Y. Zhou, S. Agaian, V. M. Joyner, and K. Panetta, “Two Fibonacci p-code based image scrambling algorithms,” Proc. SPIE 6812, 681215 (2008).

R. Ye and H. Li, “A novel image scrambling and watermarking scheme based on cellular automata,” in *2008 International Symposium on Electronic Commerce and Security* (2008), pp. 938-941.

K. T. Lin, “Digital information encrypted in an image using binary encoding,” Opt. Commun. 281, 3447-3453(2008).

[CrossRef]

Y. Y. Wang, Y. R. Wang, Y. Wang, H. J. Li, and W. J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761-765 (2007).

[CrossRef]

Q. Liu and X. Zhang, “Secure 3D watermarking algorithm based on point set projection,” Proc. SPIE-Int. Soc. Opt. Eng. 6790, 67904R (2007).

H. Zhang, J. Huang, and Z. Li, “New method of digital image scrambling based on binary tree generated by chaotic sequences,” Proc. SPIE 6790, 67905D (2007).

J. Zhao, H. Lu, and Q. Fan, “Color image encryption based on fractional Fourier transforms and pixel scrambling technique,” Proc. SPIE 6279, 62793B (2007).

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289 (2006).

[CrossRef]

Y. L. Yang, N. Cai, and G. Q. Ni, “Digital image scrambling technology based on the symmetry of Arnold transform,” J. Beijing Inst. Technol. 15, 216-220 (2006).

S. L. Yeh, “Dot-matrix hologram with an encrypted figure,” Opt. Eng. 45, 095801 (2006).

X. Y. Yu, H. E. Ren, S. Li, and X. D. Zhang, “A new measurement method of image encryption,” J. Phys. Conf. Ser. 48, 408-411 (2006).

[CrossRef]

H. Lu, J. Zhao, Q. Fan, Y. Xu, and X. Wan, “Iterative double random phase encryption based on pixel scrambling technology,” Acta Photonica Sin. 34, 1069-1073 (2005).

B. Li and J. W. Xu, “Period of Arnold transformation and its application in image scrambling,” J. Cent. South Univ. Technol. 12, 278-282 (2005).

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499(2005).

[CrossRef]

T. Kong and D. Zhang, “A new anti-Arnold transformation algorithm,” J. Software 15, 1558-1564 (2004).

T. K. Shih, L. C. Lu, and R. C. Chang, “An automatic image in paint tool,” in *Proceedings of the Eleventh ACM International Conference on Multimedia*, (Association for Computing Machinery, 2003), pp. 102-103.

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fraction Fourier domains,” Opt. Lett. 28, 269-271 (2003).

[CrossRef]

C. C. Chang and J. C. Chuang, “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,” Pattern Recognit. Lett. 23, 931-941 (2002).

[CrossRef]

D. Qi, J. Zou, and X. Han, “A new class of scrambling transformation and its application in the image information covering,” Sci. China Ser. E Technol. Sci. 43, 304-312 (2000).

M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” Proc. SPIE 3657, 226-239(1999).

[CrossRef]

O. Lafe, “Data compression and encryption using cellular automata transforms,” Eng. Applic. Artif. Intell. 10, 581-591(1997).

G. Z. Hernández and H. J. Herrmann, “Cellular automata for elementary image enhancement,” Graphical Models Image Process. 58, 82-89 (1996).

Y. Zhou, S. Agaian, V. M. Joyner, and K. Panetta, “Two Fibonacci p-code based image scrambling algorithms,” Proc. SPIE 6812, 681215 (2008).

Y. L. Yang, N. Cai, and G. Q. Ni, “Digital image scrambling technology based on the symmetry of Arnold transform,” J. Beijing Inst. Technol. 15, 216-220 (2006).

C. C. Chang and J. C. Chuang, “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,” Pattern Recognit. Lett. 23, 931-941 (2002).

