J. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[CrossRef]

X. Shi, D. Zhao, and Y. Huang, “Double images hiding by using joint transform correlator architecture adopting two-step phase-shifting digital holography,” Opt. Commun. 297, 32–37 (2013).

[CrossRef]

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Joint transform correlator-based encryption system using the Fresnel transform and nonlinear filtering,” Proc. SPIE 8785, 87853J (2013).

[CrossRef]

J. Li, T. Zheng, Q.-z. Liu, and R. Li, “Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography,” Opt. Commun. 285, 1704–1709 (2012).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

M. Tebaldi, S. Horrillo, E. Pérez-Cabré, M. S. Millán, D. Amaya, R. Torroba, and N. Bolognini, “Experimental color encryption in a joint transform correlator architecture,” J. Phys. Conf. Ser. 274, 012054 (2011).

[CrossRef]

G. Situ, G. Pedrini, and W. Osten, “Strategy for cryptanalysis of optical encryption in the Fresnel domain,” Appl. Opt. 49, 457–462 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Holographic encryption system in the Fresnel domain with convergent random illumination,” Opt. Eng. 49, 095803 (2010).

[CrossRef]

E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Commun. 282, 3243–3249 (2009).

[CrossRef]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Programmable two-dimensional optical fractional Fourier processor,” Opt. Express 17, 4976–4983 (2009).

[CrossRef]

W. Liu, G. Yang, and H. Xie, “A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption,” Opt. Express 17, 13928–13938 (2009).

[CrossRef]

C.-L. Chen, L.-C. Lin, and C.-J. Cheng, “Design and implementation of an optical joint transform encryption system using complex-encoded key mask,” Opt. Eng. 47, 068201 (2008).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

C. La Mela and C. Iemmi, “Optical encryption using phase-shifting interferometry in a joint transform correlator,” Opt. Lett. 31, 2562–2564 (2006).

[CrossRef]

H. T. Chang and C.-C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006).

[CrossRef]

G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A 8, 391–397 (2006).

[CrossRef]

L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[CrossRef]

E. Pérez, M. S. Millán, and K. Chałasińska-Macukow, “Optical pattern recognition with adjustable sensitivity to shape and texture,” Opt. Commun. 202, 239–255 (2002).

[CrossRef]

E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry,” Appl. Opt. 39, 2313–2320 (2000).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

E. Pérez, K. Chałasińska-Macukow, K. Styczyński, R. Kotyński, and M. S. Millán, “Dual nonlinear correlator based on computer controlled joint transform processor: digital analysis and optical results,” J. Mod. Opt. 44, 1535–1552 (1997).

[CrossRef]

R. W. Gerchberg and O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

M. Tebaldi, S. Horrillo, E. Pérez-Cabré, M. S. Millán, D. Amaya, R. Torroba, and N. Bolognini, “Experimental color encryption in a joint transform correlator architecture,” J. Phys. Conf. Ser. 274, 012054 (2011).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Commun. 282, 3243–3249 (2009).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

M. Tebaldi, S. Horrillo, E. Pérez-Cabré, M. S. Millán, D. Amaya, R. Torroba, and N. Bolognini, “Experimental color encryption in a joint transform correlator architecture,” J. Phys. Conf. Ser. 274, 012054 (2011).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

E. Pérez, M. S. Millán, and K. Chałasińska-Macukow, “Optical pattern recognition with adjustable sensitivity to shape and texture,” Opt. Commun. 202, 239–255 (2002).

[CrossRef]

E. Pérez, K. Chałasińska-Macukow, K. Styczyński, R. Kotyński, and M. S. Millán, “Dual nonlinear correlator based on computer controlled joint transform processor: digital analysis and optical results,” J. Mod. Opt. 44, 1535–1552 (1997).

[CrossRef]

C.-L. Chen, L.-C. Lin, and C.-J. Cheng, “Design and implementation of an optical joint transform encryption system using complex-encoded key mask,” Opt. Eng. 47, 068201 (2008).

[CrossRef]

C.-L. Chen, L.-C. Lin, and C.-J. Cheng, “Design and implementation of an optical joint transform encryption system using complex-encoded key mask,” Opt. Eng. 47, 068201 (2008).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

R. C. Gonzalez, R. E. Woods, and S. L. Eddins, Digital Image Processing Using Matlab, 2nd ed. (Gatesmark, 2009).

R. W. Gerchberg and O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

R. C. Gonzalez, R. E. Woods, and S. L. Eddins, Digital Image Processing Using Matlab, 2nd ed. (Gatesmark, 2009).

J. W. Goodman, Introduction to Fourier Optics (McGraw-Hill, 1996).

E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Commun. 282, 3243–3249 (2009).

[CrossRef]

B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw encryption in the Fresnel domain,” Opt. Eng. 43, 2239–2249 (2004).

[CrossRef]

M. Tebaldi, S. Horrillo, E. Pérez-Cabré, M. S. Millán, D. Amaya, R. Torroba, and N. Bolognini, “Experimental color encryption in a joint transform correlator architecture,” J. Phys. Conf. Ser. 274, 012054 (2011).

