[1] R. K. Wang, I. A. Watson, C. Chatwin. Random phase encoding for optical security[J]. Opt. Engng., 1996, 35(9): 2464~2469
[2] X. F. Meng, L. Z. Cai, M. Z. He et al.. Cross-talk-free double-image encryption and watermarking with amplitude-phase separate modulations[J]. J. Opt. A: Pure Appl. Opt., 2005, 7(11): 624~631
[3] S. Kishk, B. Javidi. Information hiding technique with double phase encoding[J]. Appl. Opt., 2002, 41(26): 546~547
[4] B. Javidi, T. Nomura. Securing information by use of digital holography[J]. Opt. Lett., 2000, 25(1): 28~30
[5] S. Kishk, B. Javidi. Watermarking of three-dimensional objects by digital holography[J]. Opt. Lett., 2003, 28(3): 167~169
[6] Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique[J]. Appl. Opt., 2002, 41(5): 865~873
[7] Sherif Kishk, B. Javidi. 3D object watermarking by a 3D hidden object[J]. Opt. Express, 2003, 11(8): 874~888
[10] Xiang Peng, Lingfeng Yu, Lilong Cai. Digital watermarking in three dimensional space with a virtual-optics modality[J]. Opt. Commun., 2003, 226(16): 155~165
[12] Joseph Rosen, B. Javidi. Hidden images in halftone pictures[J]. Appl. Opt., 2001, 40(20): 3346~3353
[13] J. R. Fienup. Phase retrieval algorithms: a comparison[J]. Appl. Opt., 1982, 21(15): 2758~2769
[14] E. Wolf. Progress in Optics[M]. New York: Elsevier, 1978. 119~223
[15] J. C. Stoffel, J. F. Moreland. A survey of electronic techniques for pictorial reproduction[J]. IEEE Trans. on Communications, 1981, 29(12): 1898~1925
[16] D. Kermisch, P. G. Roetling. Fourier spectrum of halftone images[J]. J. Opt. Soc. Am. A, 1975, 65(6): 716~723