I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images,” Opt. Laser Technol. 60, 1–7 (2014).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

M. R. Abuturab, “Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding,” Appl. Opt. 52, 1555–1563 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

X. Ding, X. Deng, K. Song, and G. Chen, “Security improvement for asymmetric cryptosystem based on spherical wave illumination,” Appl. Opt. 52, 467–473 (2013).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20, 11994–12003 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009).

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48, 5933–5947 (2009).

[CrossRef]

H. Chang and C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[CrossRef]

I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images,” Opt. Laser Technol. 60, 1–7 (2014).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images,” Opt. Laser Technol. 60, 1–7 (2014).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48, 5933–5947 (2009).

[CrossRef]

M. R. Abuturab, “Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding,” Appl. Opt. 52, 1555–1563 (2013).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,” Appl. Opt. 52, 8854–8863 (2013).

[CrossRef]

X. Ding, X. Deng, K. Song, and G. Chen, “Security improvement for asymmetric cryptosystem based on spherical wave illumination,” Appl. Opt. 52, 467–473 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010).

[CrossRef]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[CrossRef]

Q. Wang, Q. Guo, and J. Zhou, “Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain,” Opt. Commun. 285, 4317–4323 (2012).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[CrossRef]

W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Opt. Commun. 301–302, 56–60 (2013).

[CrossRef]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[CrossRef]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

H. Chang and C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20, 11994–12003 (2012).

[CrossRef]

W. He, X. Peng, and X. Meng, “A hybrid strategy for cryptanalysis of optical encryption based on double-random phase–amplitude encoding,” Opt. Laser Technol. 44, 1203–1206 (2012).

[CrossRef]

I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images,” Opt. Laser Technol. 60, 1–7 (2014).

[CrossRef]

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Opt. Laser Technol. 48, 267–279 (2013).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013).

[CrossRef]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[CrossRef]