I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images,” Opt. Laser Technol. 60, 1–7 (2014).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

X. Ding, X. Deng, K. Song, and G. Chen, “Security improvement for asymmetric cryptosystem based on spherical wave illumination,” Appl. Opt. 52, 467–473 (2013).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

M. R. Abuturab, “Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding,” Appl. Opt. 52, 1555–1563 (2013).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20, 11994–12003 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48, 5933–5947 (2009).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009).

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

H. Chang and C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[CrossRef]

I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images,” Opt. Laser Technol. 60, 1–7 (2014).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images,” Opt. Laser Technol. 60, 1–7 (2014).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48, 5933–5947 (2009).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

X. Ding, X. Deng, K. Song, and G. Chen, “Security improvement for asymmetric cryptosystem based on spherical wave illumination,” Appl. Opt. 52, 467–473 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

M. R. Abuturab, “Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding,” Appl. Opt. 52, 1555–1563 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[CrossRef]

W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

H. Chang and C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20, 11994–12003 (2012).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images,” Opt. Laser Technol. 60, 1–7 (2014).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[CrossRef]