Multi‐image encryption and authentication using computational ghost imaging and singular value decomposition

Abstract The non‐local imaging characteristics of computational ghost imaging (CGI) make it widely used in the field of information security. However, the information processing method based on traditional CGI has some problems in the process of multi‐image encryption, such as low efficiency and uns...

Full description

Saved in:
Bibliographic Details
Main Authors: Hong Huang, ZhiGuang Han
Format: Article
Language:English
Published: Wiley 2024-11-01
Series:IET Image Processing
Subjects:
Online Access:https://doi.org/10.1049/ipr2.13214
Tags: Add Tag
No Tags, Be the first to tag this record!