
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Electronic and Information Engineering-
dc.creatorWang, X-
dc.creatorChen, W-
dc.creatorMei, S-
dc.creatorChen, X-
dc.date.accessioned2016-09-07T02:21:58Z-
dc.date.available2016-09-07T02:21:58Z-
dc.identifier.urihttp://hdl.handle.net/10397/55476-
dc.language.isoenen_US
dc.publisherNature Publishing Groupen_US
dc.rightsThis work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/en_US
dc.rightsThe following publication Wang, X., Chen, W., Mei, S. et al. Optically secured information retrieval using two authenticated phase-only masks. Sci Rep 5, 15668 (2015) is available at https://dx.doi.org/10.1038/srep15668en_US
dc.titleOptically secured information retrieval using two authenticated phase-only masksen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume5-
dc.identifier.doi10.1038/srep15668-
dcterms.abstractWe propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationScientific reports, 23 2015, v. 5, no. , p. 1-9-
dcterms.isPartOfScientific reports-
dcterms.issued2015-
dc.identifier.scopus2-s2.0-84945267571-
dc.identifier.eissn2045-2322-
dc.identifier.rosgroupid2015002827-
dc.description.ros2015-2016 > Academic research: refereed > Publication in refereed journal-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_IR/PIRAen_US
dc.description.pubStatusPublisheden_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Wang_Optically_Secured_Information.pdf3.56 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

142
Last Week
1
Last month
Citations as of Apr 21, 2024

Downloads

53
Citations as of Apr 21, 2024

SCOPUSTM   
Citations

34
Last Week
0
Last month
Citations as of Apr 19, 2024

WEB OF SCIENCETM
Citations

31
Last Week
0
Last month
Citations as of Apr 25, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.