基于光学信息处理技术的多图像压缩加密与隐藏算法的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
光学信息安全是近年来在国际上新兴的、涉及交叉学科的信息安全技术。光学系统固有的高速并行处理能力、光波在自由空间传播的参数,如波长、衍射距离、振幅、相位等,均使得基于光学信息处理系统的加密或隐藏技术,较之传统信息安全技术,具有创新技术下的信息加工、大容量高效信息存储和多维度并行处理等优势。
     近年来,在光学信息安全领域,涌现出大量针对多幅图像的光学信息安全技术,这些技术在内容分发、多用户身份认证及提高秘密信息的传输和存储效率等方面有广泛应用。针对这一热点,本论文结合光学信息安全的研究现状、重点介绍了近年来有关多图像光学信息安全技术的发展;通过研究常见的光学加密算法和隐藏技术,针对关键问题进行了系统和全面的分析,提出了基于光学信息处理技术的多图像压缩加密与隐藏的算法,主要工作可概括为以下四方面:
     1)利用计算全息仿真光学扫描全息系统,实现一束激光对多幅图像的同步扫描和全息记录;利用衍射距离复用和掩码板,打乱数字全息的复振幅光强分布,以达到加密效果。在解密时,为了确保多图像解密分离的同步性和重建质量,利用Tikhonov正则化(Tikhonov Regularization)逆问题求解方法,实现解密分离。数值实验验证了该方案的可行性和鲁棒性;通过测试该算法参数的灵敏度,分析了算法的安全性;最后通过与同类算法相比证明该方法具有较好的重建效果。
     2)利用压缩全息技术,首次在全息加密系统中实现对全息密文数据的压缩。首先,通过对光学扫描全息系统的系统函数分析,论证了该函数具有傅里叶变换特性;再次,鉴于自然图像在小波变换域内的稀疏性,且小波稀疏基与傅里叶基是不相干的,满足约束等距性,利用在多图像加密过程中的傅里叶非均匀采样,完成多图像压缩加密。最后,在逆问题求解模型中引入对图像小波基下的稀疏性约束,完成多图像的同步解密重建。
     3)利用全变分(Total Variation)求解方法和小波预处理,实现对多个自然图像的压缩加密。首先,在已有的基于压缩全息的加密方案中,通过优化求解模型,以约束细节信息的全变分项代替约束光滑性的l2范数,实现了对两张自然图像的压缩加密;接着,为了减少激光在对多幅图像并行扫描时引入的串扰问题,借助小波预处理,对各个秘密图像的基本信息错位排放,完成了对多幅自然图像的压缩加密;最后,针对韩国世宗大学光电实验室的物理光学扫描全息设备生成的全息数据,实现了对真实数据的压缩加密。实验部分验证了该方案的可行性,分析了其压缩性能、重建质量及算法的安全性。
     4)基于相位恢复算法,提出以较少透镜完成对多幅图像的信息隐藏。首先,通过相位滤波器,实现对多幅待隐藏图像的频移复用,输出一张包含所有待隐藏图像频域信息的图;接着,利用相位恢复算法,寻找特定的相位板,使得待隐藏图像经过调制后趋近于载体图像;最后将含有秘密信息的载体,放置在正确的位置,应用相位板和相位滤波器即可还原对应的秘密图像。数值实验验证了该算法的可行性,分析了其迭代收敛性、不可感知性、鲁棒性及压缩性能。
Optical information security is becoming a state-of-the-art cross-discipline topic nowadays. An optical system is characterized by the powerful capability of information processing parallely across three dimensions and advantageous at providing multiple parameters regulating a propagation, such as a wavelength, diffraction distance, amplitude and phase. These advantages guarantee the information encryption and hiding by optical processing to perform at multiple dimensions with a mass-storage, and parallel information processing, apparently over conventional information security techniques. Recently, a great number of optical information security techniques for multiple images mushroom, which results in the fact that these techniques can be translated into applications of content distribution, multiple-user authorization and confidential information transferring and storing.
