[1] REFREGIER P,JAVIDI B.Optical-image encryption based on input plane and Fourier plane random encoding [J].Optics Letters,1995,20(7):767-769.
[2] JAVIDI B,HOMER J L.Optical pattern recognition for validation and security verification [J].Optical Engineering,1994,33(6):1752-1756.
[3] ZHANG J J,SITU G H,ZHANG Y.Progress of optical security systems based on random-phase encoding technology [J].Journal of the Graduate School of the Chinese Academy of Sciences,2003,20(3):265-272 (in Chinese).
[4] STEPHEN P,GAJDA R,SZNPLIK T.Distributed kinoforms in optical security applications[J].Optical Engineering,1996,35(9):2453-2458.
[5] JAVIDI B,SERGENT B.Fully phase encoded key and biometrics for security verification [J].Optical Engineering,1997,36(3):935-942.
[6] XIAO Y L,LIU Q,YUAN Sh,et al.Study about decryption based on optical image encryption system in the Fresnel domain [J].Laser Technology,2009,33(4):433-436(in Chinese).
[7] HENNELLY B,SHERIDAN J.Optical encryption and the space bandwidth product[J].Optics Communications,2005,247(5):291-305.
[8] SHIRAKI A,TAKEDA N,NIWA M,et al.Simplified electro-holographic color reconstruction system using graphics processing unit and liquid crystal display projector[J].Optics Express,2009,17(18):16038-16045.
[9] CURTIS J,KOSS B,GRIER D.Dynamic holographic optical tweezers[J].Optics Communications,2002,207(6):169-175.
[10] SINCLAIR G,JORDAN P,COURTIAL J,et al.Assembly of 3-dimensional structures using programmable holographic optical tweezers[J].Optics Express,2004,12(22):5475-5480.
[11] DOU R,GILES M.Simple technique for measuring the phase property of a twisted nematic liquid crystal television[J].Optical Engineering,1996,35(3):808-812.
[12] WALKER T G.Holography without photography[J].America Journal of Physics,1999,67(9):783-785.
[13] ULUSOY E,ONURAL L,OZAKTAS H M.Full-complex amplitude modulation with binary spatial light modulators[J].Journal of the Optical Society of America,2011,A28(11):2310-2321.