Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[Crossref]

T. Sarkadi and P. Koppa, “Quantitative security evaluation of optical encryption using hybrid phase- and amplitude-modulated keys,” Appl. Opt. 51, 745–750 (2012).

[Crossref]

Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012).

[Crossref]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[Crossref]

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[Crossref]

M. Singh, A. Kumar, and K. Singh, “Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption,” Opt. Laser Technol. 40, 619–624 (2008).

[Crossref]

T. Ujvári, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. Pure Appl. Opt. 6, 401–411 (2004).

[Crossref]

T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39, 4783–4787 (2000).

[Crossref]

X. D. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[Crossref]

S. B. Wicker and V. K. Bhargava, Reed Solomon Codes and Their Applications (IEEE, 1999).

H. J. Coufal, D. Psaltis, and G. T. Sincerbox, Holographic Data Storage (Springer, 2000).

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[Crossref]

J. C. Dainty, Laser Speckle and Related Phenomena (Springer, 1975).

Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012).

[Crossref]

X. D. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[Crossref]

T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39, 4783–4787 (2000).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical storage with angular multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[Crossref]

P. Refregier and B. Javidi, “Optical-image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[Crossref]

T. Sarkadi and P. Koppa, “Quantitative security evaluation of optical encryption using hybrid phase- and amplitude-modulated keys,” Appl. Opt. 51, 745–750 (2012).

[Crossref]

P. Koppa, “Phase-to-amplitude data page conversion for holographic storage and optical encryption,” Appl. Opt. 46, 3561–3571 (2007).

[Crossref]

T. Ujvári, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. Pure Appl. Opt. 6, 401–411 (2004).

[Crossref]

M. Singh, A. Kumar, and K. Singh, “Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption,” Opt. Laser Technol. 40, 619–624 (2008).

[Crossref]

Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012).

[Crossref]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[Crossref]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[Crossref]

Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012).

[Crossref]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[Crossref]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[Crossref]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[Crossref]

Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012).

[Crossref]

Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012).

[Crossref]

Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012).

[Crossref]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[Crossref]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[Crossref]

T. Ujvári, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. Pure Appl. Opt. 6, 401–411 (2004).

[Crossref]

T. Ujvári, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. Pure Appl. Opt. 6, 401–411 (2004).

[Crossref]

X. D. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical storage with angular multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[Crossref]

H. J. Coufal, D. Psaltis, and G. T. Sincerbox, Holographic Data Storage (Springer, 2000).

T. Ujvári, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. Pure Appl. Opt. 6, 401–411 (2004).

[Crossref]

T. Ujvári, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. Pure Appl. Opt. 6, 401–411 (2004).

[Crossref]

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[Crossref]

H. J. Coufal, D. Psaltis, and G. T. Sincerbox, Holographic Data Storage (Springer, 2000).

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[Crossref]

M. Singh, A. Kumar, and K. Singh, “Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption,” Opt. Laser Technol. 40, 619–624 (2008).

[Crossref]

M. Singh, A. Kumar, and K. Singh, “Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption,” Opt. Laser Technol. 40, 619–624 (2008).

[Crossref]

T. Ujvári, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. Pure Appl. Opt. 6, 401–411 (2004).

[Crossref]

T. Ujvári, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. Pure Appl. Opt. 6, 401–411 (2004).

[Crossref]

S. B. Wicker and V. K. Bhargava, Reed Solomon Codes and Their Applications (IEEE, 1999).

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[Crossref]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[Crossref]

Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical storage with angular multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[Crossref]

T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39, 4783–4787 (2000).

[Crossref]

X. D. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000).

[Crossref]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[Crossref]

T. Sarkadi and P. Koppa, “Quantitative security evaluation of optical encryption using hybrid phase- and amplitude-modulated keys,” Appl. Opt. 51, 745–750 (2012).

[Crossref]

P. Koppa, “Phase-to-amplitude data page conversion for holographic storage and optical encryption,” Appl. Opt. 46, 3561–3571 (2007).

[Crossref]

T. Ujvári, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, “A secure data storage system based on phase-encoded thin polarization holograms,” J. Opt. Pure Appl. Opt. 6, 401–411 (2004).

[Crossref]

M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010).

[Crossref]

Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012).

[Crossref]

M. Singh, A. Kumar, and K. Singh, “Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption,” Opt. Laser Technol. 40, 619–624 (2008).

[Crossref]

Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier transform domains,” Opt. Lasers Eng. 50, 1352–1358 (2012).

[Crossref]

Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011).

[Crossref]

J. C. Dainty, Laser Speckle and Related Phenomena (Springer, 1975).

H. J. Coufal, D. Psaltis, and G. T. Sincerbox, Holographic Data Storage (Springer, 2000).

S. B. Wicker and V. K. Bhargava, Reed Solomon Codes and Their Applications (IEEE, 1999).