[1] Bahram Javidi, Guanshen Zhang, Jian Li. Experimental demonstration of the random phase encoding technique for image encryption and security verification. Opt Eng, 1996,35(9): 2506~2512
[2] Sherif Kishk, Bahram Javidi. Watermarking of threedimensional objects by digital holography. Opt Lett, 2003,28(3) :167 ~ 169
[3] Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique. Appl Opt, 2002,41 (5): 865 ~ 873
[4] Ferri L C, Mayerhofer A, Frank M. Biometric authentication for ID cards with hologram watermarks. Proc of SPIE,2002,4675: 629 ~ 640
[5] Herzig H P, Ed. Micro: optics elements, systems and applications. Taylor & Francis Ltd. , 1997
[6] Gerchberg R W, Saxton W O. A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik, 1972,35: 237 ~ 246
[7] Johansson M, Bengtsson J. Robust design method for highly efficient beam-shaping diffractive optical elements using an iterative-Fourier-transform algorithm with soft operations. J of Modern Optics, 2000,47(8) :1385 ~ 1397
[8] Philip Birch, Rupert Young, Maria Farsari, et al. A comparison of the iterative Fourier transform method and evolutionary algorithms for the design of diffractive optical elements. Optics and Lasers in engineering, 2000,33 : 439~448
[9] Wyrowski F, Bryngdahl O. Iterative Fourier transform algorithm applied to computer holography. J Opt Soc Am A,1988,5(7): 1058 ~ 1065
[10] Liu Fumin, Zhai Honchen, Yang Xiaoping, et al.Amplitude fitting to binary images reconstructed by kinoforms. Acta Optica Sinica, 2003, 23 (6): 666 ~ 670