Fig. 3: Experimental results. | Nature Communications

Fig. 3: Experimental results.

From: Large-scale scattering-augmented optical encryption

Fig. 3

a Prepared plaintext targets. b Security keys are used for encryption. c Real and imaginary components of the calibrated scattering layer. d Ciphertexts for the amplitude and phase USAF targets. e Decryption times (in seconds) of the decryption algorithms. The first three elements are the running time of the reported algorithms under different compression ratios and recovery sizes. fg Decryption results of the amplitude and phase targets under different compression ratios θ and the number of intensity-only images P. Additional results can be found in Supplementary Note 6.

Back to article page