Publications by authors named "Junzhao Hou"

Article Synopsis
  • The proposed method uses computational ghost imaging and total-variation minimization to create an optical system for authenticating multiple images while keeping them concealed in a cover image.* -
  • Instead of directly encrypting images into ciphertext, the images are encoded into real-valued sequences and hidden within sub-images derived from a cover image through wavelet transform.* -
  • The process includes random embedding of these sequences and enhances security by scrambling data with a chaotic sequence generated from a logistic map, allowing for high-quality recovery of the original images.*
View Article and Find Full Text PDF

An optical security method for multiple-image authentication is proposed based on computational ghost imaging and hybrid non-convex second-order total variation. Firstly, each original image to be authenticated is encoded to the sparse information using computational ghost imaging, where illumination patterns are generated based on Hadamard matrix. In the same time, the cover image is divided into four sub-images with wavelet transform.

View Article and Find Full Text PDF