[1] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt Lett, 1995, 20(7): 767-769.
[2] Javidi B, Horner J L. Optical pattern recognition for validation and security verification[J]. Opt Eng, 1994, 33(6): 1752-1756.
[3] Chen W, Javidi B, Chen X. Advances in optical security systems[J]. Adv Opt Photon, 2014, 6(2): 120-155.
[4] Shen X, Lin C, Zou X, et al.. Nonlinear optical cryptosystem based on joint Fresnel transform under vector wave illumination [J]. Journal of Optics, 2015, 17(5): 055701.
[5] Qin W, Peng X. Asymmetric cryptosystem based on phase truncated Fourier transforms[J]. Opt Lett, 2010, 35(2): 118-120.
[7] Peng Xiang, Tang Hongqiao, Tian Jindong. Ciphertext-only attack on double random phase encoding optical encryption system[J]. Acta Physica Sinica, 2007, 56(5): 2629-2636.
[8] Wang Hongjuan, Wang Zhipeng, Zhang Yingying, et al.. Using QR codes in multi-image optical interference encryption system to reconstruct high quality original information[J]. Acta Optica Sinica, 2014, 34(9): 0907001.
[9] Liu Zhen, Bai Taotao, Lu Peng. Encrypted holographic watermarking technology with decrypted image superposed no noise [J]. Acta Optica Sinica, 2015, 35(2): 0209002.
[10] Hou Junfeng, Huang Sujuan, Situ Guohai. Nonlinear optical image encryption[J]. Acta Optica Sinica, 2015, 35(8): 0807001.
[11] Wang Hongjuan, Wang Zhipeng, Hai Tao, et al.. Lossless binary image reconstruction in diffractive encryption system with redundant data[J]. Chinese J Lasers, 2015, 42(7): 0709002.
[12] Shen Xueju, Liu Xumin, Cai Ning. Nonlinear image encryption system based on JTC and its removing noise and resisting attack properties research[J]. Chinese J Lasers, 2015, 42(7): 0709003.
[13] Volodin B L, Kippelen B, Meerholz K, et al.. A polymeric optical pattern-recognition system for security verification[J]. Nature, 1996, 383(5): 58-60.
[14] Weng D, Zhu N, Wang Y, et al.. Experimental verification of optical image encryption based on interference[J]. Opt Commun, 2011, 284(10-11): 2485-2487.
[15] Barrera J F, Agudelo A M, Torroba R. Experimental QR code optical encryption: noise-free data recovering[J]. Opt Lett, 2014, 39(10): 3074-3077.
[16] Zhang Y, Wang B. Optical image encryption based on interference[J]. Opt Lett, 2008, 33(21): 2443-2445.
[17] Wang B, Zhang Y. Double images hiding based on optical interference[J]. Opt Commun, 2009, 282(17): 3439-3443.
[18] Chen W, Chen X, Sheppard C J R. Optical image encryption based on phase retrieval combined with three-dimensional particle-like distribution[J]. Journal of Optics, 2012, 14(7): 075402.
[19] Wang X, Zhao D. Optical image hiding with silhouette removal based on the optical interference principle[J]. Appl Opt, 2012, 51(6): 686-691.
[20] He W, Peng X, Meng X, et al.. Collision in optical image encryption based on interference and a method for avoiding this security leak[J]. Optics & Laser Technology, 2013, 47(1): 31-36.
[21] Niu C, Wang X, Lü N, et al.. An encryption method with multiple encrypted keys based on interference principle[J]. Opt Express, 2010, 18(8): 7827-7834.
[22] Chen W, Chen X. Security-enhanced interference-based optical image encryption[J]. Opt Commun, 2013, 286(1): 123-129.
[23] Ying C, Pang H, Fan C, et al.. New method for the design of a phase-only computer hologram for multiplane reconstruction [J]. Opt Eng, 2011, 50(5): 055802.