I. Mehra, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen and X. Chen, “Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit,” Opt. Lett. 38, 546–548 (2013).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

J. J. Huang, H. E. Hwang, C. Y. Chen, and C. M. Chen, “Lensless multiple-image optical encryption based on improved phase retrieval algorithm,” Appl. Opt. 51, 2388–2394 (2012).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

Z. J. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. T. Liu, “Double image encryption by using iterative random binary encoding in gyrator domain,” Opt. Express 18, 12033–12043 (2010).

[CrossRef]

W. Chen, X. D. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542–544 (2008).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. G. Wang, D. M. Zhao, F. Jing, and X. F. Wei, “Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics,” Opt. Express 14, 1476–1486 (2006).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

L. F. Chen and D. M. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[CrossRef]

G. Situ and J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245, 55–65 (2005).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

H. Kim, D. H. Kim, and Y. H. Lee, “Encryption of digital hologram of 3-D object by virtual optics,” Opt. Express 12, 4912–4921 (2004).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik, 114, 473–477 (2003).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

P. C. Mogensen and J. Glückstad, “A phase-based optical encryption system with polarization encoding,” Opt. Commun. 173, 177–183 (2000).

[CrossRef]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology—CRYPTO’96 (Springer, 1996), pp. 1–15.

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology—CRYPTO’96 (Springer, 1996), pp. 1–15.

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

W. Chen and X. Chen, “Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit,” Opt. Lett. 38, 546–548 (2013).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen, X. D. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

W. Chen and X. Chen, “Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit,” Opt. Lett. 38, 546–548 (2013).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

P. C. Mogensen and J. Glückstad, “A phase-based optical encryption system with polarization encoding,” Opt. Commun. 173, 177–183 (2000).

[CrossRef]

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography (Springer, 2004).

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

P. Refrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology—CRYPTO’96 (Springer, 1996), pp. 1–15.

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

Z. J. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. T. Liu, “Double image encryption by using iterative random binary encoding in gyrator domain,” Opt. Express 18, 12033–12043 (2010).

[CrossRef]

S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

I. Mehra, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography (Springer, 2004).

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

P. C. Mogensen and J. Glückstad, “A phase-based optical encryption system with polarization encoding,” Opt. Commun. 173, 177–183 (2000).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, G. Pedrini, and W. Osten, “Collision in double-phase encryption based on fractional Fourier transform,” in International Conference on Optical Instrumentation and Technology (International Society for Optics and Photonics, 2009), p. 751205.

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, G. Pedrini, and W. Osten, “Collision in double-phase encryption based on fractional Fourier transform,” in International Conference on Optical Instrumentation and Technology (International Society for Optics and Photonics, 2009), p. 751205.

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542–544 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

G. Situ and J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245, 55–65 (2005).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik, 114, 473–477 (2003).

[CrossRef]

G. Situ, G. Pedrini, and W. Osten, “Collision in double-phase encryption based on fractional Fourier transform,” in International Conference on Optical Instrumentation and Technology (International Society for Optics and Photonics, 2009), p. 751205.

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography (Springer, 2004).

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542–544 (2008).

[CrossRef]

G. Situ and J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245, 55–65 (2005).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik, 114, 473–477 (2003).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

J. J. Huang, H. E. Hwang, C. Y. Chen, and C. M. Chen, “Lensless multiple-image optical encryption based on improved phase retrieval algorithm,” Appl. Opt. 51, 2388–2394 (2012).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

P. C. Mogensen and J. Glückstad, “A phase-based optical encryption system with polarization encoding,” Opt. Commun. 173, 177–183 (2000).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

G. Situ and J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245, 55–65 (2005).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

I. Mehra, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

L. F. Chen and D. M. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[CrossRef]

H. Kim, D. H. Kim, and Y. H. Lee, “Encryption of digital hologram of 3-D object by virtual optics,” Opt. Express 12, 4912–4921 (2004).

[CrossRef]

X. G. Wang, D. M. Zhao, F. Jing, and X. F. Wei, “Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics,” Opt. Express 14, 1476–1486 (2006).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

Z. J. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. T. Liu, “Double image encryption by using iterative random binary encoding in gyrator domain,” Opt. Express 18, 12033–12043 (2010).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542–544 (2008).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

P. Refrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[CrossRef]

W. Chen, X. D. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

W. Chen and X. Chen, “Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit,” Opt. Lett. 38, 546–548 (2013).

[CrossRef]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik, 114, 473–477 (2003).

[CrossRef]

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography (Springer, 2004).

ISO/IEC 18004: ISO Standard on QR Code 2005 Bar Code Symbology Specification.

M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology—CRYPTO’96 (Springer, 1996), pp. 1–15.

G. Situ, G. Pedrini, and W. Osten, “Collision in double-phase encryption based on fractional Fourier transform,” in International Conference on Optical Instrumentation and Technology (International Society for Optics and Photonics, 2009), p. 751205.

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.