[1] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding [J]. Optics Letters, 1995, 20(7): 767-769. doi:  10.1364/OL.20.000767
[2] Guo Yuan, Jing Shiwei, Xu Xin, et al. Asymmetric optical image encryption based on vector decomposition and phase-truncated [J]. Infrared and Laser Engineering, 2020, 49(4): 0426001. (in Chinese)
[3] He Fengtao, Zhang Min, Bai Ke, et al. Image encryption method based on laser speckle and Henon mapping [J]. Infrared and Laser Engineering, 2016, 45(4): 0428003. (in Chinese)
[4] Li Meixuan, Li Hong, Zhang Siqi, et al. Design of diffractive optical element based on discrete sampling encryption algorithm [J]. Infrared and Laser Engineering, 2019, 48(9): 0916004. (in Chinese)
[5] Tang Shiwen, Annovazzi-lodi Valerio, Wang Zhao. Recent advances in optical cryptography [J]. Chinese Journal of Optics, 2014, 7(1): 89-97. (in Chinese)
[6] Situ G, Zhang J. Double random-phase encoding in the Fresnel domain [J]. Optics Letters, 2004, 29(14): 1584-1586.
[7] Tajahuerce E, Javidi B. Encrypting three-dimensional information with digital holography [J]. Applied Optics, 2000, 39(25): 6595-6601.
[8] Javidi B, Nomura T. Securing information by use of digital holography [J]. Optics Letters, 2000, 25(1): 28-30. doi:  10.1364/OL.25.000028
[9] Zhou N, Zhang A, Zheng F, et al. Novel image compression-encryption hybrid algorithm based on key controlled measurement matrix in compressive sensing [J]. Optics & Laser Technology, 2014, 62(10): 152-160.
[10] Zhang L, Zhou Y, Huo D. Multiple-image encryption based on double random phase encoding and compressive sensing by using a measurement array preprocessed with orthogonal-basis matrices [J]. Optics & Laser Technology, 2018, 105: 162-170.
[11] Jin Cong, Liu Hui. Image encryption system based on quantum chaos and folding algorithm [J]. Optics and Precision Engineering, 2017, 25(3): 749-755. (in Chinese)
[12] Wang Di, Deng Jiaxian, Deng Xiaomei, et al. Joint algorithm of image compression and encryption using hyperchaotic system [J]. Optics and Precision Engineering, 2014, 22(9): 2528-2535. (in Chinese)
[13] Wang Q, Xiong D, Alfalou A. Optical image encryption method based on incoherent imaging and polarized light encoding [J]. Optics Communications, 2018, 415: 56-63. doi:  10.1016/j.optcom.2018.01.018
[14] Rajput S K, Nishchal N K. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain [J]. Applied Optics, 2013, 52(18): 4343-4352. doi:  10.1364/AO.52.004343
[15] Nomura T, Javidi B. Optical encryption using a joint transform correlator architecture [J]. Optical Engineering, 2000, 39(8): 2031-2035. doi:  https://doi.org/10.1117/1.1304844
[16] Rueda E, Barrera J F, Henao R, et al. Optical encryption with a reference wave in a joint transform correlator architecture [J]. Optics Communications, 2009, 282(16): 3243-3249. doi:  10.1016/j.optcom.2009.05.022
[17] Rajput S K, Nishchal N K. Image encryption and authentication verification using fractional nonconventional joint transform correlator [J]. Optics and Lasers in Engineering, 2012, 50(10): 1474-1483. doi:  10.1016/j.optlaseng.2012.03.018
[18] Mehra I, Rajput S K, Nishchal N K. Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude and phase truncation approach [J]. Optics and Lasers in Engineering, 2014, 52: 167-173. doi:  10.1016/j.optlaseng.2013.06.015
[19] Cheng C J, Lin L C, Wang C M, et al. Optical joint transform encryption using binary phase difference key mask [J]. Optical Review, 2005, 12(5): 367-371. doi:  10.1007/s10043-005-0367-5
[20] Lin L C, Cheng C J. Optimal key mask design for optical encryption based on joint transform correlator architecture [J]. Optics Communications, 2006, 258: 144-154. doi:  10.1016/j.optcom.2005.08.007
[21] Matoba O, Javidi B. Encrypted optical storage with angular multiplexing [J]. Applied Optics, 1999, 38(35): 7288-7293. doi:  10.1364/AO.38.007288
[22] Xi S X, Yu N N, Wang X L, et al. Optical encryption scheme for multiple-image based on spatially angular multiplexing and computer generated hologram [J]. Optics and Lasers in Engineering, 2020, 127: 105953.
[23] Xi S X, Wang X L, Song L P, et al. Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram [J]. Optics Express, 2017, 25(7): 8212-8222. doi:  10.1364/OE.25.008212
[24] Rueda E, Rios C, Henao R, et al. Experimental multiplexing approach via code key rotations under a joint transform correlator scheme [J]. Optics Communications, 2011, 284: 2500-2504. doi:  10.1016/j.optcom.2011.01.052
[25] Amaya D, Tebaldi T, Torroba R, et al. Wavelength multiplexing encryption using joint transform correlator architecture [J]. Applied Optics, 2009, 48(11): 2099-2104. doi:  10.1364/AO.48.002099
[26] Qin Y, Lu X D, Gong Q, et al. Additional key rotation multiplexing encryption using joint transform correlator architecture [J]. Acta Optica Sinica, 2013, 33(3): 103-109. (in Chinese)
[27] Wu Jun, Wang Gang, Xu Gang. Color image encryption method combining CGH and chaos [J]. Journal of Optics, 2021, 41(19): 113-132.
[28] Kong Dezhao, Shen Xueju, Zhao Yan, et al. Encryption and display of three-dimensional information based computer generated hologram and random phase encoding [J]. Laser & Optoelectronics Progress, 2015, 52(10): 100902. (in Chinese)