X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]
[PubMed]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]
[PubMed]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]
[PubMed]

S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by Simulated Annealing,” Science 220, 671–680 (1983).

[CrossRef]
[PubMed]

F. J. O. Martinez, J. S. Gonzalez, and I. Stojmenovic, “A parallel hill climbing algorithm for pushing dependent data in clients-providers-servers systems,” in Proceedings of IEEE International Symposium on Computers and Communications (Institute of Electrical and Electronics Engineers, New York, 2002), pp. 611–616.

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-15-16-10253.

[CrossRef]
[PubMed]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with wavelength-key and random phase codes,” Appl. Opt. 38, 6785–6790 (1999).

[CrossRef]

Ph. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995)

[CrossRef]
[PubMed]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331–333 (2009)

[CrossRef]
[PubMed]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by Simulated Annealing,” Science 220, 671–680 (1983).

[CrossRef]
[PubMed]

S. Liu, L. Yu, and B. Zhu, “Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,” Opt. Commun. 187, 57–63 (2001).

[CrossRef]

F. J. O. Martinez, J. S. Gonzalez, and I. Stojmenovic, “A parallel hill climbing algorithm for pushing dependent data in clients-providers-servers systems,” in Proceedings of IEEE International Symposium on Computers and Communications (Institute of Electrical and Electronics Engineers, New York, 2002), pp. 611–616.

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]
[PubMed]

S. Nahar, S. Sahni, and E. Shragowitz, “Simulated annealing and combinatorial optimization,” in Proceedings of ACM/IEEE Conference on Design Automation (Institute of Electrical and Electronics Engineers, New York, 1986), pp. 293–299.

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-15-16-10253.

[CrossRef]
[PubMed]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J.T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-14-8-3181.

[CrossRef]
[PubMed]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046, (2006).

[CrossRef]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]
[PubMed]

S. Nahar, S. Sahni, and E. Shragowitz, “Simulated annealing and combinatorial optimization,” in Proceedings of ACM/IEEE Conference on Design Automation (Institute of Electrical and Electronics Engineers, New York, 1986), pp. 293–299.

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]
[PubMed]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[CrossRef]

S. Nahar, S. Sahni, and E. Shragowitz, “Simulated annealing and combinatorial optimization,” in Proceedings of ACM/IEEE Conference on Design Automation (Institute of Electrical and Electronics Engineers, New York, 1986), pp. 293–299.

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331–333 (2009)

[CrossRef]
[PubMed]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

W. Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed. (Prentice Hall, 2004).

F. J. O. Martinez, J. S. Gonzalez, and I. Stojmenovic, “A parallel hill climbing algorithm for pushing dependent data in clients-providers-servers systems,” in Proceedings of IEEE International Symposium on Computers and Communications (Institute of Electrical and Electronics Engineers, New York, 2002), pp. 611–616.

S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by Simulated Annealing,” Science 220, 671–680 (1983).

[CrossRef]
[PubMed]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046, (2006).

[CrossRef]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]
[PubMed]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]
[PubMed]

S. Liu, L. Yu, and B. Zhu, “Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,” Opt. Commun. 187, 57–63 (2001).

[CrossRef]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046, (2006).

[CrossRef]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]
[PubMed]

S. Liu, L. Yu, and B. Zhu, “Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,” Opt. Commun. 187, 57–63 (2001).

[CrossRef]

S. Liu, L. Yu, and B. Zhu, “Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,” Opt. Commun. 187, 57–63 (2001).

[CrossRef]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[CrossRef]

H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14, 1755–1766 (2006). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-14-5-1755.

[CrossRef]
[PubMed]

R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Opt. Express 15, 16067–16079 (2007). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-15-24-16067.

[CrossRef]
[PubMed]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J.T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-14-8-3181.

[CrossRef]
[PubMed]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-15-16-10253.

[CrossRef]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046, (2006).

[CrossRef]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[CrossRef]
[PubMed]

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).

[CrossRef]
[PubMed]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331–333 (2009)

[CrossRef]
[PubMed]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

Ph. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995)

[CrossRef]
[PubMed]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]
[PubMed]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-ciphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]
[PubMed]

S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by Simulated Annealing,” Science 220, 671–680 (1983).

[CrossRef]
[PubMed]

S. Nahar, S. Sahni, and E. Shragowitz, “Simulated annealing and combinatorial optimization,” in Proceedings of ACM/IEEE Conference on Design Automation (Institute of Electrical and Electronics Engineers, New York, 1986), pp. 293–299.

W. Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed. (Prentice Hall, 2004).

F. J. O. Martinez, J. S. Gonzalez, and I. Stojmenovic, “A parallel hill climbing algorithm for pushing dependent data in clients-providers-servers systems,” in Proceedings of IEEE International Symposium on Computers and Communications (Institute of Electrical and Electronics Engineers, New York, 2002), pp. 611–616.