X. Wan, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Fresnel domain nonlinear image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm,” Appl. Opt. 53, 418–425 (2014).

[CrossRef]

A. Markman and B. Javidi, “Full phase photon counting double-random-phase encryption,” J. Opt. Soc. Am. A 31, 394–403 (2014).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

W. Chen, X. Chen, A. Anand, and B. Javidi, “Optical encryption using multiple intensity samplings in the axial domain,” J. Opt. Soc. Am. A 30, 806–812 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude- and phase-truncated Fresnel transform,” Appl. Opt. 52, 4343–4352 (2013).

[CrossRef]

Y.-Y. Chen, J.-H. Wang, C.-C. Lin, and H.-E. Hwang, “Lensless optical data hiding system based on phase encoding algorithm in the Fresnel domain,” Appl. Opt. 52, 5247–5257 (2013).

[CrossRef]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[CrossRef]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[CrossRef]

A. Alfalou and C. Brosseau, “Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction,” Opt. Commun. 307, 67–72 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated fractional Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption and authentication verification based on nonconventional fractional joint transform correlator,” Opt. Lasers Eng. 50, 1474–1483 (2012).

[CrossRef]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

E. Perez-Cabre, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[CrossRef]

M. Cho, A. Mahalanobis, and B. Javidi, “3D passive photon counting automatic target recognition using advanced correlation filters,” Opt. Lett. 36, 861–863 (2011).

[CrossRef]

N. K. Nishchal, “Hierarchical encrypted image watermarking using fractional Fourier domain random phase encoding,” Opt. Eng. 50, 097003 (2011).

[CrossRef]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photon. 1, 589–636 (2009).

[CrossRef]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[CrossRef]

Y. Frauel, A. Castro, T. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).

[CrossRef]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane,” Optik 35, 237–246 (1972).

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[CrossRef]

A. Alfalou and C. Brosseau, “Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction,” Opt. Commun. 307, 67–72 (2013).

[CrossRef]

A. Alfalou and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).

[CrossRef]

A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35, 1914–1916 (2010).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photon. 1, 589–636 (2009).

[CrossRef]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

A. Alfalou and C. Brosseau, “Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction,” Opt. Commun. 307, 67–72 (2013).

[CrossRef]

A. Alfalou and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).

[CrossRef]

A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35, 1914–1916 (2010).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photon. 1, 589–636 (2009).

[CrossRef]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[CrossRef]

L. Chen and D. Zhao, “Optical image encryption based on fractional wavelet transform,” Opt. Commun. 254, 361–367 (2005).

[CrossRef]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[CrossRef]

E. Perez-Cabre, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[CrossRef]

M. Cho, A. Mahalanobis, and B. Javidi, “3D passive photon counting automatic target recognition using advanced correlation filters,” Opt. Lett. 36, 861–863 (2011).

[CrossRef]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane,” Optik 35, 237–246 (1972).

B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).

[CrossRef]

A. Markman and B. Javidi, “Full phase photon counting double-random-phase encryption,” J. Opt. Soc. Am. A 31, 394–403 (2014).

[CrossRef]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[CrossRef]

W. Chen, X. Chen, A. Anand, and B. Javidi, “Optical encryption using multiple intensity samplings in the axial domain,” J. Opt. Soc. Am. A 30, 806–812 (2013).

[CrossRef]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[CrossRef]

M. Cho, A. Mahalanobis, and B. Javidi, “3D passive photon counting automatic target recognition using advanced correlation filters,” Opt. Lett. 36, 861–863 (2011).

[CrossRef]

E. Perez-Cabre, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[CrossRef]

Y. Frauel, A. Castro, T. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

S. Kishk and B. Javidi, “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28, 167–169 (2003).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).

