An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly. as described in most conventional authentication methods. the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. https://www.lightemupsequences.com/hot-mega-Esko-Nexus-HeightMaster-Vented-Safety-Helmet-big-savings/