[CrossRef]

T. K. Shih, L. C. Lu, and R. C. Chang, “An automatic image in paint tool,” in *Proceedings of the Eleventh ACM International Conference on Multimedia*, (Association for Computing Machinery, 2003), pp. 102-103.

C. C. Chang and J. C. Chuang, “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,” Pattern Recognit. Lett. 23, 931-941 (2002).

[CrossRef]

J. Zhao, H. Lu, and Q. Fan, “Color image encryption based on fractional Fourier transforms and pixel scrambling technique,” Proc. SPIE 6279, 62793B (2007).

H. Lu, J. Zhao, Q. Fan, Y. Xu, and X. Wan, “Iterative double random phase encryption based on pixel scrambling technology,” Acta Photonica Sin. 34, 1069-1073 (2005).

D. Qi, J. Zou, and X. Han, “A new class of scrambling transformation and its application in the image information covering,” Sci. China Ser. E Technol. Sci. 43, 304-312 (2000).

G. Z. Hernández and H. J. Herrmann, “Cellular automata for elementary image enhancement,” Graphical Models Image Process. 58, 82-89 (1996).

G. Z. Hernández and H. J. Herrmann, “Cellular automata for elementary image enhancement,” Graphical Models Image Process. 58, 82-89 (1996).

H. Zhang, J. Huang, and Z. Li, “New method of digital image scrambling based on binary tree generated by chaotic sequences,” Proc. SPIE 6790, 67905D (2007).

Y. Zhou, S. Agaian, V. M. Joyner, and K. Panetta, “Two Fibonacci p-code based image scrambling algorithms,” Proc. SPIE 6812, 681215 (2008).

T. Kong and D. Zhang, “A new anti-Arnold transformation algorithm,” J. Software 15, 1558-1564 (2004).

M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” Proc. SPIE 3657, 226-239(1999).

[CrossRef]

O. Lafe, “Data compression and encryption using cellular automata transforms,” Eng. Applic. Artif. Intell. 10, 581-591(1997).

B. Li and J. W. Xu, “Period of Arnold transformation and its application in image scrambling,” J. Cent. South Univ. Technol. 12, 278-282 (2005).

R. Ye and H. Li, “A novel image scrambling and watermarking scheme based on cellular automata,” in *2008 International Symposium on Electronic Commerce and Security* (2008), pp. 938-941.

Y. Y. Wang, Y. R. Wang, Y. Wang, H. J. Li, and W. J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761-765 (2007).

[CrossRef]

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499(2005).

[CrossRef]

X. Y. Yu, H. E. Ren, S. Li, and X. D. Zhang, “A new measurement method of image encryption,” J. Phys. Conf. Ser. 48, 408-411 (2006).

[CrossRef]

H. Zhang, J. Huang, and Z. Li, “New method of digital image scrambling based on binary tree generated by chaotic sequences,” Proc. SPIE 6790, 67905D (2007).

K. T. Lin, “Digital information encrypted in an image using binary encoding,” Opt. Commun. 281, 3447-3453(2008).

[CrossRef]

Q. Liu and X. Zhang, “Secure 3D watermarking algorithm based on point set projection,” Proc. SPIE-Int. Soc. Opt. Eng. 6790, 67904R (2007).

J. Zhao, H. Lu, and Q. Fan, “Color image encryption based on fractional Fourier transforms and pixel scrambling technique,” Proc. SPIE 6279, 62793B (2007).

H. Lu, J. Zhao, Q. Fan, Y. Xu, and X. Wan, “Iterative double random phase encryption based on pixel scrambling technology,” Acta Photonica Sin. 34, 1069-1073 (2005).

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499(2005).

[CrossRef]

T. K. Shih, L. C. Lu, and R. C. Chang, “An automatic image in paint tool,” in *Proceedings of the Eleventh ACM International Conference on Multimedia*, (Association for Computing Machinery, 2003), pp. 102-103.

