Multi‐image encryption and authentication using computational ghost imaging and singular value decomposition
Abstract The non‐local imaging characteristics of computational ghost imaging (CGI) make it widely used in the field of information security. However, the information processing method based on traditional CGI has some problems in the process of multi‐image encryption, such as low efficiency and uns...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-11-01
|
Series: | IET Image Processing |
Subjects: | |
Online Access: | https://doi.org/10.1049/ipr2.13214 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|