[CrossRef]

X. Shi, D. Zhao, and Y. Huang, “Double images hiding by using joint transform correlator architecture adopting two-step phase-shifting digital holography,” Opt. Commun. 297, 32–37 (2013).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry,” Appl. Opt. 39, 2313–2320 (2000).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Holographic encryption system in the Fresnel domain with convergent random illumination,” Opt. Eng. 49, 095803 (2010).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

E. Pérez, K. Chałasińska-Macukow, K. Styczyński, R. Kotyński, and M. S. Millán, “Dual nonlinear correlator based on computer controlled joint transform processor: digital analysis and optical results,” J. Mod. Opt. 44, 1535–1552 (1997).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Holographic encryption system in the Fresnel domain with convergent random illumination,” Opt. Eng. 49, 095803 (2010).

[CrossRef]

H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay, The Fractional Fourier Transform: with Applications in Optics and Signal Processing (Wiley, 2001).

J. Li, T. Zheng, Q.-z. Liu, and R. Li, “Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography,” Opt. Commun. 285, 1704–1709 (2012).

[CrossRef]

J. Li, T. Zheng, Q.-z. Liu, and R. Li, “Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography,” Opt. Commun. 285, 1704–1709 (2012).

[CrossRef]

C.-L. Chen, L.-C. Lin, and C.-J. Cheng, “Design and implementation of an optical joint transform encryption system using complex-encoded key mask,” Opt. Eng. 47, 068201 (2008).

[CrossRef]

J. Li, T. Zheng, Q.-z. Liu, and R. Li, “Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography,” Opt. Commun. 285, 1704–1709 (2012).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

J. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[CrossRef]

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Joint transform correlator-based encryption system using the Fresnel transform and nonlinear filtering,” Proc. SPIE 8785, 87853J (2013).

[CrossRef]

M. Tebaldi, S. Horrillo, E. Pérez-Cabré, M. S. Millán, D. Amaya, R. Torroba, and N. Bolognini, “Experimental color encryption in a joint transform correlator architecture,” J. Phys. Conf. Ser. 274, 012054 (2011).

[CrossRef]

E. Pérez, M. S. Millán, and K. Chałasińska-Macukow, “Optical pattern recognition with adjustable sensitivity to shape and texture,” Opt. Commun. 202, 239–255 (2002).

[CrossRef]

E. Pérez, K. Chałasińska-Macukow, K. Styczyński, R. Kotyński, and M. S. Millán, “Dual nonlinear correlator based on computer controlled joint transform processor: digital analysis and optical results,” J. Mod. Opt. 44, 1535–1552 (1997).

[CrossRef]

M. S. Millán and E. Pérez-Cabré, “Optical data encryption,” Optical and Digital Image Processing: Fundamentals and Applications, G. Cristóbal, P. Schelkens, and H. Thienpont, eds. (Wiley, 2011), pp. 739–767.

H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay, The Fractional Fourier Transform: with Applications in Optics and Signal Processing (Wiley, 2001).

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

E. Pérez, M. S. Millán, and K. Chałasińska-Macukow, “Optical pattern recognition with adjustable sensitivity to shape and texture,” Opt. Commun. 202, 239–255 (2002).

[CrossRef]

E. Pérez, K. Chałasińska-Macukow, K. Styczyński, R. Kotyński, and M. S. Millán, “Dual nonlinear correlator based on computer controlled joint transform processor: digital analysis and optical results,” J. Mod. Opt. 44, 1535–1552 (1997).

[CrossRef]

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Joint transform correlator-based encryption system using the Fresnel transform and nonlinear filtering,” Proc. SPIE 8785, 87853J (2013).

[CrossRef]

J. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[CrossRef]

M. Tebaldi, S. Horrillo, E. Pérez-Cabré, M. S. Millán, D. Amaya, R. Torroba, and N. Bolognini, “Experimental color encryption in a joint transform correlator architecture,” J. Phys. Conf. Ser. 274, 012054 (2011).

[CrossRef]

M. S. Millán and E. Pérez-Cabré, “Optical data encryption,” Optical and Digital Image Processing: Fundamentals and Applications, G. Cristóbal, P. Schelkens, and H. Thienpont, eds. (Wiley, 2011), pp. 739–767.

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Commun. 282, 3243–3249 (2009).

[CrossRef]

R. W. Gerchberg and O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw encryption in the Fresnel domain,” Opt. Eng. 43, 2239–2249 (2004).

[CrossRef]

X. Shi, D. Zhao, and Y. Huang, “Double images hiding by using joint transform correlator architecture adopting two-step phase-shifting digital holography,” Opt. Commun. 297, 32–37 (2013).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Holographic encryption system in the Fresnel domain with convergent random illumination,” Opt. Eng. 49, 095803 (2010).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

G. Situ, G. Pedrini, and W. Osten, “Strategy for cryptanalysis of optical encryption in the Fresnel domain,” Appl. Opt. 49, 457–462 (2010).

[CrossRef]

G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A 8, 391–397 (2006).

