[1] P. Réfrégier, B. Javidi. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett., 1995, 20(7): 767~769
[2] E. Tajahuerce, O. Matoba, S. C. Verrall et al.. Optoelectronic information encryption with phase-shifting interferometry[J]. Appl. Opt., 2000, 39(14): 2313~2320
[3] G. Unnikrishnan, J. Joseph, K. Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain[J]. Opt. Lett., 2000, 25(12): 887~889
[4] Shutian Liu, Li Yu, Banghe Zhu. Optical image encryption by cascaded fractional Fourier transforms with random phase filtering[J]. Opt. Commun., 2001, 187(1~3): 57~63
[5] D. Weber, J. Trolinger. Novel implementation of nonlinear joint transform correlators in optical security and validation[J]. Opt. Engng., 1999, 38(1): 62~68
[6] R. K. Wang, lan A. Watson, C. Chatwin. Random phase encoding for optical security[J]. Opt. Engng., 1996, 35(9): 2464~2469
[7] Y. Li, K. Kreske, J. Rosen. Security and encryption optical systems based on a correlator with significant output image[J]. Appl. Opt., 2000, 39(29): 5295~5301
[8] D. Abookasis, O. Arazi, J. Rosen et al.. Security optical systems based on a joint transform correlator with significant output images[J]. Opt. Engng., 2001, 40(8): 1584~1589
[9] H. T. Chang, W. C. Lu, C. J. Kuo. Multiple-phase retrieval for optical security systems by use of random-phase encoding[J]. Appl. Opt., 2002, 41(23): 4825~4834
[10] Xiang Peng, Lingfeng Yu, Lilong Cai. Double-lock for image encryption with virtual opitcal wavelength[J]. Opt. Express, 2001, 10(1): 41~45
[11] Xiang Peng, Zhiyong Cui, Tieniu Tan. Information encryption with virtual-optics imaging system[J]. Opt. Commun., 2002, 212(4~6) :235~245
[12] Xiang Peng, Zhiyong Cui, Tieniu Tan. Image encryption with virtual-optics[C]. Proc. SPIE, 2002, 4929: 96~104
[13] Xiang Peng, Peng Zhang, Hanben Niu. Architecture design of virtual-optics data security using parallel hardware and software[J]. Optik, 2004, 115(1): 15~22
[16] G. Situ, J. Zhang. A cascaded iterative Fourier transform algorithm for optical security applications[J]. Optik, 2003, 114(10): 473~477
[17] E. G. Johnson, J. D. Brasher. Phase encryption of biometrics in diffractive optical elements[J]. Opt. Lett., 1996, 21(16): 1271~1273
[18] G. Situ, J. Zhang. A lensless optical security system based on computer-generated phase only masks[J]. Opt. Commun., 2004, 232(1~6): 115~122
[19] Stephen D. Mellin, Gregory P. Nordin. Limits of scalar diffraction theory and an iterative angular spectrum algorithm for finite aperture diffractive optical element design[J]. Opt. Express, 2001, 8(13): 706~722
[20] J. Goodman. Introduction to Fourier Optics[M]. New York: McGraw-Hill, 1968
[21] Henry Stark. Image recovery: Theory and Application[M]. Academic: Orlando, Fla., 1987. Chap.8, 277