     The thesis summarizes the progress of optical information security and introduces advances of image encryption by optical system and techniques. Based on these widely used optical encoding systems and hiding technologies, we proposed to encrypt and hide multiple images compressively and meanwhile resolve key related problems systematically and completely. In the thesis, we started with the fundamental analysis of optical information processing to verify the feasibility and performance. Then the computational optics was involved to introduce the techniques originated from optical information processing into the application, such as specific domain hidden in optics. The physical optical system was used to demonstrate the algorithms and performance in terms of parallel processing in optics. Major contributions covers four aspects as follows,
     1) Multiple images are scanned and recorded simultaneously based on digital holography simulating optical scanning holography. The encryption is further improved by multiplexing the diffraction distance and applying masks to shuffle the distribution of complex amplitude of digital holograms. The decryption is modeled by an inverse problem and the solution is optimized by the Tikhonov regularization. The results from numerical experiments demonstrates the feasibility, robustness and security of the algorithm and the reconstruction of images is advantageous over existing algorithms.
     2) Taking advantage of compressive hologram, it is roposed to compress encrypted holograms by non-uniform down sampling. In the algorithm, we deduce the optical transfer function of the optical scanning holography and reveal the function analogous to certain kind of Fourier transform. Furthermore, owing to the sparsity of natural images under wavelet decomposition and the incoherence between wavelet sparsity operator and Fourier operator, a non-uniform down sampling of Fourier holograms is guaranteed to reconstruct original images based on the compressive sensing theory. Finally, the reconstruction is implemented by solving an inverse problem with a sparse constraint.
     3) Total variation is involved to reconstructing imaged with fine edges and wavelet processing is employed as a pre-processing step to record information of multiple images. The above algorithm lays a foundation for an encryption strategy by a compressive hologram. Here the solving operation is optimized with a total variation to achieve images with edges in replace of a12norm. In order to reduce the cross-talk effect during scanning multiple images, the wavelet decomposition is utilized as a pre-processing step to avoid overlapping of multiple image information, which ensures the information of images recorded completely. Not only is the algorithm demonstrated by a simulation, but also it is implemented in a physical optical scanning holography system. These experiments verifies the algorithm, investigate the compressive capability and reconstruction quality.
     4) The phase retrieval algorithm realizes the multiple-image hiding with less lenses. Phase filters are involved in the algorithm to hide several image by frequency multiplexing. It outputs an image containing all frequency information of images. The phase retrieval method is introduced to find a specific phase mask to modulate the image similar to the carrier image and we take the correlation coefficient as the threshold. Finally, the carrier image is displaced into the right position and original secret images are extracted with the corresponding mask and phase filters. Numerical experiment demonstrates the feasibility of the algorithm and analyze the recognition of hiding information and the convergence of phase retrieval algorithm.
引文
[1]Podbielska, H. and Kobel, J., "Review of optical techniques for protection of documents and other objects", Warsaw, Poland,2001, pp.93-97.
    [2]Refregier, P. and Javidi, B. "Optical image encryption based on input plane and Fourier plane random encoding", Optics Letters, vol.20(7),1995, pp.767-769.
    [3]Wang, R. K., Watson, I. A. and Chatwin, C. "Random phase encoding for optical security", Optical Engineering, vol.35,1996, p.2464.
    [4]Yoshikawa, N., Itoh, M. and Yatagai, T. "Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography", Optics Letters, vol.23(18),1998, pp.1483-1485.
    [5]Peng, X., Yu, L. and Cai, L. L. "Double-lock for image encryption with virtual optical wavelength", Optics Express, vol.10(1),2002, pp.41-45.
    [6]Kishk, S. and Javidi, B. "3D object watermarking by a 3D hidden object", Optics Express, vol.11(8),2003, pp.874-888.
    [7]Carnicer, A., Montes-Usategui, M., Arcos, S., et al. "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys", Optics Letters, vol.30(13),2005, pp.1644-1646.
    [8]Shi, Y, Situ, G. and Zhang, J. "Optical image hiding in the Fresnel domain", Journal of Optics A:Pure and Applied Optics, vol.8,2006, pp.569-577.
    [9]He, M., Tan, Q., Cao, L., et al. "Security enhanced optical encryption system by random phase key and permutation key", Optics Express, vol.17(25),2009, pp. 22462-22473.
    [10]Alfalou, A. and Brosseau, C. "Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption", Optics Letters, vol.35(11),2010, pp.1914-1916.
    [11]Di, H., Zheng, K. F., Zhang, X., et al. "Multiple-image encryption by compressive holography", Applied Optics, vol.51(7),2012, pp.1000-1009.
    [12]Matoba, O., Nomura, T., Perez-Cabre, E., et al. "Optical techniques for information security", Proceedings of the IEEE, vol.97(6),2009, pp.1128-1148.
