H. T. Chang and C. C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006).

[CrossRef]
[PubMed]

S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Cascaded Fresnel digital hologram and its application to watermarking,” Opt. Appl. 36, 413–420 (2006).

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]
[PubMed]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[CrossRef]
[PubMed]

H. T. Chang and C. L. Tsan, “Image watermarking by use of digital holography embedded in DCT domain,” Appl. Opt. 44, 6211–6219 (2005).

[CrossRef]
[PubMed]

O. Ripoll, V. Kettunen, and H. P. Herzig, “Review of iterative Fourier-transform algorithms for beam shaping applications,” Opt. Eng. 43, 2549–2556 (2004).

[CrossRef]

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).

[CrossRef]

H. T. Chang and C. T. Chen, “Asymmetric-image verification for security optical system based on joint transform correlator,” Opt. Commun. 239, 43–54 (2004).

[CrossRef]

H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004).

[CrossRef]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[CrossRef]

X. Peng, P. Zhang, and L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using digital holography,” Opt. Eng. 43, 2959–2966(2004).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586(2004).

[CrossRef]
[PubMed]

H. Kim, D.-H. Kim, and Y. H. Lee, “Encryption of digital hologram of 3-D object by virtue optics,” Opt. Express 12, 4912–4921(2004).

[CrossRef]
[PubMed]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik 114, 473–477(2003).

[CrossRef]

G. S. Lin, H. T. Chang, W. N. Lie, and C. H. Chuang, “A public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[CrossRef]

X. Peng, L. Yu, and L. Cai, “Double-lock for image encryption with virtual optical wavelength,” Opt. Express 10, 41–45(2002).

[PubMed]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002).

[CrossRef]
[PubMed]

S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470(2002).

[CrossRef]
[PubMed]

J. Rosen and B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001).

[CrossRef]

H. T. Chang, “Optical image encryption using separate amplitude-based virtual image and iteratively-retrieved phase information,” Opt. Eng. 40, 2165–2171 (2001).

[CrossRef]

D. Abookasis, O. Arazi, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output image,” Appl. Opt. 39, 5295–5301 (2000).

[CrossRef]

X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[CrossRef]

P. C. Mogensen and J. Glückstad, “Phase-only optical encryption,” Opt. Lett. 25, 566–568 (2000).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

W. X. Cong, N. X. Chen, and B. Y. Gu, “Phase retrieval in the Fresnel transform system: a recursive algorithm,” J. Opt. Soc. Am. A 16, 1827–1830 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory using multi-dimensional keys,” Opt. Lett. 24, 762–765 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with wavelength-key and random phase codes,” Appl. Opt. 38, 6785–6790 (1999).

[CrossRef]

D. Mas, J. Garcia, C. Ferreira, L. M. Bernardo, and F. Marinho, “Fast algorithm for free-space diffraction patterns calculation,” Opt. Commun. 164, 233–245 (1999).

[CrossRef]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

R. W. Gerchberg and W. O. Saxton, “Phase determination for image and diffraction plane pictures in the electron microscope,” Optik 34, 275–284 (1971).

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]
[PubMed]

D. Abookasis, O. Arazi, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]
[PubMed]

D. Abookasis, O. Arazi, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

D. Mas, J. Garcia, C. Ferreira, L. M. Bernardo, and F. Marinho, “Fast algorithm for free-space diffraction patterns calculation,” Opt. Commun. 164, 233–245 (1999).

[CrossRef]

X. Peng, P. Zhang, and L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

X. Peng, L. Yu, and L. Cai, “Double-lock for image encryption with virtual optical wavelength,” Opt. Express 10, 41–45(2002).

[PubMed]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[CrossRef]
[PubMed]

H. T. Chang and C. C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006).

[CrossRef]
[PubMed]

H. T. Chang and C. L. Tsan, “Image watermarking by use of digital holography embedded in DCT domain,” Appl. Opt. 44, 6211–6219 (2005).

[CrossRef]
[PubMed]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[CrossRef]

H. T. Chang and C. T. Chen, “Asymmetric-image verification for security optical system based on joint transform correlator,” Opt. Commun. 239, 43–54 (2004).

[CrossRef]

H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004).

[CrossRef]

G. S. Lin, H. T. Chang, W. N. Lie, and C. H. Chuang, “A public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[CrossRef]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002).

