[1] REFREGIER P, JAVIDI B. Optical image encryption based on in- put plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(3):767-769.
[2] UNNIKRISHNAN G, JOSEPH J. Optical encryption system that uses phase conjugation in a photorefractive crystal[J]. Applied Optics, 1998, 37(18): 8181-8186.
[3] MATOBA O, JAVIDI B. Encrypted optical memory system using three dimensional-keys in the fresnel domain [J]. Optics Letters, 1999, 24(4): 762-764.
[4] XIAO Y L, LIU Q, YUAN Sh, et al. Study about decryption based on optical image encryption system in the Fresnel domain[J]. Laser Technology, 2009, 33(4): 433-436 (in Chinese).
[5] LIN Ch,SHEN X J, YANG Sh X. Simulation analysis of random phase mask with spatial light modulator[J]. Laser Technology, 2013, 37(3): 365-370 (in Chinese).
[6] FENG J B, ZHOU X. Random phase encoding achievement of color images under spotlight illumination[J]. Laser Technology, 2008, 32(6): 621-623 (in Chinese).
[7] LIN Ch, SHEN X J, LI Z. cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask[J]. Optics and Laser Technology, 2013,49(1):108-117.
[8] MATOBA O, JAVIDI B. Encrypted optical storage with angular multiplexing[J]. Applied Optics, 1999, 38(15): 7288-7293.
[9] SITU G H, ZHANG J. Multiple-image encryption by wavelength multiplexing[J]. Optics Letters, 2005, 30(6): 1306-1308.
[10] BARRERA J, HENAO R. Multiplexing encryption-decryption via lateral shifting of a random phase mask[J]. Optics Communications, 2006, 259(3): 532-536.
[11] BARRERA J, HENAO R. Multiplexing encrypted data by using polarized light[J]. Optics Communications,2006, 260(1): 109-112.
[12] RUEDA E, RIOS C. Experimental multiplexing approach via code key rotations under a joint transform correlator scheme[J]. Optics Communications, 2011, 284(7):2500-2504.
[13] BARRERA J, HENAO R. Multiple image encryption using an aperture-modulated optical system[J]. Optics Communications, 2006, 261(1): 29-33.
[14] SHEN X J, LIN Ch, KONG D Zh. Fresnel-transform holographic encryption based on angular ultiplexing and random-amplitude mask[J]. Optical Engineering, 2012, 51(6): 3286-3219.
[15] MUNOZ-RODRIGUEZ J A. Computational cryptography based on trigonometric algorithms and intensity superposition[J]. Imaging Science Journal, 2010, 58(2): 61-80.