An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly. as described in most conventional authentication methods. the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. https://www.ngetikin.com/bargain-MLB-Texas-Rangers-Alternate-Away-Jersey-iPhone-14-Pro-Clear-Case-p111023-save-big/