T. Sarkadi and P. Koppa, “Quantitative security evaluation of optical encryption using hybrid phase- and amplitude-modulated keys,” Appl. Opt. 51, 745–750 (2012).

[CrossRef]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier-transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[CrossRef]

T. Sarkadi and P. Koppa, “Optical encryption using pseudorandom complex spatial modulation,” Appl. Opt. 51, 8068–8073 (2012).

[CrossRef]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[CrossRef]

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[CrossRef]

H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Impulse attack-free four random phase mask encryption based on a 4f optical system,” Appl. Opt. 48, 2356–2363 (2009).

[CrossRef]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Role of phase key in the double random phase encoding technique: an error analysis,” Appl. Opt. 47, 3808–3816 (2008).

[CrossRef]

M. S. Mahmud, I. Naydenova, and V. Toal, “Implementation of phase-only modulation utilizing a twisted nematic liquid crystal spatial light modulator,” J. Opt. A 10, 085007 (2008).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

H. Suzuki, M. Yamaguchi, M. Yachida, and N. Ohyama, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14, 1755–1766 (2006).

[CrossRef]

J. Joseph and D. A. Waldman, “Homogenized Fourier-transform holographic data storage using phase spatial light modulators and methods for recovery of data from the phase image,” Appl. Opt. 45, 6374–6380 (2006).

[CrossRef]

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. A 6, 401–411 (2004).

[CrossRef]

S. B. Wicker and V. K. Bhargava, Reed Solomon Codes and their Applications (IEEE, 1999).

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

H. J. Coufal, D. Psaltis, and G. T. Sincerbox, Holographic Data Storage (Springer, 2000).

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[CrossRef]

J. C. Dainty, Laser Speckle and Related Phenomena (Springer, 1975).

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Role of phase key in the double random phase encoding technique: an error analysis,” Appl. Opt. 47, 3808–3816 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

X. D. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with angular multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[CrossRef]

P. Refregier and B. Javidi, “Optical-image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[CrossRef]

T. Sarkadi and P. Koppa, “Quantitative security evaluation of optical encryption using hybrid phase- and amplitude-modulated keys,” Appl. Opt. 51, 745–750 (2012).

[CrossRef]

T. Sarkadi and P. Koppa, “Optical encryption using pseudorandom complex spatial modulation,” Appl. Opt. 51, 8068–8073 (2012).

[CrossRef]

P. Koppa, “Phase-to-amplitude data page conversion for holographic storage and optical encryption,” Appl. Opt. 46, 3561–3571 (2007).

[CrossRef]

T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. A 6, 401–411 (2004).

[CrossRef]

X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, “Secure optical memory system with polarization encryption,” Appl. Opt. 40, 2310–2315 (2001).

[CrossRef]

X. D. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[CrossRef]

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier-transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[CrossRef]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[CrossRef]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier-transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[CrossRef]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[CrossRef]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier-transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[CrossRef]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier-transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[CrossRef]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[CrossRef]

T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. A 6, 401–411 (2004).

[CrossRef]

T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. A 6, 401–411 (2004).

[CrossRef]

M. S. Mahmud, I. Naydenova, and V. Toal, “Implementation of phase-only modulation utilizing a twisted nematic liquid crystal spatial light modulator,” J. Opt. A 10, 085007 (2008).

[CrossRef]

X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, “Secure optical memory system with polarization encryption,” Appl. Opt. 40, 2310–2315 (2001).

[CrossRef]

X. D. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with angular multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[CrossRef]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Role of phase key in the double random phase encoding technique: an error analysis,” Appl. Opt. 47, 3808–3816 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Role of phase key in the double random phase encoding technique: an error analysis,” Appl. Opt. 47, 3808–3816 (2008).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

M. S. Mahmud, I. Naydenova, and V. Toal, “Implementation of phase-only modulation utilizing a twisted nematic liquid crystal spatial light modulator,” J. Opt. A 10, 085007 (2008).

[CrossRef]

H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[CrossRef]

H. Suzuki, M. Yamaguchi, M. Yachida, and N. Ohyama, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14, 1755–1766 (2006).

