[1] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(7): 767-769.
[2] Goudail F, Bollaro F, Javidi B, et al. Influence of a perturbation in a double phase-encoding system[J]. Journal of the Optical Society of America A, 1998, 15(10): 2629-2638.
[3] Wang B, Sun C C, Su W C. Shift-tolerance property of an optical double-random phase-encoding encryption system[J]. Applied Optics, 2000, 39(26): 4788-4793.
[4] Javidi B, Sergent A, Zhang G, et al. Fault tolerance properties of a double phase encoding encryption technique[J]. Optical Engineering, 1997, 36(4): 992-998.
[5] Pittman T B, Shih Y H, Strekalov D V, et al. Optical imaging by means of two-photon quantum entanglement[J]. Physical Review A, 1995, 52(5): R3429.
[6] Abouraddy A F, Saleh B E A, Sergienko A V, et al. Role of entanglement in two-photon imaging[J]. Physical Review Letters, 2001, 87(12): 123602.
[7] Shapiro J H, Boyd R W. The physics of ghost imaging[J]. Quantum Information Processing, 2012, 11(4): 949-993.
[8] Bennink R S, Bentley S J, Boyd R W. “Two-photon” coincidence imaging with a classical source[J]. Physical Review Letters, 2002, 89(11): 113601.
[9] Chen Mingliang, Li Enrong, Han Shensheng, et al. Ghost imaging based on sparse array pseudo thermal light system[J]. Acta Optica Sinica, 2012, 32(5): 0503001.
[10] Mei Xiaodong, Gong Wenlin, Han Shensheng, et al. Experimental research on prebuilt three-dimensional ghost imaging lidar[J]. Chinese J Lasers, 2016, 43(7): 0710003.
[11] Liu Xuefeng, Yao Xuri, Wu Ling’an, et al. The role of intensity fluctuations in thermal ghost imaging[J]. Acta Physica Sinica, 2013, 62(18): 184205.
[13] Tang Wenzhe, Cao Zhengwen, Zeng Guihua, et al. Back-side correlation imaging with digital micro mirror[J]. Acta Optica Sinica, 2015, 35(5): 0511004.
[14] Erkmen B I, Shapiro J H. Unified theory of ghost imaging with Gaussian-state light[J]. Physical Review A, 2008, 77(4): 043809.
[15] Bromberg Y, Katz O, Silberberg Y. Ghost imaging with a single detector[J]. Physical Review A, 2009, 79(5): 053840.
[16] Clemente P, Durán V, Tajahuerce E, et al. Optical encryption based on computational ghost imaging[J]. Optics Letters, 2010, 35(14): 2391-2393.
[17] Tanha M, Kheradmand R, Ahmadi-Kandjani S. Gray-scale and color optical encryption based on computational ghost imaging[J]. Applied Physics Letters, 2012, 101(10): 101108.
[18] Zafari M, Ahmadi-Kandjani S. Optical encryption with selective computational ghost imaging[J]. Journal of Optics, 2014, 16(10): 105405.
[19] Zhao S M, Wang L, Liang W, et al. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique[J]. Optics Communications, 2015, 353: 90-95.
[20] Wu J J, Xie Z W, Liu Z J, et al. Multiple-image encryption based on computational ghost imaging[J]. Optics Communications, 2016, 359: 38-43.
[21] Yuan S, Yao J B, Liu X M, et al. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging[J]. Optics Communications, 2016, 365: 180-185.
[22] Rauhut H. Circulant and Toeplitz matrices in compressed sensing[EB/OL]. (2009-02-25)[2016-07-10]. http: ∥arxiv.org/pdf/0902.4394vl.pdf.
[23] Haupt J, Bajwa W U, Raz G, et al. Toeplitz compressed sensing matrices with applications to sparse channel estimation[J]. IEEE Transactions on Information Theory, 2010, 56(11): 5862-5875.
[24] Zhan Kejun, Song Jianxin. Performance comparison of commonly used measurement matrix in image compressed sensing[J]. TV Technology, 2014, 38(5): 1-4.