P. Kumar, J. Joseph, and K. Singh, “Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

X. Deng and D. Zhao, “Multiple-image encryption using phase retrieval algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012).

[Crossref]

H.-E. Hwang, “Optical color image encryption based on the wavelength multiplexing using cascaded phase-only masks in Fresnel transform domain,” Opt. Commun. 285, 567–573 (2012).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386(2012).

[Crossref]

H. T. Chang, H.-E. Wang, and C.-L. Lee, “Position multiplexing multiple image encryption using cascaded phase only masks in Fresnel transform domain,” Opt. Commun. 284, 4146–4151 (2011).

[Crossref]

X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011).

[Crossref]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[Crossref]

P. Clemente, V. Durán, V. T. Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[Crossref]

W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18, 27095–27104 (2010).

[Crossref]

W. Chen, X. Chen, and J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[Crossref]

A. Alfalou, and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120(2010).

[Crossref]

A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35, 1914–1916 (2010).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

H.-E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg–Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple image,” Appl. Opt. 48, 5933–5947 (2009).

[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photonics News 1, 589–636 (2009).

[Crossref]

W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. 11, 075402 (2009).

[Crossref]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double random-phase encryption scheme with randomized lens-phase function,” Opt. Lett. 34, 331–333 (2009).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[Crossref]

M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279, 35–42 (2007).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of optically encrypted digital holograms using artificial neural networks,” J. Disp. Technol. 2, 401–410 (2006).

[Crossref]

L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[Crossref]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption–decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double random phase encoding in Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

G. Situ and J. Zhang, “Multiple image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]

G. Situ and J. Zhang, “Double random phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[Crossref]

Z. Zalevsky, D. Mendlovic, and R. G. Dorsch, “Gerchberg–Saxton algorithm applied in fractional Fourier or Fresnel domain,” Opt. Lett. 21, 842–844 (1996).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

A. Alfalou, and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).

[Crossref]

A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35, 1914–1916 (2010).

[Crossref]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple image,” Appl. Opt. 48, 5933–5947 (2009).

[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photonics News 1, 589–636 (2009).

[Crossref]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[Crossref]

A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption–decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[Crossref]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption–decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[Crossref]

A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35, 1914–1916 (2010).

[Crossref]

A. Alfalou, and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).

[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photonics News 1, 589–636 (2009).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[Crossref]

A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

H. T. Chang, H.-E. Wang, and C.-L. Lee, “Position multiplexing multiple image encryption using cascaded phase only masks in Fresnel transform domain,” Opt. Commun. 284, 4146–4151 (2011).

[Crossref]

H.-E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg–Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18, 27095–27104 (2010).

[Crossref]

W. Chen, X. Chen, and J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[Crossref]

W. Chen, X. Chen, and J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[Crossref]

W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18, 27095–27104 (2010).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

P. Clemente, V. Durán, V. T. Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[Crossref]

P. Clemente, V. Durán, V. T. Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[Crossref]

X. Deng and D. Zhao, “Multiple-image encryption using phase retrieval algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

Z. Zalevsky, D. Mendlovic, and R. G. Dorsch, “Gerchberg–Saxton algorithm applied in fractional Fourier or Fresnel domain,” Opt. Lett. 21, 842–844 (1996).

[Crossref]

P. Clemente, V. Durán, V. T. Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption–decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[Crossref]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[Crossref]

H.-E. Hwang, “Optical color image encryption based on the wavelength multiplexing using cascaded phase-only masks in Fresnel transform domain,” Opt. Commun. 285, 567–573 (2012).

[Crossref]

H.-E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg–Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of optically encrypted digital holograms using artificial neural networks,” J. Disp. Technol. 2, 401–410 (2006).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012).

[Crossref]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double random-phase encryption scheme with randomized lens-phase function,” Opt. Lett. 34, 331–333 (2009).

[Crossref]

M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279, 35–42 (2007).

[Crossref]

A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double random-phase encryption scheme with randomized lens-phase function,” Opt. Lett. 34, 331–333 (2009).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012).

[Crossref]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double random-phase encryption scheme with randomized lens-phase function,” Opt. Lett. 34, 331–333 (2009).

