[1] MATOBA O, JAVIDI B. Encrypted optical storage with wavelength-key and random phase codes[J]. Applied Optics, 1999, 38(32):6785-6790. doi: 10.1364/AO.38.006785
[2] MATOBA O, JAVIDI B. The keys to holographic data security[J].IEEE Circuits and Devices Magazine, 2000, 16(5):8-15. doi: 10.1109/101.876899
[3] XU G X, XU Sh Q, GUO X J, et al. Image compression-encryption algorithm combined DCT transform with DNA operation[J]. Laser Technology, 2015, 39(6):460-463(in Chinese).
[4] PAN T G, LI D Y. A novel image encryption using Arnold cat[J]. International Journal of Security and its Application, 2013, 7(5):377-386. doi: 10.14257/ijsia
[5] XI S X, WANG X L, SONG L P, et al. Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram[J]. Optics Express, 2017, 25(7):8212-8222. doi: 10.1364/OE.25.008212
[6] XIAO Y L, LIU Q, YUAN Sh. Research on optical images encryption system based on fresnel zone[J]. Laser Technology, 2009, 33(4):433-436(in Chinese).
[7] ZHANG H Zh, YAO M, LEI P. Research of image processing method of far-field laser spots[J]. Laser Technology, 2013, 37(4):460-463(in Chinese).
[8] REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(7):767-769. doi: 10.1364/OL.20.000767
[9] JAVIDI B, CARNICER A, YAMAGUCHI M, et al. Roadmap on optical security[J]. Journal of Optics, 2016, 18(8):083001. doi: 10.1088/2040-8978/18/8/083001
[10] UNNIKRISHNAN G, SINGH K. Double random fractional Fourier domain encoding for optical security[J]. Optical Engineering, 2000, 39(11):2853-2859. doi: 10.1117/1.1313498
[11] MATOBA O, JAVIDI B. Encrypted optical storage with wavelength-key and random phase codes[J]. Applied Optics, 1999, 38(32):6785-6790. doi: 10.1364/AO.38.006785
[12] GOODMAN J W, LAWRENCE R W. Digital image formation from electronically detected holograms[J]. Applied Physics Letters, 1967, 11(3):77-79. doi: 10.1063/1.1755043
[13] CARNICER A, MONTES-USATEGUI M, ARCOS S, et al. Vulnerability to chosen cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Optics Letters, 2005, 30(13):1644-1646. doi: 10.1364/OL.30.001644
[14] FRAUEL Y, CASTRO A, NAUGHTON T J, et al. Resistance of the double random phase encryption against various attacks[J]. Optics Express, 2007, 15(16):10253-10265. doi: 10.1364/OE.15.010253
[15] CHEN L F, ZHAO D M. Optical image encryption based on fractional wavelet transform[J]. Optical Communications, 2005, 254(4/6):361-367.
[16] GLUCKSTAD J, MOGENSEN P C. Phase-only optical encryption[J]. Optics Letters, 2000, 25(8):566-568. doi: 10.1364/OL.25.000566
[17] DARIA V R, SINZINGER S, GLUCKSTAD J. Phase-only optical decryption in a planar integratedmicro-optics system[J]. Optcal Engineering, 2004, 43(10):2223-2227. doi: 10.1117/1.1782613
[18] MOGENSEN P C, GLUCKSTAD J. A phase-based optical encryption system with polarisation encoding[J]. Optical Communications, 2000, 173(1/6):177-183.
[19] PENG X, CUI Z, TAN T. Information encryption with virtual-optics imaging system[J]. Optical Communications, 2002, 212(4/6):235-242.
[20] ZHANG Y, WANG B. Optical image encryption based on interfe-rence[J]. Optics Letters, 2008, 33(21):2443-2445. doi: 10.1364/OL.33.002443
[21] JABLOWSKI D P, LEE S H. Restoration of degraded images by compo site gratings in a coherent optical prcessor[J]. Applied Optics, 1973, 2(7):1703-1712.