M. Sharma and M. K. Kowar, “Image encryption techniques using chaotic schemes: a review,” Int. J. Eng. Sci. Tech 2, 2359–2362 (2010).

D. Arroyo, C. Q. Li, S. J. Li, G. Alvarez, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos Solitons Fractals 41, 2613–2616 (2009).

[CrossRef]

X. Y. Liang and X. L. Min, “An image encryption approach using a shuffling map,” Commun. Theor. Phys. 52, 876–880(2009).

[CrossRef]

Y.-H. Seo, H. J. Choi, and D. W. Kim, “Digital hologram encryption using discrete wavelet packet transform,” Opt. Commun. 282, 367–377 (2009).

[CrossRef]

S. C. Kim and E. S. Kim, “Fast computation of hologram patterns of a 3D object using run-length encoding and novel look-up table methods,” Appl. Opt. 48, 1030–1041 (2009).

[CrossRef]

H. Sakata and Y. Sakamoto, “A fast computation method for Fresnel hologram using three-dimensional affine transformations in real space,” Appl. Opt. 48, H212–H221 (2009).

[CrossRef]

P. W. M. Tsang, J. P. Liu, K. W. K. Cheung, and T.-C. Poon, “Fast generation of Fresnel holograms based on multirate filtering,” Appl. Opt. 48, H23–H30 (2009).

[CrossRef]

K. B. Doh, K. Dobson, T.-C. Poon, and P. S. Chung, “Optical image coding with a circular Dammann grating,” Appl. Opt. 48, 134–139 (2009).

[CrossRef]

S. C. Kim and E. S. Kim, “Effective generation of digital holograms of three-dimensional objects using a novel look-up table method,” Appl. Opt. 47, D55–D62 (2008).

[CrossRef]

S. J. Li, C. Q. Li, G. R. Chen, and K. T. Lo, “Cryptanalysis of the RCES/RSES image encryption scheme,” J. Syst. Softw. 81, 1130–1143 (2008).

M. Ali, B. Younes, and A. Jantan, “Image encryption using block-based transformation algorithm,” IAENG Int. J. Comput. Sci. 35, 15–23 (2008).

T. Yamaguchi, G. Okabe, and H. Yoshikawa, “Real-time image plane full-color and full-parallax holographic video display system,” Opt. Eng. (Bellingham, Wash.) 46, 125801 (2007).

[CrossRef]

K. B. Doh, K. Kim, and T.-C. Poon, “Computer generated holographic image processing for information security,” Lect. Notes Comput. Sci. 3320, 313–322 (2005).

T.-C. Poon, T. Akin, G. Indebetouw, and T. Kim, “Horizontal-parallax-only electronic holography,” Opt. Express 13, 2427–2432 (2005).

[CrossRef]

K. Matsushima and S. Nakahara, “Computer generated holograms for three dimensional surface objects with shade and texture,” Appl. Opt. 44, 4607–4614 (2005).

[CrossRef]

I. Ozturk and I. Sogukpinar, “Analysis and comparison of image encryption,” Int. J. Inf. Technol. , 1, 108–111 (2004).

Y. Sakamoto and T. Nagao, “A fast computational method for computer-generated Fourier hologram using patch model,” Electron. Commun. Jpn., Part 2, Electron. 85, 16–24(2002).

[CrossRef]

H. Yoshikawa, “Fast computation of fresnel holograms employing difference,” Opt. Rev. 8, 331–335 (2001).

[CrossRef]

P. P. Dang and P. M. Chau, “Image encryption for secure internet multimedia applications,” IEEE Trans. Consum. Electron. 46, 395–403 (2000).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

B. Javidi and T. Nomura, “Securing information by means of digital holography,” Opt. Lett. 25, 28–30 (2000).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39, 4783–4787 (2000).

[CrossRef]

M. Ali, B. Younes, and A. Jantan, “Image encryption using block-based transformation algorithm,” IAENG Int. J. Comput. Sci. 35, 15–23 (2008).

D. Arroyo, C. Q. Li, S. J. Li, G. Alvarez, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos Solitons Fractals 41, 2613–2616 (2009).

[CrossRef]

D. Arroyo, C. Q. Li, S. J. Li, G. Alvarez, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos Solitons Fractals 41, 2613–2616 (2009).

[CrossRef]

P. P. Dang and P. M. Chau, “Image encryption for secure internet multimedia applications,” IEEE Trans. Consum. Electron. 46, 395–403 (2000).

[CrossRef]

S. J. Li, C. Q. Li, G. R. Chen, and K. T. Lo, “Cryptanalysis of the RCES/RSES image encryption scheme,” J. Syst. Softw. 81, 1130–1143 (2008).

Y.-H. Seo, H. J. Choi, and D. W. Kim, “Digital hologram encryption using discrete wavelet packet transform,” Opt. Commun. 282, 367–377 (2009).

