[1] P. Refregier, B. Javidi. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett., 1995, 20(7): 767~769
[2] Xiang Peng, Lingfeng Yu, Lilong Cai. Double-lock for image encryption with virtual optical wavelength[J]. Opt. Express, 2002, 10(1): 41~45
[3] Xiang Peng, Zhiyong Cui, Tieniu Tan. Information encryption with virtual-optics imaging system[J]. Opt. Commun., 2002, 212(4~6): 235~245
[9] Y. Frauel, A. Castro, T. J. Naughton et al.. Security analysis of optical encryption[C]. Proc. SPIE, 2005, 5986: 25~34
[10] A. Carnicer, M. Montes-Usategui, S. Arcos et al.. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Opt. Lett., 2005, 30(13): 1644~1646
[11] U. Gopinathan, D. S. Monaghan, T. J. Naughton et al.. A known-plaintext heuristic attack on the Fourier plane encryption algorithm[J]. Opt. Express, 2006, 14(8): 3181~3186
[12] Xiang Peng, Peng Zhang, Hengzheng Wei et al.. Known-plaintext attack on optical encryption based on double random phase keys[J]. Opt. Lett., 2006, 31(8): 1044~1046
[13] J. R. Fienup. Phase retrieval algorithms: a comparison[J]. Appl. Opt., 1982, 21(15): 2758~2769
[14] W. Stallings. Cryptography and Network Security: Principles and Practice[M]. 2nd edition, New Jersey: Prentice Hall, 1999. 24~26