Y. Xiong, C. Quan, and C. J. Tay, “Multiple image encryption scheme based on pixel exchange operation and vector decomposition,” Opt. Lasers Eng. 101, 113–121 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Cryptoanalysis of an optical cryptosystem based on phase-truncated Fourier transform and nonlinear operations,” Opt. Commun. 428, 120–130 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Security analysis of a double-image encryption technique based on an asymmetric algorithm,” J. Opt. Soc. Am. A 35, 320–326 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask,” Appl. Opt. 57, 6010–6016 (2018).

[Crossref]

A. Sinha, “Nonlinear optical cryptosystem resistant to standard and hybrid attacks,” Opt. Lasers Eng. 81, 79–86 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. 8, 1–7 (2016).

[Crossref]

Y. Wang, C. Quan, and C. J. Tay, “Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask,” Opt. Commun. 344, 147–155 (2015).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Optical information authentication using compressed double-random-phase-encoded images and quick-response codes,” Opt. Express 23, 6239–6253 (2015).

[Crossref]

X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[Crossref]

A. Markman and B. Javidi, “Full-phase photon-counting double-random-phase encryption,” J. Opt. Soc. Am. A 31, 394–403 (2014).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photon. 6, 120–155 (2014).

[Crossref]

B. Deepan, C. Quan, Y. Wang, and C. J. Tay, “Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique,” Appl. Opt. 53, 4539–4547 (2014).

[Crossref]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude- and phase-truncation approach,” Opt. Lasers Eng. 52, 167–173 (2014).

[Crossref]

W. Chen and X. Chen, “Double random phase encoding using phase reservation and compression,” J. Opt. 16, 025402 (2014).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and Y. Zhang, “Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding,” J. Opt. 16, 125403 (2014).

[Crossref]

Z. Liu, S. Li, W. Liu, Y. Wang, and S. Liu, “Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding,” Opt. Lasers Eng. 51, 8–14 (2013).

[Crossref]

Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51, 472–480 (2013).

[Crossref]

X. Ding, X. Deng, K. Song, and G. Chen, “Security improvement for asymmetric cryptosystem based on spherical wave illumination,” Appl. Opt. 52, 467–473 (2013).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain,” Appl. Opt. 52, 4343–4352 (2013).

[Crossref]

A. M. Elshamy, A. N. Rashed, A. E. Mohamed, O. S. Faragalla, Y. Mu, S. A. Alshebeili, and F. A. EI-Samie, “Optical image encryption based on chaotic baker map and double random phase encoding,” J. Lightwave Technol. 31, 2533–2539 (2013).

[Crossref]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[Crossref]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[Crossref]

Z. Zhong, J. Chang, M. Shan, and B. Hao, “Double image encryption using double pixel scrambling and random phase encoding,” Opt. Commun. 285, 582–588 (2012).

[Crossref]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20, 11994–12003 (2012).

[Crossref]

M. R. Abuturab, “Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform,” Appl. Opt. 51, 7994–8002 (2012).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[Crossref]

Z. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. Liu, “Double image encryption by using iterative random binary encoding in gyrator domains,” Opt. Express 18, 12033–12043 (2010).

[Crossref]

H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[Crossref]

Y. Rivenson, A. Stern, and B. Javidi, “Single exposure super-resolution compressive imaging by double phase encoding,” Opt. Express 18, 15094–15103 (2010).

[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption method,” Adv. Opt. Photon. 1, 589–636 (2009).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. A 11, 075402 (2009).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

N. Otsu, “A threshold selection method from gray-level histograms,” IEEE Trans. Syst. Man, Cybern. 9, 62–66 (1979).

[Crossref]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

Z. Zhong, J. Chang, M. Shan, and B. Hao, “Double image encryption using double pixel scrambling and random phase encoding,” Opt. Commun. 285, 582–588 (2012).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and Y. Zhang, “Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding,” J. Opt. 16, 125403 (2014).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Optical information authentication using compressed double-random-phase-encoded images and quick-response codes,” Opt. Express 23, 6239–6253 (2015).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photon. 6, 120–155 (2014).

[Crossref]

W. Chen and X. Chen, “Double random phase encoding using phase reservation and compression,” J. Opt. 16, 025402 (2014).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Optical information authentication using compressed double-random-phase-encoded images and quick-response codes,” Opt. Express 23, 6239–6253 (2015).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photon. 6, 120–155 (2014).

[Crossref]

W. Chen and X. Chen, “Double random phase encoding using phase reservation and compression,” J. Opt. 16, 025402 (2014).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and Y. Zhang, “Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding,” J. Opt. 16, 125403 (2014).

[Crossref]

Z. Zhong, J. Chang, M. Shan, and B. Hao, “Double image encryption using double pixel scrambling and random phase encoding,” Opt. Commun. 285, 582–588 (2012).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Cryptoanalysis of an optical cryptosystem based on phase-truncated Fourier transform and nonlinear operations,” Opt. Commun. 428, 120–130 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Security analysis of a double-image encryption technique based on an asymmetric algorithm,” J. Opt. Soc. Am. A 35, 320–326 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask,” Appl. Opt. 57, 6010–6016 (2018).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photon. 6, 120–155 (2014).

