[1] JIANG Li, NIU Tian-ye, XU Zheng-quan, et al. Integrating encryption and marking for remote sensing image based on orthogonal decomposition[J]. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2015, 8(5):2232-2239.
[2] ZOPE-CHAUDHARI S, VENKATACHALAM P, BUDDHIRAJU K M.Secure dissemination and protection of multispectral images using crypto-watermarking[J]. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2015, 8(11):5388-5394.
[3] WANG Xian-min, GUAN Ze-qun, WU Chen-han. An adaptive wavelet two-dimension watermarking algorithm for remote sensing image[J]. Electronic Imaging and Multimedia Technology IV, 2005, 5637.
[4] REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J].Optics Letters, 1995, 20(7):767-769.
[5] LIU Zheng-jun, LI She, LIU Wei, et al. Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding[J]. Optics and Lasers in Engineering, 2013, 51(1):8-14.
[6] SITU Guo-hai, ZHANG Jing-juan. Double random-phase encoding in the Fresnel domain[J]. Optics Letters, 2004, 29(14):1584-1586.
[7] UNNIKRISHNAN G, JOSEPH J, SINGH K. Optical encryption by double-random phase encoding in the fractional Fourier domain[J].Optics Letters, 2000, 25(12):887-889.
[8] ABUTURAB M R. Information authentication system using interference of two beams in gyrator transform domain[J]. Applied Optics, 2013, 52(21):5133-5142.
[9] PENG Xiang, ZHANG Peng, WEI Heng-zheng, et al. Known-plaintext attack on optical encryption based on double random phase keys[J]. Optics Letters, 2006, 31(8):1044-1046.
[10] QIN Wan, PENG Xiang. Asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Optics Letters, 2010, 35(2):118-120.
[11] WANG Xiao-gang, ZHAO Dao-mu. Image encoding based on coherent superposition and basic vector operations[J]. Optics Communications, 2011, 284(4):945-951.
[12] ZHOU Nan-run, WANG Yi-xian, GONG Li-hua, et al. Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform[J]. Optics Communications, 2011, 284(12):2789-2796.
[13] MALUENDA D, CARNICER A, MARTINEZ-HERRERO R, et al. Optical encryption using photon-counting polarimetric imaging[J]. Optics Express, 2015, 23(2):655-666.
[14] ZHANG Hua-min, DING Feng. On the Kronecker products and their applications[J]. Journal of Applied Mathematics, 2013:465-482.
[15] CHEN Hang, DU Xiao-ping, LIU Zheng-jun, et al. Color image encryption based on the affine transform and gyrator transform[J]. Optics and Lasers in Engineering, 2013, 51(6):768-775.
[16] YAO Li-li, YUAN Cao-jin, QIANG Jun-jie, et al. An asymmetric color image encryption method by using deduced gyrator transform[J]. Optics and Lasers in Engineering, 2016, 89:72-79.
[17] WU Jia-hui, LIAO Xiao-feng, YANG Bo. Color image encryption based on chaotic systems and elliptic curve EIGamal scheme[J].Signal Processing, 2017, 141:109-124.
[18] SHAHRIYAR T, FATHI M H, SEKHAVAT Y A. An image encryption scheme based on elliptic curve pseudo random and advanced encryption system[J]. Signal Processing, 2017, 141:217-227.
[19] WANG Xiao-lei, ZHAI Hong-chen, LI Zhi-lei, et al. Double random-phase encryption based on discrete quaternion fourier-transforms[J]. Optik, 2011, 122(20):1856-1859.
[20] SU Yong-gang, TANG Chen, GAO Guan-nan, et al. Optical encryption scheme for multiple color images using complete trinary tree structure[J]. Optics and Lasers in Engineering, 2017, 98:46-55.