123 research outputs found

    Solving Phase Retrieval with a Learned Reference

    Full text link
    Fourier phase retrieval is a classical problem that deals with the recovery of an image from the amplitude measurements of its Fourier coefficients. Conventional methods solve this problem via iterative (alternating) minimization by leveraging some prior knowledge about the structure of the unknown image. The inherent ambiguities about shift and flip in the Fourier measurements make this problem especially difficult; and most of the existing methods use several random restarts with different permutations. In this paper, we assume that a known (learned) reference is added to the signal before capturing the Fourier amplitude measurements. Our method is inspired by the principle of adding a reference signal in holography. To recover the signal, we implement an iterative phase retrieval method as an unrolled network. Then we use back propagation to learn the reference that provides us the best reconstruction for a fixed number of phase retrieval iterations. We performed a number of simulations on a variety of datasets under different conditions and found that our proposed method for phase retrieval via unrolled network and learned reference provides near-perfect recovery at fixed (small) computational cost. We compared our method with standard Fourier phase retrieval methods and observed significant performance enhancement using the learned reference.Comment: Accepted to ECCV 2020. Code is available at https://github.com/CSIPlab/learnPR_referenc

    Induction of lung lesions in Wistar rats by 4-(methylnitrosamino)-1-(3-pyridyl)-1-butanone and its inhibition by aspirin and phenethyl isothiocyanate

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The development of effective chemopreventive agents against cigarette smoke-induced lung cancer could be greatly facilitated by suitable laboratory animal models, such as animals treated with the tobacco-specific lung carcinogen 4-(methylnitrosamino)-1-(3-pyridyl)-1-butanone (NNK). In the current study, we established a novel lung cancer model in Wistar rats treated with NNK. Using this model, we assessed the effects of two chemopreventive agents, aspirin and phenethyl isothiocyanate (PEITC), on tumor progression.</p> <p>Methods</p> <p>First, rats were treated with a single-dose of NNK by intratracheal instillation; control rats received iodized oil. The animals were then sacrificed on the indicated day after drug administration and examined for tumors in the target organs. PCNA, p63 and COX-2 expression were analyzed in the preneoplastic lung lesions. Second, rats were treated with a single-dose of NNK (25 mg/kg body weight) in the absence or presence of aspirin and/or PEITC in the daily diet. The control group received only the vehicle in the regular diet. The animals were sacrificed on day 91 after bronchial instillation of NNK. Lungs were collected and processed for histopathological and immunohistochemical assays.</p> <p>Results</p> <p>NNK induced preneoplastic lesions in lungs, including 33.3% alveolar hyperplasia and 55.6% alveolar atypical dysplasia. COX-2 expression increased similarly in alveolar hyperplasia and alveolar atypical dysplasia, while PCNA expression increased more significantly in the latter than the former. No p63 expression was detected in the preneoplastic lesions. In the second study, the incidences of alveolar atypical dysplasia were reduced to 10%, 10% and 0%, respectively, in the aspirin, PEITC and aspirin and PEITC groups, compared with 62.5% in the carcinogen-treated control group. COX-2 expression decreased after dietary aspirin or aspirin and PEITC treatment. PCNA expression was significantly reduced in the aspirin and PEITC group.</p> <p>Conclusion</p> <p>(1) A single dose of 25 mg/kg body weight NNK by intratracheal instillation is sufficient to induce preneoplastic lesions in Wistar rat lungs. (2) COX-2 takes part in NNK-induced tumorigenesis but is not involved in proliferation. (3) Aspirin and PEITC have protective effects in the early stages of tumor progression initiated by NNK.</p

    Roadmap on optical security

    Get PDF
    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.Centro de Investigaciones ÓpticasConsejo Nacional de Investigaciones Científicas y Técnica

    Roadmap on optical security

    Get PDF
    Information security and authentication are important challenges facing our society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and developments of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make the information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and the challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented in the nano- or microscale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication

    Methylnitrosourea Induction of Rat Odontomas

    No full text
    corecore