    [13]Javidi, B. and Horner, J. L., "Optical pattern recognition for validation and security verification", Orlando, FL, USA,1994, pp.224-230.
    [14]Javidi, B., Optical and digital techniques for information security vol.1:Springer Verlag,2005.
    [15]Situ, G. and Zhang, J. "Image hiding with computer-generated phase codes for optical authentication", Optics Communications, vol.245(1),2005, pp.55-65.
    [16]Shi, Y., Situ, G. and Zhang, J. "Multiple-image hiding by information prechoosing", Optics Letters, vol.33(6),2008, pp.542-544.
    [17]Situ, G. and Zhang, J. "Double random-phase encoding in the Fresnel domain" Optics Letters, vol.29(14),2004, pp.1584-1586.
    [18]Kishk, S. and Javidi, B. "Information hiding technique with double phase encoding", Applied Optics, vol.41(26),2002, pp.5462-5470.
    [19]Kishk, S. and Javidi, B. "Watermarking of three-dimensional objects by digital holography", Optics Letters, vol.28(3),2003, pp.167-169.
    [20]Psaltis, D., Paek, E. G. and Venkatesh, S. S. "Optical-image correlation with a binary spatial light-modulator", Optical Engineering, vol.23(6),1984, pp. 698-704.
    [21]Javidi, B. and Kuo, C.-J. "Joint transform image correlation using a binary spatial light modulator at the Fourier plane", Applied Optics, vol.27(4),1988, pp. 663-665.
    [22]Ahmed, F. and Moskowitz, I. S. "Correlation-based watermarking method for image authentication applications", Optical Engineering, vol.43(8),2004, pp. 1833-1838.
    [23]Javidi, B. and Sergent, A. "Fully phase encoded key and biometrics for security verification", Optical Engineering, vol.36(3),1997, pp.935-942.
    [24]Parlitz, U., Chua, L. and Kocarev, L. "Experimental demonstration of secure communications via chaotic synchronization", Int JBC, vol.2(3),1992, pp. 709-713.
    [25]Situ, G. and Zhang, J. "Multiple-image encryption by wavelength multiplexing", Optics Letters, vol.30(11),2005, pp.1306-1308.
    [26]Meng, X. F., Cai, L. Z., Wang, Y. R., et al. "Digital image synthesis and multiple-image encryption based on parameter multiplexing and phase-shifting interferometry", Optics and Lasers in Engineering, vol.47(1),2009, pp.96-102.
    [27]Tao, R., Lang, J. and Wang, Y. "Optical image encryption based on the multiple-parameter fractional Fourier transform", Optics Letters, vol.33(6),2008, pp.581-583.
    [28]党杰,林秋华,殷福亮.”基于盲源分离的多幅顺序图像加密方法”,电子与信息学报,vol.29(6),2007,pp.1471-1475.
    [29]史祎诗,张静娟.”相位恢复算法用于分区复用多图像加密的研究”,光学学报,vol.29(10),2009,pp.2705-2708.
    [30]唐聃,王晓京,陈峥.”新的图像加密方法”,电子科技大学学报,vol.39(1),2010,pp.128-132.
    [31]He, M. Z., Cai, L. Z., Liu, Q., et al. "Multiple image encryption and watermarking by random phase matching", Optics Communications, vol.247(1),2005, pp. 29-37.
    [32]Alfalou, A. and Mansour, A. "Double random phase encryption scheme to multiplex and simultaneous encode multiple images", Applied Optics, vol.48(31), 2009, pp.5933-5947.
    [33]Liu, Z. and Liu, S. "Double image encryption based on iterative fractional Fourier transform", Optics Communications, vol.275(2),2007, pp.324-329.
    [34]Liu, Z., Dai, J., Sun, X., et al. "Triple image encryption scheme in fractional Fourier transform domains", Optics Communications, vol.282(4),2009, pp. 518-522.
    [35]Ge, F., Chen, L. and Zhao, D. "A half-blind color image hiding and encryption method in fractional Fourier domains", Optics Communications, vol.281(17), 2008, pp.4254-4260.
    [36]Tao, R., Xin, Y. and Wang, Y. "Double image encryption based on random phase encoding in the fractional Fourier domain", Optics Express, vol.15(24),2007, pp. 16067-16079.
