[1] JAVIDI B. Securing information with optical technologies[J]. Physics Today, 1997, 50: 27-32.
[2] ALFALOU A, BROSSEAU C. Optical image compression and encryption methods[J]. Advance in Optics and Photonics, 2009, 1(3): 589-636.
[3] REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(7): 767-769.
[4] UNNIKRISHNAN G, JOSEPH J, SINGH K. Optical encryption by double-random phase encoding in the fractional Fourier domain[J]. Optics Letters, 2000, 25(12): 887-889.
[5] SITU G, ZHANG J. Double random-phase encoding in the Fresnel domain[J]. Optics Letters, 2004, 29(14): 1584-1586.
[6] NOMURA T, JAVIDI B. Optical encryption using a joint transform correlator architecture[J]. Optical Engineering, 2000, 39(8): 2031-2035.
[7] QIN Y, GONG Q. Optical encryption in a JTC encrypting architecture without the use of an external reference wave[J], Optics and Laser Technology, 2013, 51: 5-10.
[8] ZHOU N, WANG Y, WU J. Image encryption algorithm based on the multi-order Discrete fractional Mellin transform[J]. Optics Communications, 2011, 284: 5588-5597.
[9] PENG X, ZHANG P, WEI H, et al. Known-plaintext attack on optical encryption based on double random phase keys[J]. Optics Letters, 2006, 31(8): 1044-1046.
[10] PENG Xiang, TANG Hong-qiao, TIAN Jing-dong. Ciphertext only attack on double random phase encoding optical encryption system[J]. Acta Physica Sinica, 2007, 56(5): 2629-2636.
[11] CHANG H T, LU W C, KUO C J. Multiple-phase retrieval for optical security systems by use of random-phase encoding[J]. Applied Optics, 2002, 41(23): 4825-4834.
[12] SITU G, ZHANG J. A lensless optical security system based on computer-generated phase only masks[J]. Optics Communications, 2004, 232: 115-122 .
[13] LI Y, KRESKE K, ROSEN J. Security and encryption optical systems based on a correlator with significant output images[J]. Applied Optics, 2000, 39(29): 5295-5301.
[14] ZHANG Y, WANG B. Optical image encryption based on interference[J]. Optics Letters, 2008, 33(21): 2443-2445.
[15] WANG X, ZHAO D. Optical image hiding with silhouette removal based on the optical interference principle[J]. Applied Optics, 2012, 51(6): 686-691.
[16] ZHANG Y, WANG B, DONG Z. Enhancement of image hiding by exchanging two phase masks[J]. Journal of Optics A: Pure and Applied Optics, 2009, 11(12): 125406.
[17] SITU G, ZHANG J. Multiple-image encryption by wavelength multiplexing[J]. Optics Letters, 2005, 30(11): 1306-1308.
[18] SITU G, ZHANG J. Position multiplexing for multiple-image encryption[J]. Journal of Optics A: Pure and Applied Optics, 2006, 8(5): 391-397.
[19] BARRERA J F, HENAO R, TEBALDI M, et al. Multiplexing encrypted data by using polarized light[J]. Optics Communications, 2006, 260: 109-112.
[20] LIU Z, ZHANG Y, ZHAO H, et al. Optical multi-image encryption based on frequency shift[J]. Optik, 2011, 122: 1010-1013.
[21] JIA Li-juan, LIU Zheng-jun. Double image encryption algorithm based on random fractional Fourier transform[J]. Acta Photonica Sinica, 2009, 38(4): 1020-1024.
[22] XIAO Y, SU X, LI S, et al. Key rotation multiplexing for multiple-image optical encryption in the Fresnel domain[J]. Optics and Laser Technology, 2011, 43(4): 889-894.
[23] HWANG H E, CHANG H T, LIE W N. Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel transform domain[J]. Optics Letters, 2009, 34(24): 3917-3919.
[24] QIN Y, GONG Q. Interference-based multiple-image encryption with silhouette removal by position multiplexing[J]. Applied Optics, 2013, 52(17): 3987-92
[25] NIU C H, WANG X L, LV N G, et al. An encryption method with multiple encrypted keys based on interference principle[J]. Optics Express, 2010, 18(8): 7827-7834.