[Crossref]

A. Markman and B. Javidi, “Full-phase photon-counting double-random-phase encryption,” J. Opt. Soc. Am. A 31, 394–403 (2014).

[Crossref]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[Crossref]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[Crossref]

Y. Rivenson, A. Stern, and B. Javidi, “Single exposure super-resolution compressive imaging by double phase encoding,” Opt. Express 18, 15094–15103 (2010).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

Z. Liu, S. Li, W. Liu, Y. Wang, and S. Liu, “Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding,” Opt. Lasers Eng. 51, 8–14 (2013).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. 8, 1–7 (2016).

[Crossref]

Z. Liu, S. Li, W. Liu, Y. Wang, and S. Liu, “Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding,” Opt. Lasers Eng. 51, 8–14 (2013).

[Crossref]

Z. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. Liu, “Double image encryption by using iterative random binary encoding in gyrator domains,” Opt. Express 18, 12033–12043 (2010).

[Crossref]

Z. Liu, S. Li, W. Liu, Y. Wang, and S. Liu, “Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding,” Opt. Lasers Eng. 51, 8–14 (2013).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. 8, 1–7 (2016).

[Crossref]

Z. Liu, S. Li, W. Liu, Y. Wang, and S. Liu, “Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding,” Opt. Lasers Eng. 51, 8–14 (2013).

[Crossref]

Z. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. Liu, “Double image encryption by using iterative random binary encoding in gyrator domains,” Opt. Express 18, 12033–12043 (2010).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude- and phase-truncation approach,” Opt. Lasers Eng. 52, 167–173 (2014).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude- and phase-truncation approach,” Opt. Lasers Eng. 52, 167–173 (2014).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain,” Appl. Opt. 52, 4343–4352 (2013).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

N. Otsu, “A threshold selection method from gray-level histograms,” IEEE Trans. Syst. Man, Cybern. 9, 62–66 (1979).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[Crossref]

W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. A 11, 075402 (2009).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]

Y. Xiong, C. Quan, and C. J. Tay, “Multiple image encryption scheme based on pixel exchange operation and vector decomposition,” Opt. Lasers Eng. 101, 113–121 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Cryptoanalysis of an optical cryptosystem based on phase-truncated Fourier transform and nonlinear operations,” Opt. Commun. 428, 120–130 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask,” Appl. Opt. 57, 6010–6016 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Security analysis of a double-image encryption technique based on an asymmetric algorithm,” J. Opt. Soc. Am. A 35, 320–326 (2018).

[Crossref]

Y. Wang, C. Quan, and C. J. Tay, “Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask,” Opt. Commun. 344, 147–155 (2015).

[Crossref]

B. Deepan, C. Quan, Y. Wang, and C. J. Tay, “Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique,” Appl. Opt. 53, 4539–4547 (2014).

[Crossref]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude- and phase-truncation approach,” Opt. Lasers Eng. 52, 167–173 (2014).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain,” Appl. Opt. 52, 4343–4352 (2013).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[Crossref]

Z. Zhong, J. Chang, M. Shan, and B. Hao, “Double image encryption using double pixel scrambling and random phase encoding,” Opt. Commun. 285, 582–588 (2012).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. 8, 1–7 (2016).

[Crossref]

A. Sinha, “Nonlinear optical cryptosystem resistant to standard and hybrid attacks,” Opt. Lasers Eng. 81, 79–86 (2016).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. 8, 1–7 (2016).

[Crossref]

Y. Xiong, C. Quan, and C. J. Tay, “Multiple image encryption scheme based on pixel exchange operation and vector decomposition,” Opt. Lasers Eng. 101, 113–121 (2018).

[Crossref]

Y. Wang, C. Quan, and C. J. Tay, “Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask,” Opt. Commun. 344, 147–155 (2015).

[Crossref]

B. Deepan, C. Quan, Y. Wang, and C. J. Tay, “Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique,” Appl. Opt. 53, 4539–4547 (2014).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Optical information authentication using compressed double-random-phase-encoded images and quick-response codes,” Opt. Express 23, 6239–6253 (2015).

[Crossref]

X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[Crossref]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[Crossref]

X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20, 11994–12003 (2012).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011).

[Crossref]

X. Wang and D. Zhao, “Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval,” Opt. Commun. 284, 4441–4445 (2011).

[Crossref]

X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50, 6645–6651 (2011).

[Crossref]

Y. Wang, C. Quan, and C. J. Tay, “Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask,” Opt. Commun. 344, 147–155 (2015).

[Crossref]

B. Deepan, C. Quan, Y. Wang, and C. J. Tay, “Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique,” Appl. Opt. 53, 4539–4547 (2014).