[CrossRef]
[PubMed]

H. T. Chang, “Optical image encryption using separate amplitude-based virtual image and iteratively-retrieved phase information,” Opt. Eng. 40, 2165–2171 (2001).

[CrossRef]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[CrossRef]

H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004).

[CrossRef]

H. T. Chang and C. T. Chen, “Asymmetric-image verification for security optical system based on joint transform correlator,” Opt. Commun. 239, 43–54 (2004).

[CrossRef]

G. S. Lin, H. T. Chang, W. N. Lie, and C. H. Chuang, “A public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[CrossRef]

S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Cascaded Fresnel digital hologram and its application to watermarking,” Opt. Appl. 36, 413–420 (2006).

D. Mas, J. Garcia, C. Ferreira, L. M. Bernardo, and F. Marinho, “Fast algorithm for free-space diffraction patterns calculation,” Opt. Commun. 164, 233–245 (1999).

[CrossRef]

D. Mas, J. Garcia, C. Ferreira, L. M. Bernardo, and F. Marinho, “Fast algorithm for free-space diffraction patterns calculation,” Opt. Commun. 164, 233–245 (1999).

[CrossRef]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

R. W. Gerchberg and W. O. Saxton, “Phase determination for image and diffraction plane pictures in the electron microscope,” Optik 34, 275–284 (1971).

J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996), pp. 355–358.

O. Ripoll, V. Kettunen, and H. P. Herzig, “Review of iterative Fourier-transform algorithms for beam shaping applications,” Opt. Eng. 43, 2549–2556 (2004).

[CrossRef]

S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470(2002).

[CrossRef]
[PubMed]

D. Abookasis, O. Arazi, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

J. Rosen and B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001).

[CrossRef]

X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with wavelength-key and random phase codes,” Appl. Opt. 38, 6785–6790 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory using multi-dimensional keys,” Opt. Lett. 24, 762–765 (1999).

[CrossRef]

B. Javidi, G. Zhang, and J. Li, “Encrypted optical memory using double-random phase encoding,” Appl. Opt. 36, 1054–1058(1997).

[CrossRef]
[PubMed]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]
[PubMed]

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using digital holography,” Opt. Eng. 43, 2959–2966(2004).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

O. Ripoll, V. Kettunen, and H. P. Herzig, “Review of iterative Fourier-transform algorithms for beam shaping applications,” Opt. Eng. 43, 2549–2556 (2004).

[CrossRef]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[CrossRef]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002).

[CrossRef]
[PubMed]

S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Cascaded Fresnel digital hologram and its application to watermarking,” Opt. Appl. 36, 413–420 (2006).

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[CrossRef]
[PubMed]

G. S. Lin, H. T. Chang, W. N. Lie, and C. H. Chuang, “A public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[CrossRef]

G. S. Lin, H. T. Chang, W. N. Lie, and C. H. Chuang, “A public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[CrossRef]

S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Cascaded Fresnel digital hologram and its application to watermarking,” Opt. Appl. 36, 413–420 (2006).

S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Cascaded Fresnel digital hologram and its application to watermarking,” Opt. Appl. 36, 413–420 (2006).

D. Mas, J. Garcia, C. Ferreira, L. M. Bernardo, and F. Marinho, “Fast algorithm for free-space diffraction patterns calculation,” Opt. Commun. 164, 233–245 (1999).

[CrossRef]

D. Mas, J. Garcia, C. Ferreira, L. M. Bernardo, and F. Marinho, “Fast algorithm for free-space diffraction patterns calculation,” Opt. Commun. 164, 233–245 (1999).

[CrossRef]

X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with wavelength-key and random phase codes,” Appl. Opt. 38, 6785–6790 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory using multi-dimensional keys,” Opt. Lett. 24, 762–765 (1999).

[CrossRef]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]
[PubMed]

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using digital holography,” Opt. Eng. 43, 2959–2966(2004).

[CrossRef]

X. Peng, P. Zhang, and L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

X. Peng, L. Yu, and L. Cai, “Double-lock for image encryption with virtual optical wavelength,” Opt. Express 10, 41–45(2002).

[PubMed]

O. Ripoll, V. Kettunen, and H. P. Herzig, “Review of iterative Fourier-transform algorithms for beam shaping applications,” Opt. Eng. 43, 2549–2556 (2004).

[CrossRef]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]
[PubMed]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

R. W. Gerchberg and W. O. Saxton, “Phase determination for image and diffraction plane pictures in the electron microscope,” Optik 34, 275–284 (1971).

