Guang-Jie Zhai

Learn More
We present an experimental demonstration of edge detection based on ghost imaging (GI) in the gradient domain. Through modification of a random light field, gradient GI (GGI) can directly give the edge of an object without needing the original image. As edges of real objects are usually sparser than the original objects, the signal-to-noise ratio (SNR) of(More)
Compressed sensing is a theory which can reconstruct an image almost perfectly with only a few measurements by finding its sparsest representation. However, the computation time consumed for large images may be a few hours or more. In this work, we both theoretically and experimentally demonstrate a method that combines the advantages of both adaptive(More)
Conventional single-pixel cameras recover images only from the data recorded in one arm of the digital micromirror device, with the light reflected to the other direction not to be collected. Actually, the sampling in these two reflection orientations is correlated with each other, in view of which we propose a sampling concept of complementary compressive(More)
We report an experimental demonstration of optical coherence tomography for transmissive objects utilizing second-order correlation ghost imaging with thermal light. To evaluate the longitudinal resolution of our system, the concept of the imaging longitudinal coherence length is introduced, which is more accurate for judging the image quality of ghost(More)
An experiment demonstrating lensless ghost imaging (GI) with sunlight has been performed. A narrow spectral line is first filtered out and its intensity correlation measured. With this true thermal light source, an object consisting of two holes is imaged. The realization of lensless GI with sunlight is a step forward toward the practical application of GI(More)
We present a protocol for an optical key distribution network based on computational correlation imaging, which can simultaneously realize privacy amplification and multiparty distribution. With current technology, the key distribution rate could reach hundreds of Mbit/s with suitable choice of parameters. The setup is simple and inexpensive, and may be(More)
We present a protocol for the amplification and distribution of a one-time-pad cryptographic key over a point-to-multipoint optical network based on computational ghost imaging (GI) and compressed sensing (CS). It is shown experimentally that CS imaging can perform faster authentication and increase the key generation rate by an order of magnitude compared(More)
We present a new technique to denoise ghost imaging (GI) in which conventional intensity correlation GI and an iteration process have been combined to give an accurate estimate of the actual noise affecting image quality. The blurring influence of the speckle areas in the beam is reduced in the iteration by setting a threshold. It is shown that with an(More)
We propose an approach to generate true random number sequences based on the discretized encoding of the time interval between photons. The method is simple and efficient, and can produce a highly random sequence several times longer than that of other methods based on threshold or parity selection, without the need for hashing. A proof-of-principle(More)
A third-order double-slit interference experiment with a pseudothermal light source in the high-intensity limit has been performed by actually recording the intensities in three optical paths. It is shown that not only can the visibility be dramatically enhanced compared to the second-order case as previously theoretically predicted and shown(More)