[CrossRef]

B. Javidi, “Nonlinear joint power spectrum based optical correlation,” Appl. Opt. 28, 2358–2367 (1989).

[CrossRef]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[CrossRef]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Fresnel domain nonlinear image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm,” Appl. Opt. 53, 418–425 (2014).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude- and phase-truncated Fresnel transform,” Appl. Opt. 52, 4343–4352 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption and authentication verification based on nonconventional fractional joint transform correlator,” Opt. Lasers Eng. 50, 1474–1483 (2012).

[CrossRef]

N. K. Nishchal, “Hierarchical encrypted image watermarking using fractional Fourier domain random phase encoding,” Opt. Eng. 50, 097003 (2011).

[CrossRef]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[CrossRef]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[CrossRef]

E. Perez-Cabre, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Fresnel domain nonlinear image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm,” Appl. Opt. 53, 418–425 (2014).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude- and phase-truncated Fresnel transform,” Appl. Opt. 52, 4343–4352 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption and authentication verification based on nonconventional fractional joint transform correlator,” Opt. Lasers Eng. 50, 1474–1483 (2012).

[CrossRef]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane,” Optik 35, 237–246 (1972).

X. Wan, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[CrossRef]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[CrossRef]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated fractional Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[CrossRef]

L. Chen and D. Zhao, “Optical image encryption based on fractional wavelet transform,” Opt. Commun. 254, 361–367 (2005).

[CrossRef]

B. Javidi, “Nonlinear joint power spectrum based optical correlation,” Appl. Opt. 28, 2358–2367 (1989).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude- and phase-truncated Fresnel transform,” Appl. Opt. 52, 4343–4352 (2013).

[CrossRef]

Y.-Y. Chen, J.-H. Wang, C.-C. Lin, and H.-E. Hwang, “Lensless optical data hiding system based on phase encoding algorithm in the Fresnel domain,” Appl. Opt. 52, 5247–5257 (2013).

[CrossRef]

X. Wan, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Fresnel domain nonlinear image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm,” Appl. Opt. 53, 418–425 (2014).

[CrossRef]

E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 094001 (2012).

[CrossRef]

N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).

[CrossRef]

L. Chen and D. Zhao, “Optical image encryption based on fractional wavelet transform,” Opt. Commun. 254, 361–367 (2005).

[CrossRef]

J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007).

[CrossRef]

A. Alfalou and C. Brosseau, “Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction,” Opt. Commun. 307, 67–72 (2013).

[CrossRef]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated fractional Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem,” Opt. Commun. 309, 231–235 (2013).

[CrossRef]

B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

N. K. Nishchal, “Hierarchical encrypted image watermarking using fractional Fourier domain random phase encoding,” Opt. Eng. 50, 097003 (2011).

[CrossRef]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21, 5373–5378 (2013).

[CrossRef]

Y. Frauel, A. Castro, T. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

S. K. Rajput and N. K. Nishchal, “Image encryption and authentication verification based on nonconventional fractional joint transform correlator,” Opt. Lasers Eng. 50, 1474–1483 (2012).

[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[CrossRef]

A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35, 1914–1916 (2010).

[CrossRef]

A. Alfalou and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).

[CrossRef]

E. Perez-Cabre, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[CrossRef]

M. Cho, A. Mahalanobis, and B. Javidi, “3D passive photon counting automatic target recognition using advanced correlation filters,” Opt. Lett. 36, 861–863 (2011).

[CrossRef]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

Z. Zalevsky, D. Mendlovic, and R. G. Dorsch, “Gerchberg-Saxton algorithm applied in the fractional Fourier or the Fresnel domain,” Opt. Lett. 21, 842–844 (1996).

[CrossRef]

S. Kishk and B. Javidi, “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28, 167–169 (2003).

[CrossRef]

A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[CrossRef]

X. Wang and D. Zhao, “Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier transform-based encryption using a random amplitude mask,” Opt. Lett. 38, 3684–3686 (2013).

[CrossRef]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photon. 1, 589–636 (2009).

[CrossRef]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane,” Optik 35, 237–246 (1972).