[1] Sun Shenghe,Lu Zheming,Niu Xiamu. Digital watermarking technique and application [M]. Beijing:Science Press,2004,32-36
[2] Peng Xiang,Wei Hengzheng,Zhang Peng. Introduction to optical information security [M]. Beijing:Science Press,2008,1-11
[9] Shannon C E. Communication theory of secrecy system[J]. Bell. Syst. Tech.,1949,28:656-715
[10] Hans Delfs,Helmut Knebl. Introduction to cryptography[M]. Springer,2007,1-6
[11] Yang Bo. Modern Cryptography [M]. Beijing:Tsinghua Univ. Press,2007. 1-11
[13] Bahram Javidi. Optical and digital techniques for information security[M]. Springer,2005,113-134
[14] Namias V. The fractional order Fourier transform and its application to quantum mechanics[J]. IMA J. Appl. Maths.,1980,25(1):241-265
[15] Mendlovic D,Ozakatas H. M. Fractional fourier transforms and their optical implementation[J]. J. Opt. Soc. Am. A,1993,10:1875-1881
[16] Aysegul Sahin,Haldun M. Ozaktas,David Mendlovic. Optical implementations of two-dimensional fractional Fourier transforms and linear canonical transforms with arbitrary parameters[J]. Appl. Opt.,1998,37(11):2130-2141
[17] A. W. Lohmann. Image rotation,Wigner rotation,and fractional Fourier transform[J]. J. Opt. Soc. Am. A,1993,10(10):2181-2186
[18] G. Unnikrishnan,J. Joseph,K. Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain [J]. Opt. Lett.,2000,25(12):887-889