Y. Han and Y. Zhang, “Optical image encryption based on two beams’ interference,” Opt. Commun. 283, 1690–1692(2010).

[Crossref]

C-H. Niu, X-L. Wang, N-G. Lv, Z-H. Zhou, and X-Y. Li, “An encryption method with multiple encrypted keys based on interference principle,” Opt. Express 18, 7827–7834 (2010).

[Crossref]
[PubMed]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption based on interference under convergent random illumination,” J. Opt. 12, 095402 (2010).

[Crossref]

N. Zhu, Y. Wang, J. Liu, and J. Xie, “Holographic projection based on interference and analytical algorithm,” Opt. Commun. 283, 4969–4971 (2010),

[Crossref]

L. Chen, D. Zhao, and F. Ge., “Gray images embedded in a color image and encrypted with FRFT and Region shift encoding methods,” Opt. Commun. 283, 2043–2049 (2010).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009).

[Crossref]

B. Wang and Y. Zhang, “Double images hiding based on optics interference,” Proc. SPIE 7512, 751207 (2009).

[Crossref]

B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282, 3439–3443 (2009).

[Crossref]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13428 (2009).

[Crossref]
[PubMed]

Y-R. Piao, D-H. Shin, and E-S. Kim, “Robust image encryption by combined use of integral imaging and pixel scrambling techniques,” Opt. Lasers Eng. 47, 1273–1281 (2009).

[Crossref]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[Crossref]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

H-E. Hwang, H. T. Chang, and W-N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]
[PubMed]

P. Kumar, J. Joseph, and K. Singh, “Double random phase encryption with in-plane rotation of a modified Lohmann’s second-type system in the anamorphic fractional Fourier domain,” Opt. Eng. 47, 117001 (2008).

[Crossref]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[Crossref]
[PubMed]

X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008).

[Crossref]

Y-Y. Wang, Y-R. Wang, Y. Wang, H-J. Li, and W-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

X-F. Meng, L-Z. Cai, X-L. Yang, X-X. Shen, and G-Y. Dong., “Information security system by iterative multiple-phase retrieval and pixel random-permutation,” Appl. Opt. 45, 3289–3297 (2006).

[Crossref]
[PubMed]

H-E. Hwang and P. Han, “Fast algorithm of phase masks for image encryption in the Fresnel domain,” J. Opt. Soc. Am. A 23, 1870–1874 (2006).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Optical encryption and the space bandwidth product,” Opt. Commun. 247, 291–305(2005).

[Crossref]

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493–499(2005).

[Crossref]

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using fractional Fourier transform,” Opt. Eng. 42, 1583–1588 (2003).

[Crossref]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[Crossref]
[PubMed]

N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized fractional Fourier transform,” Opt. Eng. 42, 3566–3571 (2003).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier transform,” Optik (Jena) 114, 251–265(2003).

[Crossref]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009).

[Crossref]

X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008).

[Crossref]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

L. Chen, D. Zhao, and F. Ge., “Gray images embedded in a color image and encrypted with FRFT and Region shift encoding methods,” Opt. Commun. 283, 2043–2049 (2010).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009).

[Crossref]

X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008).

[Crossref]

X-F. Meng, L-Z. Cai, X-L. Yang, X-X. Shen, and G-Y. Dong., “Information security system by iterative multiple-phase retrieval and pixel random-permutation,” Appl. Opt. 45, 3289–3297 (2006).

[Crossref]
[PubMed]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

L. Chen, D. Zhao, and F. Ge., “Gray images embedded in a color image and encrypted with FRFT and Region shift encoding methods,” Opt. Commun. 283, 2043–2049 (2010).

[Crossref]

Y. Han and Y. Zhang, “Optical image encryption based on two beams’ interference,” Opt. Commun. 283, 1690–1692(2010).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Optical encryption and the space bandwidth product,” Opt. Commun. 247, 291–305(2005).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw transform in the Fresnel domain,” Opt. Eng. 43, 2239–2249 (2004).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier transform,” Optik (Jena) 114, 251–265(2003).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption based on interference under convergent random illumination,” J. Opt. 12, 095402 (2010).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Double random phase encryption with in-plane rotation of a modified Lohmann’s second-type system in the anamorphic fractional Fourier domain,” Opt. Eng. 47, 117001 (2008).

