[1] |
REFREGIER P,JAVIDI B.Optical-image encryption based on input plane and Fourier plane random encoding [J].Optics Letters,1995,20(7):767-769. |
[2] |
JAVIDI B,HOMER J L.Optical pattern recognition for validation and security verification [J].Optical Engineering,1994,33(6):1752-1756. |
[3] |
ZHANG J J,SITU G H,ZHANG Y.Progress of optical security systems based on random-phase encoding technology [J].Journal of the Graduate School of the Chinese Academy of Sciences,2003,20(3):265-272 (in Chinese). |
[4] |
STEPHEN P,GAJDA R,SZNPLIK T.Distributed kinoforms in optical security applications[J].Optical Engineering,1996,35(9):2453-2458. |
[5] |
JAVIDI B,SERGENT B.Fully phase encoded key and biometrics for security verification [J].Optical Engineering,1997,36(3):935-942. |
[6] |
XIAO Y L,LIU Q,YUAN Sh,et al.Study about decryption based on optical image encryption system in the Fresnel domain [J].Laser Technology,2009,33(4):433-436(in Chinese). |
[7] |
HENNELLY B,SHERIDAN J.Optical encryption and the space bandwidth product[J].Optics Communications,2005,247(5):291-305. |
[8] |
SHIRAKI A,TAKEDA N,NIWA M,et al.Simplified electro-holographic color reconstruction system using graphics processing unit and liquid crystal display projector[J].Optics Express,2009,17(18):16038-16045. |
[9] |
CURTIS J,KOSS B,GRIER D.Dynamic holographic optical tweezers[J].Optics Communications,2002,207(6):169-175. |
[10] |
SINCLAIR G,JORDAN P,COURTIAL J,et al.Assembly of 3-dimensional structures using programmable holographic optical tweezers[J].Optics Express,2004,12(22):5475-5480. |
[11] |
DOU R,GILES M.Simple technique for measuring the phase property of a twisted nematic liquid crystal television[J].Optical Engineering,1996,35(3):808-812. |
[12] |
WALKER T G.Holography without photography[J].America Journal of Physics,1999,67(9):783-785. |
[13] |
ULUSOY E,ONURAL L,OZAKTAS H M.Full-complex amplitude modulation with binary spatial light modulators[J].Journal of the Optical Society of America,2011,A28(11):2310-2321. |