N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using modified Gerchberg–Saxton algorithm and phase modulation in Fresnel transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]
[PubMed]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg–Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]
[PubMed]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled encryption via a joint transform correlator architecture,” Appl. Opt. 47, 5903–5907 (2008).

[Crossref]

M. Paturzo, P. Memmolo, L. Miccio, A. Finizio, P. Ferrarro, A. Tulino, and B. Javidi, “Numerical multiplexing and demultiplexing of digital holographic information for remote reconstruction in amplitude and phase,” Opt. Lett. 33, 2629–2631 (2008).

[Crossref]
[PubMed]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060–1066 (2007).

[Crossref]
[PubMed]

H. E. Hwang and P. Han, “Signal reconstruction algorithm based on a single intensity in the Fresnel domain,” Opt. Express 15, 3766–3776 (2007).

[Crossref]
[PubMed]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).

[Crossref]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]
[PubMed]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[Crossref]

G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, “Public-key-based optical image cryptosystem with data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[Crossref]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik 114, 473–477 (2003).

[Crossref]

Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002).

[Crossref]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4815–4834 (2002).

[Crossref]

C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, “Design of cascaded phase keys for hierarchical security system,” Appl. Opt. 41, 6128–6134 (2002).

[Crossref]
[PubMed]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain B,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

R. W. Gerchberg and W. O. Saxton, “Phase determination for image and diffraction plane pictures in the electron microscope,” Optik 34, 275–284 (1971).

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg–Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]
[PubMed]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using modified Gerchberg–Saxton algorithm and phase modulation in Fresnel transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]
[PubMed]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[Crossref]

G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, “Public-key-based optical image cryptosystem with data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[Crossref]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4815–4834 (2002).

[Crossref]

C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, “Design of cascaded phase keys for hierarchical security system,” Appl. Opt. 41, 6128–6134 (2002).

[Crossref]
[PubMed]

H. T. Chang, “Image encryption using separate amplitude-based virtual image and iteratively retrieved phase information,” Opt. Eng. 40, 2165–2171 (2001).

[Crossref]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[Crossref]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, “Public-key-based optical image cryptosystem with data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[Crossref]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

R. W. Gerchberg and W. O. Saxton, “Phase determination for image and diffraction plane pictures in the electron microscope,” Optik 34, 275–284 (1971).

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using modified Gerchberg–Saxton algorithm and phase modulation in Fresnel transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]
[PubMed]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg–Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]
[PubMed]

H. E. Hwang and P. Han, “Signal reconstruction algorithm based on a single intensity in the Fresnel domain,” Opt. Express 15, 3766–3776 (2007).

[Crossref]
[PubMed]

H. E. Hwang and P. Han, “Fast algorithm of phase masks for image encryption in the Fresnel domain,” J. Opt. Soc. Am. A 23, 1870–1874 (2006).

[Crossref]

M. Paturzo, P. Memmolo, L. Miccio, A. Finizio, P. Ferrarro, A. Tulino, and B. Javidi, “Numerical multiplexing and demultiplexing of digital holographic information for remote reconstruction in amplitude and phase,” Opt. Lett. 33, 2629–2631 (2008).

[Crossref]
[PubMed]

B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060–1066 (2007).

[Crossref]
[PubMed]

P. Refregier and B. Javidi, “Optical image encryption using input and Fourier plane random phase encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]
[PubMed]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[Crossref]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4815–4834 (2002).

[Crossref]

C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, “Design of cascaded phase keys for hierarchical security system,” Appl. Opt. 41, 6128–6134 (2002).

[Crossref]
[PubMed]

G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, “Public-key-based optical image cryptosystem with data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg–Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]
[PubMed]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using modified Gerchberg–Saxton algorithm and phase modulation in Fresnel transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]
[PubMed]

G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, “Public-key-based optical image cryptosystem with data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4815–4834 (2002).

[Crossref]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[Crossref]

B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060–1066 (2007).

[Crossref]
[PubMed]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[Crossref]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

R. W. Gerchberg and W. O. Saxton, “Phase determination for image and diffraction plane pictures in the electron microscope,” Optik 34, 275–284 (1971).

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A: Pure Appl. Opt. 8, 391–397 (2006).

[Crossref]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).

[Crossref]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik 114, 473–477 (2003).

[Crossref]

Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002).

[Crossref]

B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060–1066 (2007).

[Crossref]
[PubMed]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain B,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A: Pure Appl. Opt. 8, 391–397 (2006).

[Crossref]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).

[Crossref]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik 114, 473–477 (2003).

[Crossref]

Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002).

[Crossref]

Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002).

[Crossref]

C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, “Design of cascaded phase keys for hierarchical security system,” Appl. Opt. 41, 6128–6134 (2002).

[Crossref]
[PubMed]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[Crossref]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4815–4834 (2002).

[Crossref]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled encryption via a joint transform correlator architecture,” Appl. Opt. 47, 5903–5907 (2008).

[Crossref]

G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A: Pure Appl. Opt. 8, 391–397 (2006).

[Crossref]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070–1075 (2007).

[Crossref]

Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002).

[Crossref]

Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004).

[Crossref]

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[Crossref]

H. T. Chang, “Image encryption using separate amplitude-based virtual image and iteratively retrieved phase information,” Opt. Eng. 40, 2165–2171 (2001).

[Crossref]

G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, “Public-key-based optical image cryptosystem with data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003).

[Crossref]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[Crossref]

M. Paturzo, P. Memmolo, L. Miccio, A. Finizio, P. Ferrarro, A. Tulino, and B. Javidi, “Numerical multiplexing and demultiplexing of digital holographic information for remote reconstruction in amplitude and phase,” Opt. Lett. 33, 2629–2631 (2008).

[Crossref]
[PubMed]

P. Refregier and B. Javidi, “Optical image encryption using input and Fourier plane random phase encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]
[PubMed]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain B,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[Crossref]

B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060–1066 (2007).

[Crossref]
[PubMed]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using modified Gerchberg–Saxton algorithm and phase modulation in Fresnel transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik 114, 473–477 (2003).

[Crossref]

R. W. Gerchberg and W. O. Saxton, “Phase determination for image and diffraction plane pictures in the electron microscope,” Optik 34, 275–284 (1971).

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).