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499(2005).

[CrossRef]

Y. L. Yang, N. Cai, and G. Q. Ni, “Digital image scrambling technology based on the symmetry of Arnold transform,” J. Beijing Inst. Technol. 15, 216-220 (2006).

Y. Zhou, S. Agaian, V. M. Joyner, and K. Panetta, “Two Fibonacci p-code based image scrambling algorithms,” Proc. SPIE 6812, 681215 (2008).

M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” Proc. SPIE 3657, 226-239(1999).

[CrossRef]

D. Qi, J. Zou, and X. Han, “A new class of scrambling transformation and its application in the image information covering,” Sci. China Ser. E Technol. Sci. 43, 304-312 (2000).

X. Y. Yu, H. E. Ren, S. Li, and X. D. Zhang, “A new measurement method of image encryption,” J. Phys. Conf. Ser. 48, 408-411 (2006).

[CrossRef]

T. K. Shih, L. C. Lu, and R. C. Chang, “An automatic image in paint tool,” in *Proceedings of the Eleventh ACM International Conference on Multimedia*, (Association for Computing Machinery, 2003), pp. 102-103.

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499(2005).

[CrossRef]

Y. Y. Wang, Y. R. Wang, Y. Wang, H. J. Li, and W. J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761-765 (2007).

[CrossRef]

H. Lu, J. Zhao, Q. Fan, Y. Xu, and X. Wan, “Iterative double random phase encryption based on pixel scrambling technology,” Acta Photonica Sin. 34, 1069-1073 (2005).

Y. Y. Wang, Y. R. Wang, Y. Wang, H. J. Li, and W. J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761-765 (2007).

[CrossRef]

Y. Y. Wang, Y. R. Wang, Y. Wang, H. J. Li, and W. J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761-765 (2007).

[CrossRef]

Y. Y. Wang, Y. R. Wang, Y. Wang, H. J. Li, and W. J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761-765 (2007).

[CrossRef]

B. Li and J. W. Xu, “Period of Arnold transformation and its application in image scrambling,” J. Cent. South Univ. Technol. 12, 278-282 (2005).

H. Lu, J. Zhao, Q. Fan, Y. Xu, and X. Wan, “Iterative double random phase encryption based on pixel scrambling technology,” Acta Photonica Sin. 34, 1069-1073 (2005).

Y. L. Yang, N. Cai, and G. Q. Ni, “Digital image scrambling technology based on the symmetry of Arnold transform,” J. Beijing Inst. Technol. 15, 216-220 (2006).

R. Ye and H. Li, “A novel image scrambling and watermarking scheme based on cellular automata,” in *2008 International Symposium on Electronic Commerce and Security* (2008), pp. 938-941.

S. L. Yeh, “Dot-matrix hologram with an encrypted figure,” Opt. Eng. 45, 095801 (2006).

X. Y. Yu, H. E. Ren, S. Li, and X. D. Zhang, “A new measurement method of image encryption,” J. Phys. Conf. Ser. 48, 408-411 (2006).

[CrossRef]

T. Kong and D. Zhang, “A new anti-Arnold transformation algorithm,” J. Software 15, 1558-1564 (2004).

H. Zhang, J. Huang, and Z. Li, “New method of digital image scrambling based on binary tree generated by chaotic sequences,” Proc. SPIE 6790, 67905D (2007).

Q. Liu and X. Zhang, “Secure 3D watermarking algorithm based on point set projection,” Proc. SPIE-Int. Soc. Opt. Eng. 6790, 67904R (2007).

X. Y. Yu, H. E. Ren, S. Li, and X. D. Zhang, “A new measurement method of image encryption,” J. Phys. Conf. Ser. 48, 408-411 (2006).

[CrossRef]

J. Zhao, H. Lu, and Q. Fan, “Color image encryption based on fractional Fourier transforms and pixel scrambling technique,” Proc. SPIE 6279, 62793B (2007).