    [37]Tsang, P., Poon, T. C. and Cheung, K. "Fast numerical generation and encryption of computer-generated Fresnel holograms", Applied Optics, vol.50(7),2011, pp. B46-B52.
    [38]Chang, H. T., Hwang, H.-E., Lee, C.-L., et al. "Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain", Applied Optics, vol.50(5),2011, pp.710-716.
    [39]Shi, Y, Situ, G. and Zhang, J. "Multiple-image hiding in the Fresnel domain", Optics Letters, vol.32(13),2007, pp.1914-1916.
    [40]Nomura, T. and Javidi, B. "Optical encryption using a joint transform correlator architecture", Optical Engineering, vol.39(8),2000, pp.2031-2035.
    [41]Lu, D. and Jin, W. "Color image encryption based on joint fractional Fourier transform correlator", Optical Engineering, vol.50(6),2011, pp.068201-068207.
    [42]Islam, M. N., Karim, M. A., Alam, M. S., et al. "Optical cryptographic system employing multiple reference-based joint transform correlation technique", Optical Engineering, vol.50(6),2011, pp.068202-068212.
    [43]Rueda, E., Barrera, J. F., Henao, R., et al. "Lateral shift multiplexing with a modified random mask in a joint transform correlator encrypting architecture" Optical Engineering, vol.48(2),2009, pp.027006-0270012.
    [44]Chen, C.-L., Lin, L.-C. and Cheng, C.-J. "Design and implementation of an optical joint transform encryption system using complex-encoded key mask", Optical Engineering, vol.47(6),2008, pp.068201-068209.
    [45]Nelleri, A., Joseph, J. and Singh, K. "Lensless complex data encoding for digital holographic whole information security", Optical Engineering, vol.47(11),2008, pp.115801-1158010.
    [46]Nishchal, N. K., Joseph, J. and Singh, K. "Fully phase encryption using digital holography", Optical Engineering, vol.43(12),2004, pp.2959-2966.
    [47]Meng, X., Cai, L., He, M., et al. "Cross-talk-free double-image encryption and watermarking with amplitude-phase separate modulations", Journal of Optics A: Pure and Applied Optics, vol.7,2005, pp.624-631.
    [48]Li, H. and Wang, Y. "Double-image encryption based on iterative gyrator transform", Optics Communications, vol.281(23),2008, pp.5745-5749.
    [49]季瑾,黄飞,王亮等.”利用数字全息和相位恢复算法实现信息加密”,中国激光,vol.34(10),2007,pp.1408-1412.
    [501 Alfalou, A. and Brosseau, C. "Optical image compression and encryption methods", Advances in Optics and Photonics, vol.1(3),2009, pp.589-636.
    [51]Wang, X., Zhao, D., Jing, F., et al. "Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics", Optics Express, vol.14(4),2006 Feb 20, pp.1476-1486.
    [52]司徒国海,张静娟,史祎诗.”三步相移数字全息术用于相位密钥的复制”,光电子·激光,vol.17(7),2006,pp.884-886.
    [53]Meng, X., Cai, L., Xu, X., et al. "Two-step phase-shifting interferometry and its application in image encryption", Optics Letters, vol.31(10),2006, pp. 1414-1416.
    [54]狄宏,郑康锋,伍淳华等.”利用距离复用实现多幅图像的同步加密”,北京邮电大学学报(自然科学版),vol.34(6),2011,pp.1-4.
    [55]Di,H., Zheng, K. F., Niu, X. X., et al., "Multiple-image compressed encryption and decryption by compressive holography", in Visual Communications and Image Processing(VCIP2011), Tainan City, Taiwan.,2011, pp.1-4.
    [56]Shi, X. and Zhao, D. "Color image hiding based on the phase retrieval technique and Arnold transform", Applied Optics, vol.50(14),2011, pp.2134-2139.
    [57]Mosso, F., Barrera, J. F., Tebaldi, M., et al. "All-optical encrypted movie", Optics Express, vol.19(6),2011, pp.5706-5712.
    [58]彭翔,汤红乔,田劲东.”双随机相位编码光学加密系统的唯密文攻击”,物理学报,vol.56(5),2007,pp.2629-2636.
    [59]彭翔,位恒政,张鹏.”基于菲涅耳域的双随机相位编码系统的选择明文攻击”,物理学报,vol.56(7),2007,pp.3924-3930.
    [60]彭翔,张鹏,位恒政等.”双随机相位加密系统的已知明文攻击”,物理学报,vol.55(3),2006,pp.1130-1136.