[Crossref]

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using fractional Fourier transform,” Opt. Eng. 42, 1583–1588 (2003).

[Crossref]

N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized fractional Fourier transform,” Opt. Eng. 42, 3566–3571 (2003).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

Y-R. Piao, D-H. Shin, and E-S. Kim, “Robust image encryption by combined use of integral imaging and pixel scrambling techniques,” Opt. Lasers Eng. 47, 1273–1281 (2009).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption based on interference under convergent random illumination,” J. Opt. 12, 095402 (2010).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Double random phase encryption with in-plane rotation of a modified Lohmann’s second-type system in the anamorphic fractional Fourier domain,” Opt. Eng. 47, 117001 (2008).

[Crossref]

Y-Y. Wang, Y-R. Wang, Y. Wang, H-J. Li, and W-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493–499(2005).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009).

[Crossref]

N. Zhu, Y. Wang, J. Liu, and J. Xie, “Holographic projection based on interference and analytical algorithm,” Opt. Commun. 283, 4969–4971 (2010),

[Crossref]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13428 (2009).

[Crossref]
[PubMed]

Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009).

[Crossref]

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493–499(2005).

[Crossref]

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493–499(2005).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008).

[Crossref]

X-F. Meng, L-Z. Cai, X-L. Yang, X-X. Shen, and G-Y. Dong., “Information security system by iterative multiple-phase retrieval and pixel random-permutation,” Appl. Opt. 45, 3289–3297 (2006).

[Crossref]
[PubMed]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using fractional Fourier transform,” Opt. Eng. 42, 1583–1588 (2003).

[Crossref]

N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized fractional Fourier transform,” Opt. Eng. 42, 3566–3571 (2003).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

Y-R. Piao, D-H. Shin, and E-S. Kim, “Robust image encryption by combined use of integral imaging and pixel scrambling techniques,” Opt. Lasers Eng. 47, 1273–1281 (2009).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[Crossref]

X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008).

[Crossref]

X-F. Meng, L-Z. Cai, X-L. Yang, X-X. Shen, and G-Y. Dong., “Information security system by iterative multiple-phase retrieval and pixel random-permutation,” Appl. Opt. 45, 3289–3297 (2006).

[Crossref]
[PubMed]

B. M. Hennelly and J. T. Sheridan, “Optical encryption and the space bandwidth product,” Opt. Commun. 247, 291–305(2005).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw transform in the Fresnel domain,” Opt. Eng. 43, 2239–2249 (2004).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier transform,” Optik (Jena) 114, 251–265(2003).

[Crossref]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[Crossref]
[PubMed]

Y-R. Piao, D-H. Shin, and E-S. Kim, “Robust image encryption by combined use of integral imaging and pixel scrambling techniques,” Opt. Lasers Eng. 47, 1273–1281 (2009).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption based on interference under convergent random illumination,” J. Opt. 12, 095402 (2010).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Double random phase encryption with in-plane rotation of a modified Lohmann’s second-type system in the anamorphic fractional Fourier domain,” Opt. Eng. 47, 117001 (2008).

[Crossref]

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using fractional Fourier transform,” Opt. Eng. 42, 1583–1588 (2003).

[Crossref]

N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized fractional Fourier transform,” Opt. Eng. 42, 3566–3571 (2003).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493–499(2005).

[Crossref]

Y-Y. Wang, Y-R. Wang, Y. Wang, H-J. Li, and W-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[Crossref]

N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized fractional Fourier transform,” Opt. Eng. 42, 3566–3571 (2003).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[Crossref]

B. Wang and Y. Zhang, “Double images hiding based on optics interference,” Proc. SPIE 7512, 751207 (2009).

[Crossref]

B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282, 3439–3443 (2009).

[Crossref]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[Crossref]
[PubMed]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

N. Zhu, Y. Wang, J. Liu, and J. Xie, “Holographic projection based on interference and analytical algorithm,” Opt. Commun. 283, 4969–4971 (2010),

[Crossref]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13428 (2009).

