W. Chen and X. Chen, “Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit,” Opt. Lett. 38, 546–548 (2013).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

I. Mehra, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

J. J. Huang, H. E. Hwang, C. Y. Chen, and C. M. Chen, “Lensless multiple-image optical encryption based on improved phase retrieval algorithm,” Appl. Opt. 51, 2388–2394 (2012).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

Z. J. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. T. Liu, “Double image encryption by using iterative random binary encoding in gyrator domain,” Opt. Express 18, 12033–12043 (2010).

[CrossRef]

W. Chen, X. D. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542–544 (2008).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

X. G. Wang, D. M. Zhao, F. Jing, and X. F. Wei, “Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics,” Opt. Express 14, 1476–1486 (2006).

[CrossRef]

L. F. Chen and D. M. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[CrossRef]

G. Situ and J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245, 55–65 (2005).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

H. Kim, D. H. Kim, and Y. H. Lee, “Encryption of digital hologram of 3-D object by virtual optics,” Opt. Express 12, 4912–4921 (2004).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[CrossRef]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik, 114, 473–477 (2003).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

P. C. Mogensen and J. Glückstad, “A phase-based optical encryption system with polarization encoding,” Opt. Commun. 173, 177–183 (2000).

[CrossRef]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[CrossRef]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology—CRYPTO’96 (Springer, 1996), pp. 1–15.

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology—CRYPTO’96 (Springer, 1996), pp. 1–15.

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

W. Chen and X. Chen, “Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit,” Opt. Lett. 38, 546–548 (2013).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen, X. D. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

W. Chen and X. Chen, “Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit,” Opt. Lett. 38, 546–548 (2013).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

P. C. Mogensen and J. Glückstad, “A phase-based optical encryption system with polarization encoding,” Opt. Commun. 173, 177–183 (2000).

[CrossRef]

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography (Springer, 2004).

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

P. Refrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology—CRYPTO’96 (Springer, 1996), pp. 1–15.

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

Z. J. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. T. Liu, “Double image encryption by using iterative random binary encoding in gyrator domain,” Opt. Express 18, 12033–12043 (2010).

[CrossRef]

S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

I. Mehra, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography (Springer, 2004).

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

P. C. Mogensen and J. Glückstad, “A phase-based optical encryption system with polarization encoding,” Opt. Commun. 173, 177–183 (2000).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, G. Pedrini, and W. Osten, “Collision in double-phase encryption based on fractional Fourier transform,” in International Conference on Optical Instrumentation and Technology (International Society for Optics and Photonics, 2009), p. 751205.

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, G. Pedrini, and W. Osten, “Collision in double-phase encryption based on fractional Fourier transform,” in International Conference on Optical Instrumentation and Technology (International Society for Optics and Photonics, 2009), p. 751205.

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542–544 (2008).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

G. Situ and J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245, 55–65 (2005).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik, 114, 473–477 (2003).

[CrossRef]

G. Situ, G. Pedrini, and W. Osten, “Collision in double-phase encryption based on fractional Fourier transform,” in International Conference on Optical Instrumentation and Technology (International Society for Optics and Photonics, 2009), p. 751205.

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography (Springer, 2004).

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542–544 (2008).

[CrossRef]

G. Situ and J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245, 55–65 (2005).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik, 114, 473–477 (2003).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[CrossRef]

X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006).

[CrossRef]

J. J. Huang, H. E. Hwang, C. Y. Chen, and C. M. Chen, “Lensless multiple-image optical encryption based on improved phase retrieval algorithm,” Appl. Opt. 51, 2388–2394 (2012).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012).

[CrossRef]

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007).

[CrossRef]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[CrossRef]

D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” Int. J. Inf. Secur. 1, 36–63 (2001).

[CrossRef]

X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007).

[CrossRef]

G. Situ and J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245, 55–65 (2005).

[CrossRef]

D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).

[CrossRef]

S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011).

[CrossRef]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286, 123–129 (2013).

[CrossRef]

G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008).

[CrossRef]

P. C. Mogensen and J. Glückstad, “A phase-based optical encryption system with polarization encoding,” Opt. Commun. 173, 177–183 (2000).

[CrossRef]

X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002).

[CrossRef]

N. R. Zhou, T. J. Dong, and J. H. Wu, “Novel image encryption algorithm based on multiple-parameter discrete fractional random transform,” Opt. Commun. 283, 3037–3042 (2010).

[CrossRef]

R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).

[CrossRef]

I. Mehra, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52, 028202 (2013).

[CrossRef]

B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).

[CrossRef]

L. F. Chen and D. M. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[CrossRef]

Z. J. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. T. Liu, “Double image encryption by using iterative random binary encoding in gyrator domain,” Opt. Express 18, 12033–12043 (2010).

[CrossRef]

X. G. Wang, D. M. Zhao, F. Jing, and X. F. Wei, “Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics,” Opt. Express 14, 1476–1486 (2006).

[CrossRef]

H. Kim, D. H. Kim, and Y. H. Lee, “Encryption of digital hologram of 3-D object by virtual optics,” Opt. Express 12, 4912–4921 (2004).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009).

[CrossRef]

W. Q. He, X. Peng, X. F. Meng, and X. L. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

P. Refrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542–544 (2008).

[CrossRef]

W. Chen, X. D. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

W. Chen and X. Chen, “Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit,” Opt. Lett. 38, 546–548 (2013).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik, 114, 473–477 (2003).

[CrossRef]

M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology—CRYPTO’96 (Springer, 1996), pp. 1–15.

G. Situ, G. Pedrini, and W. Osten, “Collision in double-phase encryption based on fractional Fourier transform,” in International Conference on Optical Instrumentation and Technology (International Society for Optics and Photonics, 2009), p. 751205.

G. Xu, R. Li, L. Yang, and X. Liu, “Identification and recovery of the blurred QR code image,” in International Conference on Computer Science & Service System (CSSS) (IEEE, 2012), pp. 2257–2260.

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography (Springer, 2004).

ISO/IEC 18004: ISO Standard on QR Code 2005 Bar Code Symbology Specification.