    [611 Naughton, T. J. "Phase in Optical Image Processing", AIP Conference Proceedings, vol.1236(1),2010, pp.235-240.
    [62]Li, H. and Wang, Y. "Information security system based on iterative multiple-phase retrieval in gyrator domain", Optics & Laser Technology, vol. 40(7),2008, pp.962-966.
    [63]Sun, M. and SU, X. "Technology of Double Random Phase Encode Data Hidden in RGB Images", Acta Photonica Sinica, vol.37(2),2008, pp.320-324.
    [64]Wang, B. and Zhang, Y. "Double images hiding based on optical interference", Optics Communications, vol.282(17),2009, pp.3439-3443.
    [65]Sheng, Y, Xin, Z., Alam, M. S., et al. "Information hiding based on double random-phase encoding and public-key cryptography", Optics Express, vol.17(5), 2009, pp.3270-3284.
    [66]Wang, X. and Zhao, D. "Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval", Optics Communications, vol.284(19),2011, pp.4441-4445.
    [67]朱竹青,冯少彤,聂守平等.”基于离散余弦变换的复值加密图像隐藏技术中国激光,vol.36(1),2009,pp.177-181.
    [68]Deng, S., Liu, L., Lang, H., et al. "Hiding an image in cascaded Fresnel digital holograms", Chinese Optics Letters, vol.4(5),2006, pp.268-271.
    [69]彭翔,白伟东,田劲东.”半色调编码计算全息图的数字水印方法”,光学学报,vol.27(6),2007,pp.1011-1017.
    [70]Chen, D. Q., Gu, J. H. and Tao, Z., "Image information hiding based on CGH of phase-only interference holography",2010, pp.197-201.
    [71]Rosen, J. and Javidi, B. "Hidden Images in Halftone Pictures", Applied Optics, vol.40(20),2001, pp.3346-3353.
    [72]Situ, G. and Zhang, J. "Position multiplexing for multiple-image encryption", Journal of Optics A:Pure and Applied Optics, vol.8(5),2006, pp.391-397.
    [73]Chen, L. and Zhao, D. "Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms", Optics Express, vol. 14(19),2006, pp.8552-8560.
    [74]Hwang, H.-E., Chang, H. T. and Lie, W.-N. "Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain", Optics Letters, vol.34(24),2009, pp.3917-3919.
    [75]Chang, H. T., Hwang, H.-E. and Lee, C.-L. "Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain", Optics Communications, vol.284(18),2011, pp.4146-4151.
    [76]Alfalou, A., Elbouz, M., Jridi, M., et al., "A new simultaneous compression and encryption method for images suitable to recognize form by optical correlation", in Proc. SPIE Berlin, Germany,2009, pp.74860J1-74860J8.
    [77]吴友朋,刘祥萱,王红霞.”提高数字全息再现像像质的两步相移迭代算法’光学学报,vol.28(12),2008,pp.2292-2295.
    [78]潘武,田贻丽.”光学全息的数字实现”,光学精密工程,vol.13(zl),2005,pp.15-20.
    [79]Kim, K. T., Kim, J. H. and Kim, E. S. "Multiple information hiding technique using random sequence and Hadamard matrix", Optical Engineering, vol.40(11), 2001, pp.2489-2494.
    [80]Kim, J. J., Choi, J. H. and Kim, E. S. "Optodigital implementation of multiple information hiding and extraction system", Optical Engineering, vol.43,2004, pp. 113-125.
    [81]Liu, N. and Guo, D., "Multiple Image Information Hiding Technique Based on Chaotic Sequences",2007, pp.1720-1725.
    [82]李洪安,刘晓霞,朱玲芳等.”基于分存的多幅图像信息隐藏方案”,计算机应用研究,vol.26(6),2009,pp.2170-2172.
    [83]Hwang, H. E., Chang, H. T. and Lie, W. N. "Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems", Optics Express, vol.17(16),2009, pp.13700-13710.
    [84]Meng, X. F., Cai, L. Z., Yang, X. L., et al. "Information security system by iterative multiple-phase retrieval and pixel random permutation", Applied Optics, vol.45(14),2006, pp.3289-3297.
    [85]Carnicer, A., Montes-Usategui, M., Arcos, S., et al. "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys", Opt. Lett., vol.30(13),2005, p.1644-1646.
