[1] Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique [J]. Appl. Opt., 2002, 41(5): 865~873
[2] H. T. Chang, C. L. Tsan. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain [J]. Appl. Opt., 2005, 44(29): 6211~6219
[3] Yu Chiliang, Gu Jihua, Liu Wei et al.. An image digital watermark technique based on digital holography and discrete cosine transform[J]. Acta Optica Sinica, 2006, 26(3): 355~361
[4] Peng Xiang, Zhang Peng, Niu Hanben. 3-D spatial digital watermarking system based on virtual optics[J]. Acta Optica Sinica, 2004, 24(11): 1507~1510
[5] Peng Xiang, Bai Weidong, Tian Jindong. Digital watermarking with half-tone encoded computer generated hologram[J]. Acta Optica Sinica, 2007, 27(6): 1011~1017
[6] Huang Qinglong, Liu Jianlan. Blind digital watermarking technique based on optical Fresnel diffraction[J]. Acta Optica Sinica, 2006, 26(8): 1145~1149
[7] Sun Liujie, Zhuang Songlin. Anti-fake technique by double random phase encrypted holographic mark[J]. Acta Optica Sinica, 2007, 27(1): 31~34
[8] He Mingzhao, Cao Liangcai, Tan Qiaofeng et al.. Digital watermarking technique based on cascaded fractional Fourier transform system [J]. Acta Optica Sinica, 2009, 29(10): 2709~2715
[9] Chen Daqing, Gu Jihua, Zhou Hao et al.. An image digital watermarking with phase retrieval algorithm and Fourier transformation hologram [J]. Acta Optica Sinica, 2009, 29(12): 3310~3316
[10] Chen Linsen, Zhou Xiaohong, Shao Jie. A digital hologram watermarking with large information contents based on binary phase encryption method[J]. Acta Photonica Sinica, 2005, 34(4): 616~620
[11] Yang Xiaoping, Zhai Hongchen, Wang Mingwei. Gray-image information hiding based on kinoform[J]. Acta Physica Sinica, 2008, 57(2): 847~852
[12] Liu Fumin, Zhai Hongchen, Yang Xiaoping. Kinoform-based iterative random phase encryption[J]. Acta Physica Sinica, 2003, 52(10): 2462~2465
[13] Wang Yongying, Wang Yurong, Yang Yongbin. Optical hierarchical image encryption by use of iterative Fourier transform algorithm[J]. Chinese J. Lasers, 2006, 33(10): 1360~1364
[14] Su Xianyu, Li Jitao. Information Optics[M]. Beijing: Science Press,1999.180~183
[15] Peng Xiang, Wei Hengzheng, Zhang Peng. Introduction to Optical Information Security [M]. Beijing: Science Press, 2008. 109~112