[1]REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Let., 1995, 20(7):767-769. [2]张静娟,史伟诗,司徒国海. 光学信息隐藏综述[J]. 中国科学院研究生院学报,2006, 23(3): 289-296. ZHANG Jing-juan, SHI Yi-Shi. SITU Guo-hai. A survey on optical information hiding[J]. Journal of the Graduate School of the Chinese Academy of Science, 2006,23(3): 289-296.(in Chinese with an English abstract) [3]JAVIDI B. Securing information with optical technologies [J]. Physics Today, 1997, 50 (3): 27-32. [4]KISHK S, JAVIDI B. Information hiding technique with double phase encoding [J]. Appl. Opt., 2002, 41 (26): 5462-5470. [5]SHEN Xue-ju, LIN Chao, KONG De-zhao. Fresnel-transform holographic encryption based on angular multiplexing and random-amplitude mask[J]. Opt. Eng., 2012, 51(6): 1-6. [6]LIN C, SHEN Xue-ju, TANG Rui, et al. Multiple images encryption based on Fourier transform hologram[J]. Opt. Commun., 2012, 285:1023-1028 [7]SITU G, ZHANG J. Double random-phase encoding in the Fresnel domain [J]. Opt. Let., 2004, 29 (14): 1584-1586. [8]任国朝,井西利,谢丹艳. 基于分频域和菲涅耳域的光学图像加密方法[J]. 应用光学,2009,30(2): 183-194. REN Guo-zhao,JING Xi-li,XIE Dan-yan. Optical image encryption based on frequency splitting domain and Fresnel domain[J]. Journal of Applied Optics, 2009,30(2): 183-194.(in Chinese with an English abstract) [9]UNNIKRISHNAN G, SINGH K. Double random fractional Fourier domain encoding for optical security [J]. Opt. Eng., 2000, 39 (11): 2853-2859. [10]CHEN F, ZHAO M. Image encryption with fractional wavelet packet method [J]. Optik, 2008, 119 (1): 286-291. [11]CHEN F, ZHAO M. Optical image encryption with Hartley transforms [J]. Opt. Let., 2006, 31 (23): 3438- 3440. [12]MA J, LIU. J. Double-image sharing encryption based on associated fractional Fourier transform and gyrator transform [J]. Chinese Opt. Let., 2010, 8 (3): 290-292. [13]秦怡,巩琼,吕晓东,等. 基于干涉原理的双图像加密系统[J]. 应用光学,2013. 34(2):260-266. QIN Yi, GONG Qiong, Lv Xiao-dong, et al. Double image encryption system based on principles of interference[J]. Journal of Applied Optics, 2013, 34(2):260-266.(in Chinese with an English abstract) [14]孟祥锋, 彭翔. 优化的两步相移算法在图像加密中的应用研究[J]. 物理学报, 2010, 59 (9): 118-6124. MENG Xiang-feng, PENG Xiang. Optimized two-step phase-shifting algorithm applied to image encryption[J]. Acta Physica Sinica, 2010, 59 (9): 118-6124.(in Chinese with an English abstract) [15]LIN Chao, SHEN Xue-ju.Analysis and design of impulse attack free generalized joint transform correlator optical encryption scheme[J]. Optics & Laser Technology ,2012,44:2032-2036. [16]AMAYA D, TEBALDI M. Wavelength multiplexing encryption using joint transform correlator architecture [J]. Appl. Opt., 2009, 48 (11): 2099-2104. [17]RUEDA E, BARRERA J. Optical encryption with a reference wave in a joint transform correlator architecture [J]. Opt. Commun., 2009, 282 (1): 3243-3249. [18]RUEDA E, BARRERA J. Lateral shift multiplexing with a modied random mask in a joint transform correlator encrypting architecture [J]. Opt. Eng., 2009, 48 (2): 027006 (1-6). [19]ALFALOU A, BROSSEAU C. Dual encryption scheme of images using polarized light [J]. Opt. Let., 2010, 35 (13): 2185-2187. [20]RODRLGUEZ J. Computational cryptography based on trigonometric algorithms and intensity superposition [J]. The Imaging Science Journal, 2010, 58 (1): 61-80.
|