H. Tashima, M. Takeda, H. Suzuki, and T. Obi, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[CrossRef]

P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331–333 (2009).

[CrossRef]

Y. Sheng, Z. Xin, M. Alam, L. Xin, and L. Xiao-Feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270–3284 (2009).

[CrossRef]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48, 5933–5947 (2009).

[CrossRef]

O. Matoba, T. Nomura, E. Pérez-Cabré, M. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[CrossRef]

M. Toishi, M. Hara, K. Tanaka, T. Tanaka, and K. Watanabe, “Novel encryption method using multi reference patterns in coaxial holographic data storage,” Jpn. J. Appl. Phys. 46, 3775 (2007).

[CrossRef]

Y. Frauel, A. Castro, T. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

D. Monaghan, U. Gopinathan, T. Naughton, and J. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[CrossRef]

J. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

Y. Hayasaki, Y. Matsuba, A. Nagaoka, H. Yamamoto, and N. Nishida, “Hiding an image with a light-scattering medium and use of a contrast-discrimination method for readout,” Appl. Opt. 43, 1552–1558 (2004).

[CrossRef]

H. Kim, D. Kim, and Y. Lee, “Encryption of digital hologram of 3-D object by virtual optics,” Opt. Express 12, 4912–4921 (2004).

[CrossRef]

H. Feistel, “Cryptography and computer privacy,” Sci. Am. 228, 15–23 (1973).

[CrossRef]

J. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

C. Blondeau and K. Nyberg, “New links between differential and linear cryptanalysis,” Lect. Notes Comput. Sci. 7881, 388–404 (2013).

[CrossRef]

J. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

H. Feistel, “Cryptography and computer privacy,” Sci. Am. 228, 15–23 (1973).

[CrossRef]

M. Toishi, M. Hara, K. Tanaka, T. Tanaka, and K. Watanabe, “Novel encryption method using multi reference patterns in coaxial holographic data storage,” Jpn. J. Appl. Phys. 46, 3775 (2007).

[CrossRef]

J. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

E. Pérez-Cabré, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[CrossRef]

O. Matoba, T. Nomura, E. Pérez-Cabré, M. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[CrossRef]

Y. Frauel, A. Castro, T. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

S. Kishk and B. Javidi, “3D object watermarking by a 3D hidden object,” Opt. Express 11, 874–888 (2003).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

F. Goudail, F. Bollaro, B. Javidi, and P. Réfrégier, “Influence of a perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629–2638 (1998).

[CrossRef]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331–333 (2009).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

O. Matoba, T. Nomura, E. Pérez-Cabré, M. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[CrossRef]

X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, “Secure optical memory system with polarization encryption,” Appl. Opt. 40, 2310–2315 (2001).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

O. Matoba, T. Nomura, E. Pérez-Cabré, M. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[CrossRef]

T. Naughton, B. Hennelly, and T. Dowling, “Introducing secure modes of operation for optical encryption,” J. Opt. Soc. Am. A 25, 2608–2617 (2008).

[CrossRef]

D. Monaghan, U. Gopinathan, T. Naughton, and J. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[CrossRef]

Y. Frauel, A. Castro, T. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

O. Matoba, T. Nomura, E. Pérez-Cabré, M. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[CrossRef]

C. Blondeau and K. Nyberg, “New links between differential and linear cryptanalysis,” Lect. Notes Comput. Sci. 7881, 388–404 (2013).

[CrossRef]

E. Pérez-Cabré, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[CrossRef]

O. Matoba, T. Nomura, E. Pérez-Cabré, M. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[CrossRef]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331–333 (2009).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

W. Stallings, Cryptography and Network Security Principles and Practice (Prentice Hall, 2011).

P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

M. Toishi, M. Hara, K. Tanaka, T. Tanaka, and K. Watanabe, “Novel encryption method using multi reference patterns in coaxial holographic data storage,” Jpn. J. Appl. Phys. 46, 3775 (2007).

[CrossRef]

M. Toishi, M. Hara, K. Tanaka, T. Tanaka, and K. Watanabe, “Novel encryption method using multi reference patterns in coaxial holographic data storage,” Jpn. J. Appl. Phys. 46, 3775 (2007).

[CrossRef]

J. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

M. Toishi, M. Hara, K. Tanaka, T. Tanaka, and K. Watanabe, “Novel encryption method using multi reference patterns in coaxial holographic data storage,” Jpn. J. Appl. Phys. 46, 3775 (2007).

[CrossRef]

J. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

M. Toishi, M. Hara, K. Tanaka, T. Tanaka, and K. Watanabe, “Novel encryption method using multi reference patterns in coaxial holographic data storage,” Jpn. J. Appl. Phys. 46, 3775 (2007).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, “Secure optical memory system with polarization encryption,” Appl. Opt. 40, 2310–2315 (2001).

[CrossRef]

Y. Hayasaki, Y. Matsuba, A. Nagaoka, H. Yamamoto, and N. Nishida, “Hiding an image with a light-scattering medium and use of a contrast-discrimination method for readout,” Appl. Opt. 43, 1552–1558 (2004).

[CrossRef]

D. Monaghan, U. Gopinathan, T. Naughton, and J. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[CrossRef]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48, 5933–5947 (2009).

[CrossRef]

T. Naughton, B. Hennelly, and T. Dowling, “Introducing secure modes of operation for optical encryption,” J. Opt. Soc. Am. A 25, 2608–2617 (2008).

[CrossRef]

N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).

[CrossRef]

F. Goudail, F. Bollaro, B. Javidi, and P. Réfrégier, “Influence of a perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629–2638 (1998).

[CrossRef]

M. Toishi, M. Hara, K. Tanaka, T. Tanaka, and K. Watanabe, “Novel encryption method using multi reference patterns in coaxial holographic data storage,” Jpn. J. Appl. Phys. 46, 3775 (2007).

[CrossRef]

C. Blondeau and K. Nyberg, “New links between differential and linear cryptanalysis,” Lect. Notes Comput. Sci. 7881, 388–404 (2013).

[CrossRef]

J. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006).

[CrossRef]

H. Kim, D. Kim, and Y. Lee, “Encryption of digital hologram of 3-D object by virtual optics,” Opt. Express 12, 4912–4921 (2004).

[CrossRef]

S. Kishk and B. Javidi, “3D object watermarking by a 3D hidden object,” Opt. Express 11, 874–888 (2003).

[CrossRef]

H. Tashima, M. Takeda, H. Suzuki, and T. Obi, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010).

[CrossRef]

Y. Frauel, A. Castro, T. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[CrossRef]

Y. Sheng, Z. Xin, M. Alam, L. Xin, and L. Xiao-Feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270–3284 (2009).

[CrossRef]

P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010).

[CrossRef]

W. Chen, X. Chen, and C. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).

[CrossRef]

E. Pérez-Cabré, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[CrossRef]

Y. Zhang, D. Xiao, W. Wen, and H. Liu, “Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding,” Opt. Lett. 38, 4506–4509 (2013).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double-random-phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331–333 (2009).

[CrossRef]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

O. Matoba, T. Nomura, E. Pérez-Cabré, M. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009).

[CrossRef]

H. Feistel, “Cryptography and computer privacy,” Sci. Am. 228, 15–23 (1973).

[CrossRef]

W. Stallings, Cryptography and Network Security Principles and Practice (Prentice Hall, 2011).