Sixing Xi
YOU?
Author Swipe
View article: Hybrid watermarking and encryption techniques for securing three-dimensional information
Hybrid watermarking and encryption techniques for securing three-dimensional information Open
A hybrid digital watermarking and encryption technique based on the Computer Generated Holography (CGH) and fractional Fourier transform (FRFT) combined with singular value decomposition (SVD) algorithm is proposed for securing three-dimen…
View article: Generation and characteristics of hollow structured optical fields based on multiple off-axis vortices
Generation and characteristics of hollow structured optical fields based on multiple off-axis vortices Open
In this paper, various hollow structured optical fields are generated by skillfully adjusting the number and positions of multiple off-axis vortices loaded in a Gaussian beam. The focal-field characteristics of the generated hollow structu…
View article: Underwater polarization imaging for visibility enhancement of moving targets in turbid environments
Underwater polarization imaging for visibility enhancement of moving targets in turbid environments Open
Polarization imaging techniques have more prominent advantages for imaging in strongly scattered media. Previous de-scattering methods of polarization imaging usually require the priori information of the background region, and rarely cons…
View article: In depth learning based method of denoising joint transform correlator optical image encryption system
In depth learning based method of denoising joint transform correlator optical image encryption system Open
There is serious noise interference in the decryption process of the joint transform correlator (JTC) optical encryption system, so the quality of the decrypted image cannot meet the accuracy requirements in most cases. The quality of decr…
View article: Distinguishing between halogenated alkanes containing the same halogen based on the reaction kinetic parameter using negative ion mobility spectrometry at atmospheric pressure
Distinguishing between halogenated alkanes containing the same halogen based on the reaction kinetic parameter using negative ion mobility spectrometry at atmospheric pressure Open
Electron attachment ionization ion mobility spectrometry can be used to detect halogen-containing volatile organic compounds with high sensitivity.
View article: Color image encryption method based on computer generated hologram and <i>θ</i> modulation
Color image encryption method based on computer generated hologram and <i>θ</i> modulation Open
In this paper, a new method of encrypting a color image based on θ modulation is proposed by using the tricolor principle and computer-generated hologram (CGH) technology. The encryption process includes the θ-modulated three…
View article: Multiple-image encryption method based on spatial angle multiplexing and double random phase encoding
Multiple-image encryption method based on spatial angle multiplexing and double random phase encoding Open
An optical encryption method of multiple-image based on spatial angle multiplexing and double random phase encoding is proposed in this paper. In the encryption process, firstly the original images are modulated by random phase in Fresnel …
View article: Self-assembled MoS<sub>2</sub>/rGO nanocomposites with tunable UV-IR absorption
Self-assembled MoS<sub>2</sub>/rGO nanocomposites with tunable UV-IR absorption Open
MoS2/rGO layered nanocomposites synthesized by hydrothermal process exhibit a wide UV-IR absorption in the wavelength range from 280 to 973 nm, which is attractive for highly efficient multiband solar cells and advanced photonic…
View article: Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram
Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram Open
Optical image encryption, especially double-random-phase-based, is of great interest in information security. In this work, we experimentally demonstrate the security and feasibility of optical image encryption with asymmetric double rando…
View article: Generation of arbitrary vector beam based on optical holography
Generation of arbitrary vector beam based on optical holography Open
According to the phase and amplitude modulation of the spatial light modulator (SLM) loading the phase distribution for generating arbitrary vector beams, we present a method of generating arbitrary vector beams based on the optical hologr…
View article: Generation of vector beams in terms of the partial light modulator of a twisted nematic liquid crystal
Generation of vector beams in terms of the partial light modulator of a twisted nematic liquid crystal Open
We propose a vector beam generation method based on the spatial light modulator composed of twisted nematic liquid crystal. According to the relation between the rotation angle and the applied voltage on the spatial light modulator, a comm…
View article: Single-slit diffraction of the arbitrary vector beams
Single-slit diffraction of the arbitrary vector beams Open
We present the single-slit diffraction of the arbitrary vector fields with different parameters m, n, and φ 0 theoretically and experimentally.The single slit covers the polarization singularity in the center and therefore the influence of…