Chinese Journal of Lasers, Volume. 42, Issue 9, 909001(2015)
A Double Encryption Algorithm Research Based on Computer Generated Hologram
[1] [1] Zhang Xiaoqiang, Wang Mengmeng, Zhu Guiliang. Research on the new development of image encryption algorithms[J]. Computer Engineering & Science, 2012, 34(5): 1-6.
[2] [2] Wang Desong. Research on Information Hiding and Authentication Based on Biometrics and Its Application[D]. Chengdu: University of Electronic Science and Technology of China, 2012: 4-8.
[3] [3] Meng Ying, Wei Xiaoma, Wang Lei, et al.. The physical basis and theoretical system on the quantum cryptography[J]. Practical Electronics, 2014, (19): 192.
[4] [4] Chen Yixiang, Wang Xiaogang. Image encryption based on iterative amplitude-phase retrieval and nonlinear double random phase encoding[J]. Acta Optica Sinica, 2014, 34(8): 0810003.
[5] [5] Meng Xiangfeng. Study of Optical Information Security Techniques Based on Iterative Phase Retrieval Algorithm and Phase-Shifting Interferometry[D]. Jinan: Shandong University, 2008: 10-23.
[6] [6] Liu Jian. Study on Encryption with Computer Generated Hologram[D]. Jinhua: Zhejiang Normal University, 2013: 14-41.
[7] [7] Kong Dezhao, Zhao Yan, Cao Liangcai, et al.. Three-dimensional object encryption and reconstruction based on computer generated hologram[C]. International Workshop on Holography and Related Technologies, 2014: 84-85.
[8] [8] Kong Dezhao, Shen Xueju, Shen Yaqin, et al.. Multi-image encryption based on interference of computer generated hologram[J]. Optik, 2014, 125(10): 2365-2368.
[9] [9] Zhang Yaping, Zhang Jianqiang, Chen wei, et al.. Fast computer generated hologram algorithm of triangle mesh models[J]. Chinese J Lasers, 2013, 40(7): 0709001.
[10] [10] Liu Kaifeng, Shen Chuan, Zhang Cheng, et al.. Iterative feedback algorithm for phase-only Fresnel hologram and display using liquid crystal on silicon[J]. Acta Photonica Sinaca, 2013, 43(5): 0509003.
[11] [11] Tsang P W M, Poon T C. Novel method for converting digital Fresnel hologram to phase-only hologram based on bidirectional error diffusion[J]. Opt Express, 2013, 21(20): 680-685.
[12] [12] Wang Haiyan. Study on Phase Retrieval Algorithm and Its Application[D]. Hefei: Anhui University, 2011: 1-31.
[13] [13] Donoho D L. Compressed sensing[J]. IEEE Transactions on Information Theory, 2006, 52(4): 1289-1306.
[14] [14] Han Chao, Wu Wei, Li Mengmeng. Encoding and reconstruction of lensless off- axis Fourier hologram based on the theory of compressed sensing[J]. Chinese J Lasers, 2014, 41(2): 0209015.
[15] [15] Liu Xiaoyong, Cao Yiping, Lu Pei. Research on optical image encryption technique with compressed sensing[J]. Acta Optica Sinica, 2014, 34(3): 0307002.
[16] [16] Yang Hairong, Zhang Cheng, Mo Wei, et al.. The theory of compressed sensing and reconstruction algorithm[J]. Acta Electronica Sinica, 2011, 39(1): 142-148.
[17] [17] Dai Haitao. Characteristics of LCOS Phase- Only Spatial Light Modulator and Its Applications[D]. Shanghai: Fudan University, 2005: 3-82.
Get Citation
Copy Citation Text
Han Chao, Wan Rui, Liu Yang, Wang Fengsui. A Double Encryption Algorithm Research Based on Computer Generated Hologram[J]. Chinese Journal of Lasers, 2015, 42(9): 909001
Received: Mar. 27, 2015
Accepted: --
Published Online: Sep. 6, 2015
The Author Email: Chao Han (hanchaozh@126.com)