Phase retrieval algorithm for optical information security
Wang Shi-Qing, Meng Xiang-Feng, Wang Yu-Rong, Yin Yong-Kai, Yang Xiu-Lun
       

Flow chart of (a) authentication process, (b) high-level authentication process, and (c) low-level authentication process.