[Crossref]
[PubMed]

Y-Y. Wang, Y-R. Wang, Y. Wang, H-J. Li, and W-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

Y-Y. Wang, Y-R. Wang, Y. Wang, H-J. Li, and W-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

Y-Y. Wang, Y-R. Wang, Y. Wang, H-J. Li, and W-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

N. Zhu, Y. Wang, J. Liu, and J. Xie, “Holographic projection based on interference and analytical algorithm,” Opt. Commun. 283, 4969–4971 (2010),

[Crossref]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13428 (2009).

[Crossref]
[PubMed]

X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008).

[Crossref]

X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008).

[Crossref]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13428 (2009).

[Crossref]
[PubMed]

X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008).

[Crossref]

Y. Han and Y. Zhang, “Optical image encryption based on two beams’ interference,” Opt. Commun. 283, 1690–1692(2010).

[Crossref]

B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282, 3439–3443 (2009).

[Crossref]

B. Wang and Y. Zhang, “Double images hiding based on optics interference,” Proc. SPIE 7512, 751207 (2009).

[Crossref]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[Crossref]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[Crossref]
[PubMed]

L. Chen, D. Zhao, and F. Ge., “Gray images embedded in a color image and encrypted with FRFT and Region shift encoding methods,” Opt. Commun. 283, 2043–2049 (2010).

[Crossref]

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493–499(2005).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009).

[Crossref]

N. Zhu, Y. Wang, J. Liu, and J. Xie, “Holographic projection based on interference and analytical algorithm,” Opt. Commun. 283, 4969–4971 (2010),

[Crossref]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13428 (2009).

[Crossref]
[PubMed]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption based on interference under convergent random illumination,” J. Opt. 12, 095402 (2010).

[Crossref]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).

[Crossref]

B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282, 3439–3443 (2009).

[Crossref]

Y. Han and Y. Zhang, “Optical image encryption based on two beams’ interference,” Opt. Commun. 283, 1690–1692(2010).

[Crossref]

G. Situ and J. Zhang, “A lenseless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).

[Crossref]

N. Zhu, Y. Wang, J. Liu, and J. Xie, “Holographic projection based on interference and analytical algorithm,” Opt. Commun. 283, 4969–4971 (2010),

[Crossref]

W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Optical encryption and the space bandwidth product,” Opt. Commun. 247, 291–305(2005).

[Crossref]

J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493–499(2005).

[Crossref]

L. Chen, D. Zhao, and F. Ge., “Gray images embedded in a color image and encrypted with FRFT and Region shift encoding methods,” Opt. Commun. 283, 2043–2049 (2010).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009).

[Crossref]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw transform in the Fresnel domain,” Opt. Eng. 43, 2239–2249 (2004).

[Crossref]

N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized fractional Fourier transform,” Opt. Eng. 42, 3566–3571 (2003).

[Crossref]

N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using fractional Fourier transform,” Opt. Eng. 42, 1583–1588 (2003).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Double random phase encryption with in-plane rotation of a modified Lohmann’s second-type system in the anamorphic fractional Fourier domain,” Opt. Eng. 47, 117001 (2008).

[Crossref]

H-E. Hwang, H. T. Chang, and W-N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]
[PubMed]

C-H. Niu, X-L. Wang, N-G. Lv, Z-H. Zhou, and X-Y. Li, “An encryption method with multiple encrypted keys based on interference principle,” Opt. Express 18, 7827–7834 (2010).

[Crossref]
[PubMed]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13428 (2009).

[Crossref]
[PubMed]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

Y-R. Piao, D-H. Shin, and E-S. Kim, “Robust image encryption by combined use of integral imaging and pixel scrambling techniques,” Opt. Lasers Eng. 47, 1273–1281 (2009).

[Crossref]

Y-Y. Wang, Y-R. Wang, Y. Wang, H-J. Li, and W-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[Crossref]
[PubMed]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]
[PubMed]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier transform,” Optik (Jena) 114, 251–265(2003).

[Crossref]

X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

B. Wang and Y. Zhang, “Double images hiding based on optics interference,” Proc. SPIE 7512, 751207 (2009).

[Crossref]

B.Javidi, ed., Optical and Digital Techniques for Information Security (Springer-Verlag, 2005).

[Crossref]