H. Lu, J. Zhao, Q. Fan, Y. Xu, and X. Wan, “Iterative double random phase encryption based on pixel scrambling technology,” Acta Photonica Sin. 34, 1069-1073 (2005).

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499(2005).

[CrossRef]

Y. Zhou, S. Agaian, V. M. Joyner, and K. Panetta, “Two Fibonacci p-code based image scrambling algorithms,” Proc. SPIE 6812, 681215 (2008).

D. Qi, J. Zou, and X. Han, “A new class of scrambling transformation and its application in the image information covering,” Sci. China Ser. E Technol. Sci. 43, 304-312 (2000).

H. Lu, J. Zhao, Q. Fan, Y. Xu, and X. Wan, “Iterative double random phase encryption based on pixel scrambling technology,” Acta Photonica Sin. 34, 1069-1073 (2005).

O. Lafe, “Data compression and encryption using cellular automata transforms,” Eng. Applic. Artif. Intell. 10, 581-591(1997).

G. Z. Hernández and H. J. Herrmann, “Cellular automata for elementary image enhancement,” Graphical Models Image Process. 58, 82-89 (1996).

Y. L. Yang, N. Cai, and G. Q. Ni, “Digital image scrambling technology based on the symmetry of Arnold transform,” J. Beijing Inst. Technol. 15, 216-220 (2006).

B. Li and J. W. Xu, “Period of Arnold transformation and its application in image scrambling,” J. Cent. South Univ. Technol. 12, 278-282 (2005).

X. Y. Yu, H. E. Ren, S. Li, and X. D. Zhang, “A new measurement method of image encryption,” J. Phys. Conf. Ser. 48, 408-411 (2006).

[CrossRef]

T. Kong and D. Zhang, “A new anti-Arnold transformation algorithm,” J. Software 15, 1558-1564 (2004).

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499(2005).

[CrossRef]

K. T. Lin, “Digital information encrypted in an image using binary encoding,” Opt. Commun. 281, 3447-3453(2008).

[CrossRef]

S. L. Yeh, “Dot-matrix hologram with an encrypted figure,” Opt. Eng. 45, 095801 (2006).

Y. Y. Wang, Y. R. Wang, Y. Wang, H. J. Li, and W. J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761-765 (2007).

[CrossRef]

C. C. Chang and J. C. Chuang, “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,” Pattern Recognit. Lett. 23, 931-941 (2002).

[CrossRef]

H. Zhang, J. Huang, and Z. Li, “New method of digital image scrambling based on binary tree generated by chaotic sequences,” Proc. SPIE 6790, 67905D (2007).

J. Zhao, H. Lu, and Q. Fan, “Color image encryption based on fractional Fourier transforms and pixel scrambling technique,” Proc. SPIE 6279, 62793B (2007).

M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” Proc. SPIE 3657, 226-239(1999).

[CrossRef]

Y. Zhou, S. Agaian, V. M. Joyner, and K. Panetta, “Two Fibonacci p-code based image scrambling algorithms,” Proc. SPIE 6812, 681215 (2008).

Q. Liu and X. Zhang, “Secure 3D watermarking algorithm based on point set projection,” Proc. SPIE-Int. Soc. Opt. Eng. 6790, 67904R (2007).

D. Qi, J. Zou, and X. Han, “A new class of scrambling transformation and its application in the image information covering,” Sci. China Ser. E Technol. Sci. 43, 304-312 (2000).

R. Ye and H. Li, “A novel image scrambling and watermarking scheme based on cellular automata,” in *2008 International Symposium on Electronic Commerce and Security* (2008), pp. 938-941.

T. K. Shih, L. C. Lu, and R. C. Chang, “An automatic image in paint tool,” in *Proceedings of the Eleventh ACM International Conference on Multimedia*, (Association for Computing Machinery, 2003), pp. 102-103.