    [86]Peng, X., Zhang, P., Wei, H., et al. "Known-plaintext attack on optical encryption based on double random phase keys", Optics Letters, vol.31(8),2006, pp. 1044-1046.
    [87]Peng, X., Wei, H. and Zhang, P. "Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain", Optics Letters, vol.31(22), 2006, pp.3261-3263.
    [88]Fienup, J. R. "Phase retrieval algorithms:a comparison", Applied Optics, vol. 21(15),1982, pp.2758-2769.
    [89]Rosen, J. "Learning in correlators based on projections onto constraint sets", Optics Letters, vol.18(14),1993, pp.1183-1185.
    [90]Liang, X.Y., Xin, Z., Sheng, Y., et al. "Multiple-image optical encryption:an improved encoding approach", Applied Optics, vol.48(14),2009, pp.2686-2692.
    [91]Liang, X.Y., Xin, Z., Sheng, Y., et al. "Multiple-image parallel optical encryption", Optics Communications, vol.283(14),2010, pp.2789-2793.
    [92]Meng, X., Cai, L., Wang, Y., et al. "Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain", Journal of Optics A:Pure and Applied Optics, vol.9,2007, pp.1070-1075.
    [93]Diab, S. L. "Developing an algorithm for compression, multiplexing and enhancement of multiple images", Optics & Laser Technology, vol.43(4),2011, pp.838-847.
    [94]张怡霄,罗克俭,黄奇忠等.”彩虹全息标识的计算全息加密”,四川大学学报(自然科学版),vol.37(1),2000,pp.51-54.
    [95]Kishk, S., El-Nagger, T. and Samra, A., "Optical encryption and decryption of three dimensional objects by computer generated holograms",2009, pp.1-13.
    [96]黄奇忠,杜惊雷,张怡霄等.”计算全息实现信息相干分解及其在图像加密中的应用”,中国激光,vol.10(27),2000,pp.903-906.
    [97]Wang, Y. Y., Wang, Y R., Wang, Y., et al. "Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology", Optics and Lasers in Engineering, vol.45(7),2007, pp.761-765.
    [98]Rosen, J., Brooker, G., Indebetouw, G., et al. "A review of incoherent digital Fresnel holography", J. Holography Speckle, vol.5,2009, pp.124-140.
    [99]Rivenson, Y., Stern, A. and Javidi, B. "Compressive Fresnel Holography", Journal of Display Technology, vol.6(10),2010, pp.506-509.
    [100]Liu, Z., Zhang, Y., Zhao, H., et al. "Optical multi-image encryption based on frequency shift", Optik-International Journal for Light and Electron Optics, vol. 122(11),2011, pp.1010-1013.
    [101]狄宏,郑康锋,钮心忻.”基于迭代相位恢复算法的多图像隐藏算法”,南京理工大学学报(自然科学版),已录用2012.07(增刊)
    [102]Lohmann, A. W. and Sinzinger, S., Optical information processing:Lohmann, 1978.
    [103]王仕璠,信息光学理论与应用.北京:北京邮电大学出版社,2004.
    [104]陈家璧,苏显渝,朱伟利,光学信息技术原理及应用:高等教育出版社,2002.
    [105]Goodman, J. W.,秦克诚,傅里叶光学导论.北京:电子工业出版社,2006.
    [106]Gabor, D. "A new microscopic principle", Nature, vol.161(4098),1948, pp. 777-778.
    [107]Spagnolo, G. S., Simonetti, C. and Cozzella, L. "Content fragile watermarking based on a computer generated hologram coding technique", Journal of Optics A: Pure and Applied Optics, vol.7,2005, pp.333-342.
    [108]Brown, B. R. and Lohmann, A. W. "Complex Spatial Filtering with Binary Masks", Applied Optics, vol.5(6),1966, pp.967-969.
    [109]Hadamard, J., Lectures on Cauchy's problem in linear partial differential equations:Dover Pubns,2003.
    [110]肖庭延,于慎根,王彦飞,反问题的数值解法.北京:科学出版社,2003.
    [111]Tikhonov, A., "Solution of incorrectly formulated problems and the regularization method", in Soviet Math. Doklady,1963, pp.1035-1038.
    [112]Phillips, D. L. "A technique for the numerical solution of certain integral equations of the first kind", Journal of the ACM (JACM), vol.9(1),1962, pp. 84-97.
