A. Kanso and M. Ghebleh, “A fast and efficient chaos-based keyed Hash function,” Commun. Nonlinear Sci. Numer. Simul. 18, 109–123 (2013).

[CrossRef]

A. Kanso, H. Yahyaoui, and M. Almull, “Keyed Hash function based on a chaotic map,” Inform. Sci. 186, 249–264 (2012).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack,” J. Opt. 14, 045401 (2012).

[CrossRef]

W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50, 028201 (2011).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

W. He, X. Peng, W. Qin, and X. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283, 2328–2332 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” Pure Appl. Opt. 11, 085402 (2009).

[CrossRef]

D. Xiao, X. F. Liao, and Y. Wang, “Parallel keyed Hash function construction based on chaotic neural network,” Neurocomputing 72, 2288–2296 (2009).

[CrossRef]

S. Yuan, X. Zhou, M. S. Alam, X. Lu, and X.-F. Li, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270–3284 (2009).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen plaintext attack on double random-phase encoding in the Fresnel domain,” Acta Phys. Sin. 56, 3924–3930 (2007).

X. Peng, P. Zhang, H. Z. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

X. Peng, P. Zhang, and L. L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

B. Javidi and A. Sergent, “Fully phase encoded key and biometrics for security verification,” Opt. Eng. 36, 935–942 (1997).

[CrossRef]

B. Javidi and J. L. Horner, “Optical-pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

A. Kanso, H. Yahyaoui, and M. Almull, “Keyed Hash function based on a chaotic map,” Inform. Sci. 186, 249–264 (2012).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

X. Peng, P. Zhang, and L. L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” Pure Appl. Opt. 11, 085402 (2009).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” Pure Appl. Opt. 11, 085402 (2009).

[CrossRef]

A. Kanso and M. Ghebleh, “A fast and efficient chaos-based keyed Hash function,” Commun. Nonlinear Sci. Numer. Simul. 18, 109–123 (2013).

[CrossRef]

J. W. Goodman, Introduction to Fourier Optics, 3rd ed. (Roberts & Company, 2005).

J. W. Han and C. S. Park, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999).

[CrossRef]

W. He, X. Peng, W. Qin, and X. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283, 2328–2332 (2010).

[CrossRef]

B. Javidi and J. L. Horner, “Optical-pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

B. Javidi and A. Sergent, “Fully phase encoded key and biometrics for security verification,” Opt. Eng. 36, 935–942 (1997).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

B. Javidi and J. L. Horner, “Optical-pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack,” J. Opt. 14, 045401 (2012).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

A. Kanso and M. Ghebleh, “A fast and efficient chaos-based keyed Hash function,” Commun. Nonlinear Sci. Numer. Simul. 18, 109–123 (2013).

[CrossRef]

A. Kanso, H. Yahyaoui, and M. Almull, “Keyed Hash function based on a chaotic map,” Inform. Sci. 186, 249–264 (2012).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack,” J. Opt. 14, 045401 (2012).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” Pure Appl. Opt. 11, 085402 (2009).

[CrossRef]

D. Xiao, X. F. Liao, and Y. Wang, “Parallel keyed Hash function construction based on chaotic neural network,” Neurocomputing 72, 2288–2296 (2009).

[CrossRef]

Y. Wang, X. F. Liao, D. Xiao, and K. W. Wong, “One-way Hash function construction based on 2D coupled map lattices,” Inform. Sci. 178, 1391–1406 (2008).

[CrossRef]

W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50, 028201 (2011).

[CrossRef]

W. He, X. Peng, W. Qin, and X. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283, 2328–2332 (2010).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” Pure Appl. Opt. 11, 085402 (2009).

[CrossRef]

J. W. Han and C. S. Park, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999).

[CrossRef]

W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50, 028201 (2011).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

W. He, X. Peng, W. Qin, and X. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283, 2328–2332 (2010).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” Pure Appl. Opt. 11, 085402 (2009).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen plaintext attack on double random-phase encoding in the Fresnel domain,” Acta Phys. Sin. 56, 3924–3930 (2007).

