[1]
|
REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding [J]. Optics Letters, 1995, 20(7):767-769. |
[2]
|
SITU G H, ZHANG J J. Double random phase encoding in the Fresnel domain [J]. Optics Letters, 2004, 29(14):1584-1586. |
[3]
|
LIN R, LIU Q N, ZHANG C L. A new fast algorithm for gyrator transform [J]. Laser Technology, 2012, 36(1):50-53(in Chin-ese). |
[4]
|
WANG X G, ZHAO D M, CHEN L F. Image encryption based on extended fractional Fourier transform and digital holography technique[J]. Optics Communications, 2006, 260(2): 449-453. |
[5]
|
HWANG H E, CHANG H T, LIE W N. Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems [J]. Optics Express, 2009, 17(16):13700-13710. |
[6]
|
DENG X P, ZHAO D M. Multiple-image encryption using phase retrieve algorithm and inter-modulation in Fourier domain[J].Optics and Laser Technology, 2012, 44(2):374-377. |
[7]
|
HENNELLY B, SHERIDANJ T. Optical image encryption by random shifting in fractional Fourier domains [J]. Optics Letters, 2003, 28(4): 269-271. |
[8]
|
PENG X, WEI H Zh, ZHANG P. Chosen plaintext attack on double random-phase encoding in the Fresnel domain [J]. Acta Physica Sinica,2007, 56(7):3924-3930 (in Chinese). |
[9]
|
PENG X, ZHANG P, WEI H Zh, et al. Known-plaintext attack on double phase encoding encryption technique [J]. Acta Physica Sinica, 2006, 55(3):1130-1136 (in Chinese). |
[10]
|
WEI H Zh, PENG X, ZHANG P, et al. Chosen-Plaintext attack on double phase encoding encryption technique [J]. Acta Optica Sinica,2007,27(5):824-829 (in Chinese). |
[11]
|
PENG X, TANG H Q, TIAN J D. Ciphertext-only attack on double random phase encoding optical encryption system [J]. Acta Physica Sinica,2007, 56(5):2629-2636 (in Chinese). |
[12]
|
WANG Q, PENG X. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Optics Letters, 2010,35(2): 118-120. |
[13]
|
DING X L.Asymmetric optifcal image cryptosystem based on spherical wave illumination[J].Laser Technology,2013,37(5):577-581 (in Chinese). |
[14]
|
WANG X G, ZHAO D M. A specific attack on the asymmetric cryptosystem based on the phase-truncated Fourier trans-forms [J]. Optics Communications, 2012,285(6):1078-1081. |
[15]
|
STALLINGS W. Cryptography and network security: principles and practice [M]. 2nd ed. Upper Saddle River,New Jersey,USA: Prentice Hall, 1999:24-26. |