[CrossRef]

P. P. Dang and P. M. Chau, “Image encryption for secure internet multimedia applications,” IEEE Trans. Consum. Electron. 46, 395–403 (2000).

[CrossRef]

K. B. Doh, K. Dobson, T.-C. Poon, and P. S. Chung, “Optical image coding with a circular Dammann grating,” Appl. Opt. 48, 134–139 (2009).

[CrossRef]

K. B. Doh, K. Kim, and T.-C. Poon, “Computer generated holographic image processing for information security,” Lect. Notes Comput. Sci. 3320, 313–322 (2005).

S. W. Golomb, Shift Register Sequences, revised ed. (Aegean Park Press, 1981).

D. Arroyo, C. Q. Li, S. J. Li, G. Alvarez, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos Solitons Fractals 41, 2613–2616 (2009).

[CrossRef]

M. Ali, B. Younes, and A. Jantan, “Image encryption using block-based transformation algorithm,” IAENG Int. J. Comput. Sci. 35, 15–23 (2008).

Y.-H. Seo, H. J. Choi, and D. W. Kim, “Digital hologram encryption using discrete wavelet packet transform,” Opt. Commun. 282, 367–377 (2009).

[CrossRef]

K. B. Doh, K. Kim, and T.-C. Poon, “Computer generated holographic image processing for information security,” Lect. Notes Comput. Sci. 3320, 313–322 (2005).

M. Sharma and M. K. Kowar, “Image encryption techniques using chaotic schemes: a review,” Int. J. Eng. Sci. Tech 2, 2359–2362 (2010).

D. Arroyo, C. Q. Li, S. J. Li, G. Alvarez, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos Solitons Fractals 41, 2613–2616 (2009).

[CrossRef]

S. J. Li, C. Q. Li, G. R. Chen, and K. T. Lo, “Cryptanalysis of the RCES/RSES image encryption scheme,” J. Syst. Softw. 81, 1130–1143 (2008).

D. Arroyo, C. Q. Li, S. J. Li, G. Alvarez, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos Solitons Fractals 41, 2613–2616 (2009).

[CrossRef]

S. J. Li, C. Q. Li, G. R. Chen, and K. T. Lo, “Cryptanalysis of the RCES/RSES image encryption scheme,” J. Syst. Softw. 81, 1130–1143 (2008).

X. Y. Liang and X. L. Min, “An image encryption approach using a shuffling map,” Commun. Theor. Phys. 52, 876–880(2009).

[CrossRef]

S. J. Li, C. Q. Li, G. R. Chen, and K. T. Lo, “Cryptanalysis of the RCES/RSES image encryption scheme,” J. Syst. Softw. 81, 1130–1143 (2008).

X. Y. Liang and X. L. Min, “An image encryption approach using a shuffling map,” Commun. Theor. Phys. 52, 876–880(2009).

[CrossRef]

Y. Sakamoto and T. Nagao, “A fast computational method for computer-generated Fourier hologram using patch model,” Electron. Commun. Jpn., Part 2, Electron. 85, 16–24(2002).

[CrossRef]

T. Yamaguchi, G. Okabe, and H. Yoshikawa, “Real-time image plane full-color and full-parallax holographic video display system,” Opt. Eng. (Bellingham, Wash.) 46, 125801 (2007).

[CrossRef]

I. Ozturk and I. Sogukpinar, “Analysis and comparison of image encryption,” Int. J. Inf. Technol. , 1, 108–111 (2004).

P. W. M. Tsang, J. P. Liu, K. W. K. Cheung, and T.-C. Poon, “Fast generation of Fresnel holograms based on multirate filtering,” Appl. Opt. 48, H23–H30 (2009).

[CrossRef]

K. B. Doh, K. Dobson, T.-C. Poon, and P. S. Chung, “Optical image coding with a circular Dammann grating,” Appl. Opt. 48, 134–139 (2009).

[CrossRef]

T.-C. Poon, T. Akin, G. Indebetouw, and T. Kim, “Horizontal-parallax-only electronic holography,” Opt. Express 13, 2427–2432 (2005).

[CrossRef]

K. B. Doh, K. Kim, and T.-C. Poon, “Computer generated holographic image processing for information security,” Lect. Notes Comput. Sci. 3320, 313–322 (2005).

Y.-H. Seo, H. J. Choi, and D. W. Kim, “Digital hologram encryption using discrete wavelet packet transform,” Opt. Commun. 282, 367–377 (2009).

[CrossRef]

M. Sharma and M. K. Kowar, “Image encryption techniques using chaotic schemes: a review,” Int. J. Eng. Sci. Tech 2, 2359–2362 (2010).

I. Ozturk and I. Sogukpinar, “Analysis and comparison of image encryption,” Int. J. Inf. Technol. , 1, 108–111 (2004).

T. Yamaguchi, G. Okabe, and H. Yoshikawa, “Real-time image plane full-color and full-parallax holographic video display system,” Opt. Eng. (Bellingham, Wash.) 46, 125801 (2007).