X. Peng, P. Zhang, H. Z. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

X. Peng, P. Zhang, and L. L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50, 028201 (2011).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

W. He, X. Peng, W. Qin, and X. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283, 2328–2332 (2010).

[CrossRef]

R. L. Rivest, “The MD5 message digest algorithm,” (1992).

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

B. Schneier and P. Sutherland, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, 1995).

B. Javidi and A. Sergent, “Fully phase encoded key and biometrics for security verification,” Opt. Eng. 36, 935–942 (1997).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack,” J. Opt. 14, 045401 (2012).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

B. Schneier and P. Sutherland, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, 1995).

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

D. Xiao, X. F. Liao, and Y. Wang, “Parallel keyed Hash function construction based on chaotic neural network,” Neurocomputing 72, 2288–2296 (2009).

[CrossRef]

Y. Wang, X. F. Liao, D. Xiao, and K. W. Wong, “One-way Hash function construction based on 2D coupled map lattices,” Inform. Sci. 178, 1391–1406 (2008).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” Pure Appl. Opt. 11, 085402 (2009).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen plaintext attack on double random-phase encoding in the Fresnel domain,” Acta Phys. Sin. 56, 3924–3930 (2007).

X. Peng, P. Zhang, H. Z. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

Y. Wang, X. F. Liao, D. Xiao, and K. W. Wong, “One-way Hash function construction based on 2D coupled map lattices,” Inform. Sci. 178, 1391–1406 (2008).

[CrossRef]

D. Xiao, X. F. Liao, and Y. Wang, “Parallel keyed Hash function construction based on chaotic neural network,” Neurocomputing 72, 2288–2296 (2009).

[CrossRef]

Y. Wang, X. F. Liao, D. Xiao, and K. W. Wong, “One-way Hash function construction based on 2D coupled map lattices,” Inform. Sci. 178, 1391–1406 (2008).

[CrossRef]

A. Kanso, H. Yahyaoui, and M. Almull, “Keyed Hash function based on a chaotic map,” Inform. Sci. 186, 249–264 (2012).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen plaintext attack on double random-phase encoding in the Fresnel domain,” Acta Phys. Sin. 56, 3924–3930 (2007).

X. Peng, P. Zhang, H. Z. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

X. Peng, P. Zhang, and L. L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen plaintext attack on double random-phase encoding in the Fresnel domain,” Acta Phys. Sin. 56, 3924–3930 (2007).

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).

[CrossRef]

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004).

[CrossRef]

A. Kanso and M. Ghebleh, “A fast and efficient chaos-based keyed Hash function,” Commun. Nonlinear Sci. Numer. Simul. 18, 109–123 (2013).

[CrossRef]

A. Kanso, H. Yahyaoui, and M. Almull, “Keyed Hash function based on a chaotic map,” Inform. Sci. 186, 249–264 (2012).

[CrossRef]

Y. Wang, X. F. Liao, D. Xiao, and K. W. Wong, “One-way Hash function construction based on 2D coupled map lattices,” Inform. Sci. 178, 1391–1406 (2008).

[CrossRef]

P. Kumar, J. Joseph, and K. Singh, “Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack,” J. Opt. 14, 045401 (2012).

[CrossRef]

D. Xiao, X. F. Liao, and Y. Wang, “Parallel keyed Hash function construction based on chaotic neural network,” Neurocomputing 72, 2288–2296 (2009).

[CrossRef]

W. He, X. Peng, W. Qin, and X. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283, 2328–2332 (2010).

[CrossRef]

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010).

[CrossRef]

W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50, 028201 (2011).

[CrossRef]

J. W. Han and C. S. Park, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999).

[CrossRef]

B. Javidi and J. L. Horner, “Optical-pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).

[CrossRef]

B. Javidi and A. Sergent, “Fully phase encoded key and biometrics for security verification,” Opt. Eng. 36, 935–942 (1997).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[CrossRef]

S. Yuan, X. Zhou, M. S. Alam, X. Lu, and X.-F. Li, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270–3284 (2009).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]

X. Peng, H. Wei, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006).

[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]

X. Peng, P. Zhang, H. Z. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

X. Peng, P. Zhang, and L. L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” Pure Appl. Opt. 11, 085402 (2009).

[CrossRef]

R. L. Rivest, “The MD5 message digest algorithm,” (1992).

B. Schneier and P. Sutherland, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, 1995).

J. W. Goodman, Introduction to Fourier Optics, 3rd ed. (Roberts & Company, 2005).