[1] REFREGIER P,JAVIDI B.Optical image encryption based on input plane and Fourier plane random encoding[J].Opt Lett,1995,20(7):767-769.
[2] SITU G H,ZHANG J I.Double random phase encoding in the Fresnel domain[J].Opt Lett,2004,29(14):1548-1586.
[3] DENG X P,ZOU K.Optical image encryption using one random phase mask based on spotlight illumination in the Fresnel domain[J].Laser Technology,2006,30(3):327-328(in Chinese).
[4] DENG X P,XIANG G X,WANG Sh F.Optical image encryption using only one random phase mask based on spherical wave illumination[J].Laser Journal,2005,26(5):52-53(in Chinese).
[5] ZHANG S Q,KARIM M A.Color image encryption using double random phase encoding[J].Microwave Optical Technology Letters,1999,21(19):318-323.
[6] SITU G H,ZHANG J J.Multiple-image encryption by wavelength multiplexing[J].Opt Lett,2005,30(11):1306-1308.
[7] LIU Sh T,MI Q L,ZHU B H.Optical image encryption with multistage and multichannel fractional Fourier-domain filtering[J].Opt Lett,2000,25(16):1242-1244.
[8] NICOALS J,IEMMI C,COMPOS J,et al.Optical encoding of color three-dimensional correlation[J].Opt Commun,2002,209:35-43.
[9] LEDESMA S,IEMMI C,VILLARREAL M,et al.Multichannel correlation by color multiplexing[J].Opt Commun,1999,166:173-180.
[10] CHEN L F,ZHAO D M.Optical image addition and encryption by multiexposure based on fractional Fourier transform hologram[J].Chinese Physical Letters,2006,23(3):603-606.
[11] CHEN L F,ZHAO D M.Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms[J].Optical Express,2006,14(19):8552-8560.
[12] WANG X G,ZHAO D M,FENG J,et al.Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics[J].Optical Express,2006,14(4):1476-1485.
[13] WANG Sh F,ZHU Zh Q.Principle of modem optics[M].Chengdu:University of Electronic Science and Technology of China Press,1998:117-118(in Chinese).
[14] GABOR D,STROKE G W,RESTRICK R,et al.Optical image synthesis (complex amplitude addition and subtraction) by holographic Fourier transformation[J].Phys Lett,1965,18(2):116-118.
[15] JAVIDI B,NOMURA T.Securing information by use of digital holography[J].Opt Lett,2000,25(1):28-30.
[16] NOBUKAZU Y S,MASAHIDEITOH Y,TOYOHIKO Y.Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography[J].Opt Lett,1998,23(18):1483-1485.
[17] WANG H Y,WANG D Y,XIE J J,et al.Study of the recording condition about the digital hologram recorded with spherical reference wave[J].Laser Journal,2007,28(1):44-46(in Chinese).
[18] YUAN C J,ZHONG L Y,WANG Y P,et al.The analysis of off-axis digital holographic recording condition[J].Laser Technology,2004,28(5):482-484(in Chinese).