[CrossRef]

H. J. Coufal, D. Psaltis, and G. T. Sincerbox, Holographic Data Storage (Springer, 2000).

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. A 6, 401–411 (2004).

[CrossRef]

T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. A 6, 401–411 (2004).

[CrossRef]

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[CrossRef]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Role of phase key in the double random phase encoding technique: an error analysis,” Appl. Opt. 47, 3808–3816 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, “Secure optical memory system with polarization encryption,” Appl. Opt. 40, 2310–2315 (2001).

[CrossRef]

X. D. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[CrossRef]

H. J. Coufal, D. Psaltis, and G. T. Sincerbox, Holographic Data Storage (Springer, 2000).

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Impulse attack-free four random phase mask encryption based on a 4f optical system,” Appl. Opt. 48, 2356–2363 (2009).

[CrossRef]

D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Role of phase key in the double random phase encoding technique: an error analysis,” Appl. Opt. 47, 3808–3816 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[CrossRef]

H. Suzuki, M. Yamaguchi, M. Yachida, and N. Ohyama, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14, 1755–1766 (2006).

[CrossRef]

M. S. Mahmud, I. Naydenova, and V. Toal, “Implementation of phase-only modulation utilizing a twisted nematic liquid crystal spatial light modulator,” J. Opt. A 10, 085007 (2008).

[CrossRef]

T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. A 6, 401–411 (2004).

[CrossRef]

T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. A 6, 401–411 (2004).

[CrossRef]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

S. B. Wicker and V. K. Bhargava, Reed Solomon Codes and their Applications (IEEE, 1999).

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[CrossRef]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[CrossRef]

H. Suzuki, M. Yamaguchi, M. Yachida, and N. Ohyama, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14, 1755–1766 (2006).

[CrossRef]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier-transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[CrossRef]

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with angular multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[CrossRef]

X. D. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Role of phase key in the double random phase encoding technique: an error analysis,” Appl. Opt. 47, 3808–3816 (2008).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Impulse attack-free four random phase mask encryption based on a 4f optical system,” Appl. Opt. 48, 2356–2363 (2009).

[CrossRef]

T. Sarkadi and P. Koppa, “Quantitative security evaluation of optical encryption using hybrid phase- and amplitude-modulated keys,” Appl. Opt. 51, 745–750 (2012).

[CrossRef]

B. Yao, Z. Ren, N. Menke, Y. Wang, Y. Zheng, M. Lei, G. Chen, and N. Hampp, “Polarization holographic high-density optical data storage in bacteriorhodopsin film,” Appl. Opt. 44, 7344–7348 (2005).

[CrossRef]

X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, “Secure optical memory system with polarization encryption,” Appl. Opt. 40, 2310–2315 (2001).

[CrossRef]

J. Joseph and D. A. Waldman, “Homogenized Fourier-transform holographic data storage using phase spatial light modulators and methods for recovery of data from the phase image,” Appl. Opt. 45, 6374–6380 (2006).

[CrossRef]

P. Koppa, “Phase-to-amplitude data page conversion for holographic storage and optical encryption,” Appl. Opt. 46, 3561–3571 (2007).

[CrossRef]

T. Sarkadi and P. Koppa, “Optical encryption using pseudorandom complex spatial modulation,” Appl. Opt. 51, 8068–8073 (2012).

[CrossRef]

M. S. Mahmud, I. Naydenova, and V. Toal, “Implementation of phase-only modulation utilizing a twisted nematic liquid crystal spatial light modulator,” J. Opt. A 10, 085007 (2008).

[CrossRef]

T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. A 6, 401–411 (2004).

[CrossRef]

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[CrossRef]

H. Suzuki, M. Yamaguchi, M. Yachida, and N. Ohyama, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14, 1755–1766 (2006).

[CrossRef]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[CrossRef]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier-transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[CrossRef]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

P. Refregier and B. Javidi, “Optical-image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

J. C. Dainty, Laser Speckle and Related Phenomena (Springer, 1975).

H. J. Coufal, D. Psaltis, and G. T. Sincerbox, Holographic Data Storage (Springer, 2000).

S. B. Wicker and V. K. Bhargava, Reed Solomon Codes and their Applications (IEEE, 1999).