N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[CrossRef]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using jigsaw transform for silhouette removal in interference-based methods and decryption with single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

S. Yuan, S.-X. Yao, Y.-H. Xin, and M.-T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011).

[CrossRef]

X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011).

[CrossRef]

X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50, 6645–6651 (2011).

[CrossRef]

Y. Han and Y. Zhang, “Optical image encryption based on two beams interference,” Opt. Commun. 283, 1690–1692 (2010).

[CrossRef]

C. H. Niu, X. L. Wang, N. G. Lv, Z. H Zhou, and X. Y. Li, “An encryption method with multiple encrypted keys based on interference principle,” Opt. Express 18, 7827–7834(2010).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photon. 1, 589–636 (2009).

[CrossRef]

H.-E. Hwang, H. T. Chang, and W.-N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[CrossRef]

X. Peng, P. Chang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

X. Peng, H. Wie, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006).

[CrossRef]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett. 25, 1159–1161 (2000).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photon. 1, 589–636 (2009).

[CrossRef]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photon. 1, 589–636 (2009).

[CrossRef]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[CrossRef]

W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011).

[CrossRef]

Y. Han and Y. Zhang, “Optical image encryption based on two beams interference,” Opt. Commun. 283, 1690–1692 (2010).

[CrossRef]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using jigsaw transform for silhouette removal in interference-based methods and decryption with single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

S. Yuan, S.-X. Yao, Y.-H. Xin, and M.-T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett. 25, 1159–1161 (2000).

[CrossRef]

W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011).

[CrossRef]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[CrossRef]

W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

X. Peng, H. Wie, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006).

[CrossRef]

X. Peng, P. Chang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using jigsaw transform for silhouette removal in interference-based methods and decryption with single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

N. Singh and A. Sinha, “Optical image encryption using fractional Fourier transform and chaos,” Opt. Lasers Eng. 46, 117–123 (2008).

[CrossRef]

N. Singh and A. Sinha, “Optical image encryption using fractional Fourier transform and chaos,” Opt. Lasers Eng. 46, 117–123 (2008).

[CrossRef]

W. Stallings, Cryptography and Network Security: Principles and Practice, 5th ed. (Prentice-Hall, 2011).

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

S. Yuan, S.-X. Yao, Y.-H. Xin, and M.-T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

S. Yuan, S.-X. Yao, Y.-H. Xin, and M.-T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

S. Yuan, S.-X. Yao, Y.-H. Xin, and M.-T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

Y. Han and Y. Zhang, “Optical image encryption based on two beams interference,” Opt. Commun. 283, 1690–1692 (2010).

[CrossRef]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[CrossRef]

Y. Han and Y. Zhang, “Optical image encryption based on two beams interference,” Opt. Commun. 283, 1690–1692 (2010).

[CrossRef]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[CrossRef]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011).

[CrossRef]

S. Yuan, S.-X. Yao, Y.-H. Xin, and M.-T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

C. H. Niu, X. L. Wang, N. G. Lv, Z. H Zhou, and X. Y. Li, “An encryption method with multiple encrypted keys based on interference principle,” Opt. Express 18, 7827–7834(2010).

[CrossRef]

N. Singh and A. Sinha, “Optical image encryption using fractional Fourier transform and chaos,” Opt. Lasers Eng. 46, 117–123 (2008).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

G. Situ and J. Zhang, “Multiple image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[CrossRef]

H.-E. Hwang, H. T. Chang, and W.-N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett. 25, 1159–1161 (2000).

[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]

X. Peng, P. Chang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

X. Peng, H. Wie, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photon. 1, 589–636 (2009).

[CrossRef]

W. Stallings, Cryptography and Network Security: Principles and Practice, 5th ed. (Prentice-Hall, 2011).