[1] Zhang Xiaoqiang, Wang Mengmeng, Zhu Guiliang. Research on the new development of image encryption algorithms [J]. Computer Engineering & Science, 2012, 34(5): 1-6.
[2] Yong-Ri Piao, Dong-Hak Shin, Eun-Soo Kim, et al.. Robust image encryption by combined use of integral imaging and pixel scrambling techniques [J]. Opt Laser Eng, 2009, 47(11): 1273-1281.
[3] J Zhao, H Lu, X Song, et al.. Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique [J]. Opt Comm, 2005, 249(4-6): 493-499.
[4] Oleg Izmerly, Tal Mor. Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment [J]. Theoretical Computer Science, 2006, 367(3): 308-323.
[5] J Fridrich. Image encryption based on chaotic maps [C]. IEEE International Conference on Systems, Man, and Cybernetics, 1997, 2: 1105-1110.
[7] H T Panduranga, S K Naveen Kumar. Hybrid approach for image encryption using SCAN patterns and carrier images [J]. International Journal on Computer Science and Engineering, 2010, 2(2): 297-300.
[8] Q Zhang, L Guo, X Wei. Image encryption using DNA addition combining with chaotic maps [J]. Mathematical and Computer Modelling, 2010, 52(11-12): 2028-2035.
[9] Shang Yanhong. Research on Digital Image Encryption Technology [D]. Beijing: North China University of Technology, 2005. 6-17.
[10] Nanrun Zhou, Yixian Wang, Lihua Gong, et al.. Novel single channel color image encryption algorithm based on chaos and fractional Fourier transform [J]. Opt Commun, 2011, 284(12): 2789-2796.
[13] Di Hong. Multiple-image Compressive Encryption and Hiding Base on Optical Information Procssing[D]. Beijing: Beijing University of Post,2012. 1-19.
[14] Zhou Nanrun, Wang Yixian, Wu Jianhua. Optical Image Encryption Method Based on Fractional Mellin Transform [P]. Chinese Patent, 201010616865.2 [P]. 2011-05-25.
[16] R M Willett, R F Marcia, J M Nichols, et al.. Compressed sensing for practical optical imaging systems: a tutorial [J]. Opt Eng, 2011, 50(7): 072601.
[17] Justin Romberg. Imaging via compressed sampling [J]. IEEE Signal Proce Mag, 2008, 25(2): 14-20.
[18] Zhang Shuo, Wang Jie, Wang Jincheng, et al.. Simple calculation method for three dimensional image base on compressed sensing [J]. Acta Optica Sinica, 2013, 33(1): 0111004.
[19] David Donoho, Yaakov Tsaig. Extensions of compressed sensing [J]. Signal Processing, 2006, 86(3): 533-548.
[20] D L Donoho. Compressed sensing [J]. IEEE Trans Info Theory, 2006, 52(4): 1289-1306.
[21] E J Candès, J Romberg, T Tao. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information [J]. IEEE Trans Info Theory, 2006, 52(2): 489-509.
[22] R Huang, K Sakurai. A robust and compression combined digital image encryption method based on compressive sensing [C]. 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011, 53: 105-108.
[23] P Lu, Zhiyong Xu, Xi Lu, et al.. Digital image information encryption based on compressive sensing and double random-phase encoding technique [J]. Optik-International Journal for Light and Electron Optics, 2013, 124(6): 2514-2518.
[24] V I Arnold. Ergodic Problems of Classical Mechanics Mathematical Physics Monograph Series [M]. New York: WA Ben jams in Inc, 1968.
[25] W Jin, C Yan. Optical image encryption based on multichannel fractional Fourier transform and double random phase encoding technique [J]. Optik, 2007, 118(1): 38-41.
[26] Yao-Yao C, Xin Z, Yong-Liang X, et al.. An improved watermarking method based on double random phase encoding technique [J]. Opt Laser Technol, 2010, 42(4): 617-623.
[27] Richard Baraniuk. Compressive sensing [J]. IEEE Signal Proce Mag, 2007, 24(4): 118-121.
[28] Chen Jing, Wang Yongtian. Research of the compressive imaging technology [J]. Laser & Optoelectronics Progress, 2012, 49(3): 030002.
[29] E Candès, T Tao. Near-optimal signal recovery from random projections and universal encoding strategies [J]. IEEE Trans Info Theory, 2006, 52(12): 5406-5245.
[30] Elad Michael. Optimized projections for compressed sensing [J]. IEEE Trans Sign Proc, 2007, 55(12): 5695-5702.
[31] B Javidi. Optical and Digital Techniques for Information Security [M]. New York: Springer Business Media, 2005.
[32] M Singh, A Kumar, K Singh, et al.. Optical security system using jigsaw transforms of the second random phase mask and the encrypted image in a double random phase encoding system [J]. Opt Laser Eng, 2008, 46(10): 763-768.
[33] G Unnikrishnan, J Joseph, K Singh. Optical encryption by double random phase encoding in the fractional Fourier domain [J]. Opt Lett, 2000, 25(12): 887-889.
[34] X Peng, H Z Wei, P Zhang. Asymmetric cryptography based on wavefront sensing [J]. Opt Lett, 2006, 31(24): 3579-3581.
[35] X Lu, Y Cao. Digital information encryption using multiple Fourier transforms and decimal expansion of irrational numbers [J]. Optik-International Tocernal for Light and Electron Optics, 2013, 124(12): 1202-1206.
[36] Guodong Ye. Image scrambling encryption algorithm of pixel bit based on chaos map [J]. Pattern Recognition Letters, 2010, 31(5): 347-354.
[37] Manjunath Prasad, K L Sudha. Chaos image encryption using pixel shuffling [J]. Computer Science & Information Technology, 2011, 4(1): 169-179.