123 research outputs found
Solving Phase Retrieval with a Learned Reference
Fourier phase retrieval is a classical problem that deals with the recovery
of an image from the amplitude measurements of its Fourier coefficients.
Conventional methods solve this problem via iterative (alternating)
minimization by leveraging some prior knowledge about the structure of the
unknown image. The inherent ambiguities about shift and flip in the Fourier
measurements make this problem especially difficult; and most of the existing
methods use several random restarts with different permutations. In this paper,
we assume that a known (learned) reference is added to the signal before
capturing the Fourier amplitude measurements. Our method is inspired by the
principle of adding a reference signal in holography. To recover the signal, we
implement an iterative phase retrieval method as an unrolled network. Then we
use back propagation to learn the reference that provides us the best
reconstruction for a fixed number of phase retrieval iterations. We performed a
number of simulations on a variety of datasets under different conditions and
found that our proposed method for phase retrieval via unrolled network and
learned reference provides near-perfect recovery at fixed (small) computational
cost. We compared our method with standard Fourier phase retrieval methods and
observed significant performance enhancement using the learned reference.Comment: Accepted to ECCV 2020. Code is available at
https://github.com/CSIPlab/learnPR_referenc
Induction of lung lesions in Wistar rats by 4-(methylnitrosamino)-1-(3-pyridyl)-1-butanone and its inhibition by aspirin and phenethyl isothiocyanate
<p>Abstract</p> <p>Background</p> <p>The development of effective chemopreventive agents against cigarette smoke-induced lung cancer could be greatly facilitated by suitable laboratory animal models, such as animals treated with the tobacco-specific lung carcinogen 4-(methylnitrosamino)-1-(3-pyridyl)-1-butanone (NNK). In the current study, we established a novel lung cancer model in Wistar rats treated with NNK. Using this model, we assessed the effects of two chemopreventive agents, aspirin and phenethyl isothiocyanate (PEITC), on tumor progression.</p> <p>Methods</p> <p>First, rats were treated with a single-dose of NNK by intratracheal instillation; control rats received iodized oil. The animals were then sacrificed on the indicated day after drug administration and examined for tumors in the target organs. PCNA, p63 and COX-2 expression were analyzed in the preneoplastic lung lesions. Second, rats were treated with a single-dose of NNK (25 mg/kg body weight) in the absence or presence of aspirin and/or PEITC in the daily diet. The control group received only the vehicle in the regular diet. The animals were sacrificed on day 91 after bronchial instillation of NNK. Lungs were collected and processed for histopathological and immunohistochemical assays.</p> <p>Results</p> <p>NNK induced preneoplastic lesions in lungs, including 33.3% alveolar hyperplasia and 55.6% alveolar atypical dysplasia. COX-2 expression increased similarly in alveolar hyperplasia and alveolar atypical dysplasia, while PCNA expression increased more significantly in the latter than the former. No p63 expression was detected in the preneoplastic lesions. In the second study, the incidences of alveolar atypical dysplasia were reduced to 10%, 10% and 0%, respectively, in the aspirin, PEITC and aspirin and PEITC groups, compared with 62.5% in the carcinogen-treated control group. COX-2 expression decreased after dietary aspirin or aspirin and PEITC treatment. PCNA expression was significantly reduced in the aspirin and PEITC group.</p> <p>Conclusion</p> <p>(1) A single dose of 25 mg/kg body weight NNK by intratracheal instillation is sufficient to induce preneoplastic lesions in Wistar rat lungs. (2) COX-2 takes part in NNK-induced tumorigenesis but is not involved in proliferation. (3) Aspirin and PEITC have protective effects in the early stages of tumor progression initiated by NNK.</p
Roadmap on optical security
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.Centro de Investigaciones ÓpticasConsejo Nacional de Investigaciones Científicas y Técnica
Roadmap on optical security
Information security and authentication are important challenges facing our society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and developments of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make the information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and the challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented in the nano- or microscale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication
- …