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using digital holography,” Opt. Eng. 43, 2959–2966(2004).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[CrossRef]
[PubMed]

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586(2004).

[CrossRef]
[PubMed]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik 114, 473–477(2003).

[CrossRef]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[CrossRef]
[PubMed]

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586(2004).

[CrossRef]
[PubMed]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik 114, 473–477(2003).

[CrossRef]

X. Peng, P. Zhang, and L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Cascaded Fresnel digital hologram and its application to watermarking,” Opt. Appl. 36, 413–420 (2006).

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]
[PubMed]

B. R. Brown and A. W. Lohmann, “Complex spatial filtering with binary masks,” Appl. Opt. 5, 967–969 (1966).

[CrossRef]
[PubMed]

G. Tricoles, “Computer generated holograms: an historical review,” Appl. Opt. 26, 4351–4357 (1987).

[CrossRef]
[PubMed]

B. Javidi, G. Zhang, and J. Li, “Encrypted optical memory using double-random phase encoding,” Appl. Opt. 36, 1054–1058(1997).

[CrossRef]
[PubMed]

O. Matoba and B. Javidi, “Encrypted optical storage with wavelength-key and random phase codes,” Appl. Opt. 38, 6785–6790 (1999).

[CrossRef]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output image,” Appl. Opt. 39, 5295–5301 (2000).

[CrossRef]

X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[CrossRef]

J. Rosen and B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001).

[CrossRef]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002).

[CrossRef]
[PubMed]

S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470(2002).

[CrossRef]
[PubMed]

H. T. Chang and C. L. Tsan, “Image watermarking by use of digital holography embedded in DCT domain,” Appl. Opt. 44, 6211–6219 (2005).

[CrossRef]
[PubMed]

S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Cascaded Fresnel digital hologram and its application to watermarking,” Opt. Appl. 36, 413–420 (2006).

D. Mas, J. Garcia, C. Ferreira, L. M. Bernardo, and F. Marinho, “Fast algorithm for free-space diffraction patterns calculation,” Opt. Commun. 164, 233–245 (1999).

[CrossRef]

H. T. Chang and C. T. Chen, “Asymmetric-image verification for security optical system based on joint transform correlator,” Opt. Commun. 239, 43–54 (2004).

[CrossRef]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[CrossRef]

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).

[CrossRef]

H. T. Chang, “Optical image encryption using separate amplitude-based virtual image and iteratively-retrieved phase information,” Opt. Eng. 40, 2165–2171 (2001).

[CrossRef]

G. S. Lin, H. T. Chang, W. N. Lie, and C. H. Chuang, “A public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[CrossRef]

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using digital holography,” Opt. Eng. 43, 2959–2966(2004).

[CrossRef]

D. Abookasis, O. Arazi, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

O. Ripoll, V. Kettunen, and H. P. Herzig, “Review of iterative Fourier-transform algorithms for beam shaping applications,” Opt. Eng. 43, 2549–2556 (2004).

[CrossRef]

H. T. Chang and C. C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006).

[CrossRef]
[PubMed]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[CrossRef]
[PubMed]

H. Kim, D.-H. Kim, and Y. H. Lee, “Encryption of digital hologram of 3-D object by virtue optics,” Opt. Express 12, 4912–4921(2004).

[CrossRef]
[PubMed]

X. Peng, L. Yu, and L. Cai, “Double-lock for image encryption with virtual optical wavelength,” Opt. Express 10, 41–45(2002).

[PubMed]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]
[PubMed]

O. Matoba and B. Javidi, “Encrypted optical memory using multi-dimensional keys,” Opt. Lett. 24, 762–765 (1999).

[CrossRef]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[CrossRef]
[PubMed]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586(2004).

[CrossRef]
[PubMed]

P. C. Mogensen and J. Glückstad, “Phase-only optical encryption,” Opt. Lett. 25, 566–568 (2000).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004).

[CrossRef]

X. Peng, P. Zhang, and L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik 114, 473–477(2003).

[CrossRef]

R. W. Gerchberg and W. O. Saxton, “Phase determination for image and diffraction plane pictures in the electron microscope,” Optik 34, 275–284 (1971).

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

H.P.Herzig, ed., Micro-Optics (Taylor & Francis, 1996).

J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996), pp. 355–358.