[Crossref]

P. Clemente, V. Durán, V. T. Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[Crossref]

H. T. Chang, H.-E. Wang, and C.-L. Lee, “Position multiplexing multiple image encryption using cascaded phase only masks in Fresnel transform domain,” Opt. Commun. 284, 4146–4151 (2011).

[Crossref]

H.-E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg–Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple image,” Appl. Opt. 48, 5933–5947 (2009).

[Crossref]

Z. Zalevsky, D. Mendlovic, and R. G. Dorsch, “Gerchberg–Saxton algorithm applied in fractional Fourier or Fresnel domain,” Opt. Lett. 21, 842–844 (1996).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of optically encrypted digital holograms using artificial neural networks,” J. Disp. Technol. 2, 401–410 (2006).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386(2012).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[Crossref]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120(2010).

[Crossref]

W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. 11, 075402 (2009).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double random phase encoding in Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120(2010).

[Crossref]

W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. 11, 075402 (2009).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386(2012).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[Crossref]

M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279, 35–42 (2007).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

W. Chen, X. Chen, and J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[Crossref]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of optically encrypted digital holograms using artificial neural networks,” J. Disp. Technol. 2, 401–410 (2006).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012).

[Crossref]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double random-phase encryption scheme with randomized lens-phase function,” Opt. Lett. 34, 331–333 (2009).

[Crossref]

M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279, 35–42 (2007).

[Crossref]

G. Situ and J. Zhang, “Multiple image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]

G. Situ and J. Zhang, “Double random phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]

P. Clemente, V. Durán, V. T. Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption–decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[Crossref]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption–decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[Crossref]

A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[Crossref]

H. T. Chang, H.-E. Wang, and C.-L. Lee, “Position multiplexing multiple image encryption using cascaded phase only masks in Fresnel transform domain,” Opt. Commun. 284, 4146–4151 (2011).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double random phase encoding in Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

Z. Zalevsky, D. Mendlovic, and R. G. Dorsch, “Gerchberg–Saxton algorithm applied in fractional Fourier or Fresnel domain,” Opt. Lett. 21, 842–844 (1996).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

G. Situ and J. Zhang, “Multiple image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]

G. Situ and J. Zhang, “Double random phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double random phase encoding in Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

X. Deng and D. Zhao, “Multiple-image encryption using phase retrieval algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012).

[Crossref]

X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011).

[Crossref]

L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[Crossref]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple image,” Appl. Opt. 48, 5933–5947 (2009).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386(2012).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of optically encrypted digital holograms using artificial neural networks,” J. Disp. Technol. 2, 401–410 (2006).

[Crossref]

W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. 11, 075402 (2009).

[Crossref]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[Crossref]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[Crossref]

M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279, 35–42 (2007).

[Crossref]

H. T. Chang, H.-E. Wang, and C.-L. Lee, “Position multiplexing multiple image encryption using cascaded phase only masks in Fresnel transform domain,” Opt. Commun. 284, 4146–4151 (2011).

[Crossref]

X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption–decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[Crossref]

H.-E. Hwang, “Optical color image encryption based on the wavelength multiplexing using cascaded phase-only masks in Fresnel transform domain,” Opt. Commun. 285, 567–573 (2012).

[Crossref]

L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[Crossref]

W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18, 27095–27104 (2010).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010).

[Crossref]

X. Deng and D. Zhao, “Multiple-image encryption using phase retrieval algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120(2010).

[Crossref]

H.-E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg–Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

G. Situ and J. Zhang, “Multiple image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]

A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35, 1914–1916 (2010).

[Crossref]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double random-phase encryption scheme with randomized lens-phase function,” Opt. Lett. 34, 331–333 (2009).

[Crossref]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[Crossref]

A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double random phase encoding in Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

W. Chen, X. Chen, and J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[Crossref]

A. Alfalou, and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).

[Crossref]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).

[Crossref]

G. Situ and J. Zhang, “Double random phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[Crossref]

P. Clemente, V. Durán, V. T. Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[Crossref]

Z. Zalevsky, D. Mendlovic, and R. G. Dorsch, “Gerchberg–Saxton algorithm applied in fractional Fourier or Fresnel domain,” Opt. Lett. 21, 842–844 (1996).

[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photonics News 1, 589–636 (2009).

[Crossref]