[Crossref]

Z. Liu, S. Li, W. Liu, Y. Wang, and S. Liu, “Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding,” Opt. Lasers Eng. 51, 8–14 (2013).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51, 472–480 (2013).

[Crossref]

Y. Xiong, C. Quan, and C. J. Tay, “Multiple image encryption scheme based on pixel exchange operation and vector decomposition,” Opt. Lasers Eng. 101, 113–121 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Cryptoanalysis of an optical cryptosystem based on phase-truncated Fourier transform and nonlinear operations,” Opt. Commun. 428, 120–130 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Security analysis of a double-image encryption technique based on an asymmetric algorithm,” J. Opt. Soc. Am. A 35, 320–326 (2018).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask,” Appl. Opt. 57, 6010–6016 (2018).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and Y. Zhang, “Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding,” J. Opt. 16, 125403 (2014).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and Y. Zhang, “Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding,” J. Opt. 16, 125403 (2014).

[Crossref]

Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51, 472–480 (2013).

[Crossref]

X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[Crossref]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[Crossref]

X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20, 11994–12003 (2012).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011).

[Crossref]

X. Wang and D. Zhao, “Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval,” Opt. Commun. 284, 4441–4445 (2011).

[Crossref]

X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50, 6645–6651 (2011).

[Crossref]

Z. Zhong, J. Chang, M. Shan, and B. Hao, “Double image encryption using double pixel scrambling and random phase encoding,” Opt. Commun. 285, 582–588 (2012).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and Y. Zhang, “Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding,” J. Opt. 16, 125403 (2014).

[Crossref]

B. Deepan, C. Quan, Y. Wang, and C. J. Tay, “Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique,” Appl. Opt. 53, 4539–4547 (2014).

[Crossref]

X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask,” Appl. Opt. 57, 6010–6016 (2018).

[Crossref]

H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002).

[Crossref]

X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50, 6645–6651 (2011).

[Crossref]

M. R. Abuturab, “Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform,” Appl. Opt. 51, 7994–8002 (2012).

[Crossref]

X. Ding, X. Deng, K. Song, and G. Chen, “Security improvement for asymmetric cryptosystem based on spherical wave illumination,” Appl. Opt. 52, 467–473 (2013).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain,” Appl. Opt. 52, 4343–4352 (2013).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. 8, 1–7 (2016).

[Crossref]

N. Otsu, “A threshold selection method from gray-level histograms,” IEEE Trans. Syst. Man, Cybern. 9, 62–66 (1979).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, and X. Peng, “Roadmap on optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and Y. Zhang, “Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding,” J. Opt. 16, 125403 (2014).

[Crossref]

W. Chen and X. Chen, “Double random phase encoding using phase reservation and compression,” J. Opt. 16, 025402 (2014).

[Crossref]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[Crossref]

W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. A 11, 075402 (2009).

[Crossref]

Z. Zhong, J. Chang, M. Shan, and B. Hao, “Double image encryption using double pixel scrambling and random phase encoding,” Opt. Commun. 285, 582–588 (2012).

[Crossref]

X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011).

[Crossref]

Y. Wang, C. Quan, and C. J. Tay, “Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask,” Opt. Commun. 344, 147–155 (2015).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

X. Wang and D. Zhao, “Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval,” Opt. Commun. 284, 4441–4445 (2011).

[Crossref]

Y. Xiong, A. He, and C. Quan, “Cryptoanalysis of an optical cryptosystem based on phase-truncated Fourier transform and nonlinear operations,” Opt. Commun. 428, 120–130 (2018).

[Crossref]

X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20, 11994–12003 (2012).

[Crossref]

Z. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. Liu, “Double image encryption by using iterative random binary encoding in gyrator domains,” Opt. Express 18, 12033–12043 (2010).

[Crossref]

H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[Crossref]

Y. Rivenson, A. Stern, and B. Javidi, “Single exposure super-resolution compressive imaging by double phase encoding,” Opt. Express 18, 15094–15103 (2010).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Optical information authentication using compressed double-random-phase-encoded images and quick-response codes,” Opt. Express 23, 6239–6253 (2015).

[Crossref]

A. Sinha, “Nonlinear optical cryptosystem resistant to standard and hybrid attacks,” Opt. Lasers Eng. 81, 79–86 (2016).

[Crossref]

I. Mehra, S. K. Rajput, and N. K. Nishchal, “Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude- and phase-truncation approach,” Opt. Lasers Eng. 52, 167–173 (2014).

[Crossref]

Z. Liu, S. Li, W. Liu, Y. Wang, and S. Liu, “Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding,” Opt. Lasers Eng. 51, 8–14 (2013).

[Crossref]

Y. Xiong, C. Quan, and C. J. Tay, “Multiple image encryption scheme based on pixel exchange operation and vector decomposition,” Opt. Lasers Eng. 101, 113–121 (2018).

[Crossref]

Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51, 472–480 (2013).

[Crossref]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[Crossref]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[Crossref]

O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[Crossref]