[1] |
MATOBA O, JAVIDI B. Encrypted optical storage with wavelength-key and random phase codes[J]. Applied Optics, 1999, 38(32):6785-6790. doi: 10.1364/AO.38.006785 |
[2] |
MATOBA O, JAVIDI B. The keys to holographic data security[J].IEEE Circuits and Devices Magazine, 2000, 16(5):8-15. doi: 10.1109/101.876899 |
[3] |
XU G X, XU Sh Q, GUO X J, et al. Image compression-encryption algorithm combined DCT transform with DNA operation[J]. Laser Technology, 2015, 39(6):460-463(in Chinese). |
[4] |
PAN T G, LI D Y. A novel image encryption using Arnold cat[J]. International Journal of Security and its Application, 2013, 7(5):377-386. doi: 10.14257/ijsia |
[5] |
XI S X, WANG X L, SONG L P, et al. Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram[J]. Optics Express, 2017, 25(7):8212-8222. doi: 10.1364/OE.25.008212 |
[6] |
XIAO Y L, LIU Q, YUAN Sh. Research on optical images encryption system based on fresnel zone[J]. Laser Technology, 2009, 33(4):433-436(in Chinese). |
[7] |
ZHANG H Zh, YAO M, LEI P. Research of image processing method of far-field laser spots[J]. Laser Technology, 2013, 37(4):460-463(in Chinese). |
[8] |
REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(7):767-769. doi: 10.1364/OL.20.000767 |
[9] |
JAVIDI B, CARNICER A, YAMAGUCHI M, et al. Roadmap on optical security[J]. Journal of Optics, 2016, 18(8):083001. doi: 10.1088/2040-8978/18/8/083001 |
[10] |
UNNIKRISHNAN G, SINGH K. Double random fractional Fourier domain encoding for optical security[J]. Optical Engineering, 2000, 39(11):2853-2859. doi: 10.1117/1.1313498 |
[11] |
MATOBA O, JAVIDI B. Encrypted optical storage with wavelength-key and random phase codes[J]. Applied Optics, 1999, 38(32):6785-6790. doi: 10.1364/AO.38.006785 |
[12] |
GOODMAN J W, LAWRENCE R W. Digital image formation from electronically detected holograms[J]. Applied Physics Letters, 1967, 11(3):77-79. doi: 10.1063/1.1755043 |
[13] |
CARNICER A, MONTES-USATEGUI M, ARCOS S, et al. Vulnerability to chosen cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Optics Letters, 2005, 30(13):1644-1646. doi: 10.1364/OL.30.001644 |
[14] |
FRAUEL Y, CASTRO A, NAUGHTON T J, et al. Resistance of the double random phase encryption against various attacks[J]. Optics Express, 2007, 15(16):10253-10265. doi: 10.1364/OE.15.010253 |
[15] |
CHEN L F, ZHAO D M. Optical image encryption based on fractional wavelet transform[J]. Optical Communications, 2005, 254(4/6):361-367. |
[16] |
GLUCKSTAD J, MOGENSEN P C. Phase-only optical encryption[J]. Optics Letters, 2000, 25(8):566-568. doi: 10.1364/OL.25.000566 |
[17] |
DARIA V R, SINZINGER S, GLUCKSTAD J. Phase-only optical decryption in a planar integratedmicro-optics system[J]. Optcal Engineering, 2004, 43(10):2223-2227. doi: 10.1117/1.1782613 |
[18] |
MOGENSEN P C, GLUCKSTAD J. A phase-based optical encryption system with polarisation encoding[J]. Optical Communications, 2000, 173(1/6):177-183. |
[19] |
PENG X, CUI Z, TAN T. Information encryption with virtual-optics imaging system[J]. Optical Communications, 2002, 212(4/6):235-242. |
[20] |
ZHANG Y, WANG B. Optical image encryption based on interfe-rence[J]. Optics Letters, 2008, 33(21):2443-2445. doi: 10.1364/OL.33.002443 |
[21] |
JABLOWSKI D P, LEE S H. Restoration of degraded images by compo site gratings in a coherent optical prcessor[J]. Applied Optics, 1973, 2(7):1703-1712. |