    [113]林理菁,”离散Tikhonov正则化解的条件数以及加权Moore-Penrose逆的二阶条件数问题,”理学硕士,数学科学学院,复旦大学,上海,2007.
    [114]Vito, L. "Sulle funzioni di piu variabili a variazione limitata", Archive for Rational Mechanics and Analysis, vol.3(1),1959, pp.60-81.
    [115]Rudin, L. I., Osher, S. and Fatemi, E. "Nonlinear total variation based noise removal algorithms", Physica D:Nonlinear Phenomena, vol.60(1-4),1992, pp. 259-268.
    [116]李树涛,魏丹.”压缩传感综述”,自动化学报,vol.35(11),2009,pp.1369-1377.
    [117]Donoho, D. L. "Compressed sensing", Information Theory, IEEE Transactions on, vol.52(4),2006, pp.1289-1306.
    [118]Baraniuk, R. G. "Compressive sensing", Signal Processing Magazine, IEEE, vol. 24(4),2007, pp.118-121.
    [119]曾阳素,郭永康,谢世伟等.”双重分数傅里叶变换计算全息”,光学学报,vol.23(2),2003,pp.155-1 58.
    [120]葛宝臻,罗文国,吕且妮等.”数字再现三维物体菲涅耳计算全息的研究”,光电子·激光,vol.13(12),2002,pp.1289-1292.
    [121]Schnars, U. and Juptner, W. P. O. "Digital recording and numerical reconstruction of holograms", Measurement Science and Technology, vol.13(9),2002, pp. R85-R101.
    [122]Poon, T., Optical scanning holography with MATLAB:Springer Verlag,2007.
    [123]Zhang, X., Lam, E. Y. and Poon, T.-C. "Reconstruction of sectional images in holography using inverse imaging", Optics Express, vol.16(22),2008, pp. 17215-17226.
    [1241 Poon, T. "Scanning holography and two-dimensional image processing by acousto-optic two-pupil synthesis", Journal of the Optical Society of America A, vol.2(4),1985, pp.521-527.
    [125]孙萍,谢敬辉.”3-D成像新技术——光学外差扫描全息术”,光学精密工程,vol.11(5),2003,pp.502-507.
    [126]Brady, D. J., Choi, K., Marks, D. L., et al. "Compressive Holography", Optics Express, vol.17(15),2009, pp.13040-13049.
    [127]Lustig, M., Donoho, D. L., Santos, J. M., et al. "Compressed sensing MRI", Signal Processing Magazine, IEEE, vol.25(2),2008, pp.72-82.
    [128]Lustig, M., Donoho, D. and Pauly, J. M. "Sparse MRI:The application of compressed sensing for rapid MR imaging", Magnetic Resonance in Medicine, vol.58(6),2007, pp.1182-1195.
    [129]Emmanuel, C. and Justin, R. "Sparsity and incoherence in compressive sampling", Inverse Problem, vol.23(3),2007, pp.969-985.
    [130]Candes, E. J. and Wakin, M. B. "An Introduction To Compressive Sampling", IEEE Signal Proc Mag, vol.25(2),2008, pp.21-30.
    [131]Goodman, J. W., Introduction to Fourier Optics,3 ed. Greenwood Village, CO: Roberts & Co. Publishers,2005.
    [132]Goodman, J. W. and Cox, M. E. "Introduction to Fourier Optics", Physics Today, vol.22,1969, p.97.
    [133]Zhang, X. and Lam, E. Y. "Edge-preserving sectional image reconstruction in optical scanning holography", JOSA A, vol.27(7),2010, pp.1630-1637.
    [134]宋菲君, S.Jutamulia,近代光学信息处理.北京:北京大学出版社,1998.
    [135]Gerchberg, R. W. and Saxton, W. O. "A practical algorithm for the determination of the phase from image and diffraction plane pictures", Optik-International Journal for Light and Electron Optics, vol.35(2),1972, pp.237-246.
    [136]杨国侦,顾本源.”光学系统中振幅和相位的恢复问题”,物理学报,vol.30(3),1981,pp.410-413.
    [137]Bauschke, H. H., Combettes, P. L. and Luke, D. R. "Hybrid projection-reflection method for phase retrieval", JOSA A, vol.20(6),2003, pp.1025-1034.
    [138]于斌,彭翔,田劲东等.”硬x射线同轴相衬成像的相位恢复”,物理学报,vol.54(5),2005,pp.2034-2037.