[CrossRef]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

E. Pérez, K. Chałasińska-Macukow, K. Styczyński, R. Kotyński, and M. S. Millán, “Dual nonlinear correlator based on computer controlled joint transform processor: digital analysis and optical results,” J. Mod. Opt. 44, 1535–1552 (1997).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

M. Tebaldi, S. Horrillo, E. Pérez-Cabré, M. S. Millán, D. Amaya, R. Torroba, and N. Bolognini, “Experimental color encryption in a joint transform correlator architecture,” J. Phys. Conf. Ser. 274, 012054 (2011).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

M. Tebaldi, S. Horrillo, E. Pérez-Cabré, M. S. Millán, D. Amaya, R. Torroba, and N. Bolognini, “Experimental color encryption in a joint transform correlator architecture,” J. Phys. Conf. Ser. 274, 012054 (2011).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Commun. 282, 3243–3249 (2009).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

J. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[CrossRef]

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Joint transform correlator-based encryption system using the Fresnel transform and nonlinear filtering,” Proc. SPIE 8785, 87853J (2013).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

R. C. Gonzalez, R. E. Woods, and S. L. Eddins, Digital Image Processing Using Matlab, 2nd ed. (Gatesmark, 2009).

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

J. Li, T. Zheng, Q.-z. Liu, and R. Li, “Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography,” Opt. Commun. 285, 1704–1709 (2012).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry,” Appl. Opt. 39, 2313–2320 (2000).

[CrossRef]

G. Situ, G. Pedrini, and W. Osten, “Strategy for cryptanalysis of optical encryption in the Fresnel domain,” Appl. Opt. 49, 457–462 (2010).

[CrossRef]

E. Pérez, K. Chałasińska-Macukow, K. Styczyński, R. Kotyński, and M. S. Millán, “Dual nonlinear correlator based on computer controlled joint transform processor: digital analysis and optical results,” J. Mod. Opt. 44, 1535–1552 (1997).

[CrossRef]

J. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[CrossRef]

G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A 8, 391–397 (2006).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007).

[CrossRef]

M. Tebaldi, S. Horrillo, E. Pérez-Cabré, M. S. Millán, D. Amaya, R. Torroba, and N. Bolognini, “Experimental color encryption in a joint transform correlator architecture,” J. Phys. Conf. Ser. 274, 012054 (2011).

[CrossRef]

X. Shi, D. Zhao, and Y. Huang, “Double images hiding by using joint transform correlator architecture adopting two-step phase-shifting digital holography,” Opt. Commun. 297, 32–37 (2013).

[CrossRef]

E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Commun. 282, 3243–3249 (2009).

[CrossRef]

J. Li, T. Zheng, Q.-z. Liu, and R. Li, “Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography,” Opt. Commun. 285, 1704–1709 (2012).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

E. Pérez, M. S. Millán, and K. Chałasińska-Macukow, “Optical pattern recognition with adjustable sensitivity to shape and texture,” Opt. Commun. 202, 239–255 (2002).

[CrossRef]

C.-L. Chen, L.-C. Lin, and C.-J. Cheng, “Design and implementation of an optical joint transform encryption system using complex-encoded key mask,” Opt. Eng. 47, 068201 (2008).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Holographic encryption system in the Fresnel domain with convergent random illumination,” Opt. Eng. 49, 095803 (2010).

[CrossRef]

B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw encryption in the Fresnel domain,” Opt. Eng. 43, 2239–2249 (2004).

[CrossRef]

L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[CrossRef]

J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express 20, 3388–3393 (2012).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

H. T. Chang and C.-C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006).

[CrossRef]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Programmable two-dimensional optical fractional Fourier processor,” Opt. Express 17, 4976–4983 (2009).

[CrossRef]

W. Liu, G. Yang, and H. Xie, “A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption,” Opt. Express 17, 13928–13938 (2009).

[CrossRef]

Z. Zalevsky, D. Mendlovic, and R. G. Dorsch, “Gerchberg–Saxton algorithm applied in the fractional Fourier or the Fresnel domain,” Opt. Lett. 21, 842–844 (1996).

[CrossRef]

P. Pellat-Finet, “Fresnel diffraction and the fractional-order Fourier transform,” Opt. Lett. 19, 1388–1390 (1994).

[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35, 3553–3555 (2010).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]

C. La Mela and C. Iemmi, “Optical encryption using phase-shifting interferometry in a joint transform correlator,” Opt. Lett. 31, 2562–2564 (2006).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[CrossRef]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

R. W. Gerchberg and O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Joint transform correlator-based encryption system using the Fresnel transform and nonlinear filtering,” Proc. SPIE 8785, 87853J (2013).

[CrossRef]

H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay, The Fractional Fourier Transform: with Applications in Optics and Signal Processing (Wiley, 2001).

R. C. Gonzalez, R. E. Woods, and S. L. Eddins, Digital Image Processing Using Matlab, 2nd ed. (Gatesmark, 2009).

J. W. Goodman, Introduction to Fourier Optics (McGraw-Hill, 1996).

M. S. Millán and E. Pérez-Cabré, “Optical data encryption,” Optical and Digital Image Processing: Fundamentals and Applications, G. Cristóbal, P. Schelkens, and H. Thienpont, eds. (Wiley, 2011), pp. 739–767.