[CrossRef]

T. Yamaguchi, G. Okabe, and H. Yoshikawa, “Real-time image plane full-color and full-parallax holographic video display system,” Opt. Eng. (Bellingham, Wash.) 46, 125801 (2007).

[CrossRef]

H. Yoshikawa, “Fast computation of fresnel holograms employing difference,” Opt. Rev. 8, 331–335 (2001).

[CrossRef]

H. Yoshikawa, “Computer-generated holograms for white light reconstruction,” in Digital Holography and Three-Dimensional Display: Principles and Applications, T.-C.Poon, ed. (Springer, 2006).

M. Ali, B. Younes, and A. Jantan, “Image encryption using block-based transformation algorithm,” IAENG Int. J. Comput. Sci. 35, 15–23 (2008).

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39, 4783–4787 (2000).

[CrossRef]

S. C. Kim and E. S. Kim, “Effective generation of digital holograms of three-dimensional objects using a novel look-up table method,” Appl. Opt. 47, D55–D62 (2008).

[CrossRef]

S. C. Kim and E. S. Kim, “Fast computation of hologram patterns of a 3D object using run-length encoding and novel look-up table methods,” Appl. Opt. 48, 1030–1041 (2009).

[CrossRef]

K. Matsushima and S. Nakahara, “Computer generated holograms for three dimensional surface objects with shade and texture,” Appl. Opt. 44, 4607–4614 (2005).

[CrossRef]

H. Sakata and Y. Sakamoto, “A fast computation method for Fresnel hologram using three-dimensional affine transformations in real space,” Appl. Opt. 48, H212–H221 (2009).

[CrossRef]

P. W. M. Tsang, J. P. Liu, K. W. K. Cheung, and T.-C. Poon, “Fast generation of Fresnel holograms based on multirate filtering,” Appl. Opt. 48, H23–H30 (2009).

[CrossRef]

K. B. Doh, K. Dobson, T.-C. Poon, and P. S. Chung, “Optical image coding with a circular Dammann grating,” Appl. Opt. 48, 134–139 (2009).

[CrossRef]

D. Arroyo, C. Q. Li, S. J. Li, G. Alvarez, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos Solitons Fractals 41, 2613–2616 (2009).

[CrossRef]

X. Y. Liang and X. L. Min, “An image encryption approach using a shuffling map,” Commun. Theor. Phys. 52, 876–880(2009).

[CrossRef]

Y. Sakamoto and T. Nagao, “A fast computational method for computer-generated Fourier hologram using patch model,” Electron. Commun. Jpn., Part 2, Electron. 85, 16–24(2002).

[CrossRef]

M. Ali, B. Younes, and A. Jantan, “Image encryption using block-based transformation algorithm,” IAENG Int. J. Comput. Sci. 35, 15–23 (2008).

P. P. Dang and P. M. Chau, “Image encryption for secure internet multimedia applications,” IEEE Trans. Consum. Electron. 46, 395–403 (2000).

[CrossRef]

M. Sharma and M. K. Kowar, “Image encryption techniques using chaotic schemes: a review,” Int. J. Eng. Sci. Tech 2, 2359–2362 (2010).

I. Ozturk and I. Sogukpinar, “Analysis and comparison of image encryption,” Int. J. Inf. Technol. , 1, 108–111 (2004).

S. J. Li, C. Q. Li, G. R. Chen, and K. T. Lo, “Cryptanalysis of the RCES/RSES image encryption scheme,” J. Syst. Softw. 81, 1130–1143 (2008).

K. B. Doh, K. Kim, and T.-C. Poon, “Computer generated holographic image processing for information security,” Lect. Notes Comput. Sci. 3320, 313–322 (2005).

Y.-H. Seo, H. J. Choi, and D. W. Kim, “Digital hologram encryption using discrete wavelet packet transform,” Opt. Commun. 282, 367–377 (2009).

[CrossRef]

T. Yamaguchi, G. Okabe, and H. Yoshikawa, “Real-time image plane full-color and full-parallax holographic video display system,” Opt. Eng. (Bellingham, Wash.) 46, 125801 (2007).

[CrossRef]

H. Yoshikawa, “Fast computation of fresnel holograms employing difference,” Opt. Rev. 8, 331–335 (2001).

[CrossRef]

T.-C.Poon, ed., Digital Holography and Three-Dimensional Display: Principles and Application (Springer, 2006).

S. W. Golomb, Shift Register Sequences, revised ed. (Aegean Park Press, 1981).

H. Yoshikawa, “Computer-generated holograms for white light reconstruction,” in Digital Holography and Three-Dimensional Display: Principles and Applications, T.-C.Poon, ed. (Springer, 2006).