Phase retrieval algorithm for optical information security
Wang Shi-Qing, Meng Xiang-Feng, Wang Yu-Rong, Yin Yong-Kai, Yang Xiu-Lun
       

(a) Simulated result in high-level authentication, and (b) NCC distribution of retrieved image in low-level authentication and corresponding standard certification image.