X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009).

[CrossRef]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235(4-6), 253–259 (2004).

[CrossRef]

Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202(4-6), 277–285 (2002).

[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, “Optical image encryption based on XOR operations,” Opt. Eng. (Bellingham) 38(1), 47–54 (1999).

[CrossRef]

J. W. Han, S. H. Lee, and E. S. Kin, “Optical key bit stream generator,” Opt. Eng. (Bellingham) 38(1), 33–38 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24(11), 762–764 (1999).

[CrossRef]

P. K. Wang, L. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. (Bellingham) 35(9), 2464–2469 (1996).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009).

[CrossRef]

P. K. Wang, L. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. (Bellingham) 35(9), 2464–2469 (1996).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009).

[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, “Optical image encryption based on XOR operations,” Opt. Eng. (Bellingham) 38(1), 47–54 (1999).

[CrossRef]

J. W. Han, S. H. Lee, and E. S. Kin, “Optical key bit stream generator,” Opt. Eng. (Bellingham) 38(1), 33–38 (1999).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007).

[CrossRef]
[PubMed]

B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25(1), 28–30 (2000).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24(11), 762–764 (1999).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995).

[CrossRef]
[PubMed]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235(4-6), 253–259 (2004).

[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, “Optical image encryption based on XOR operations,” Opt. Eng. (Bellingham) 38(1), 47–54 (1999).

[CrossRef]

J. W. Han, S. H. Lee, and E. S. Kin, “Optical key bit stream generator,” Opt. Eng. (Bellingham) 38(1), 33–38 (1999).

[CrossRef]

J. W. Han, S. H. Lee, and E. S. Kin, “Optical key bit stream generator,” Opt. Eng. (Bellingham) 38(1), 33–38 (1999).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009).

[CrossRef]

Z. J. Liu and S. T. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275(2), 324–329 (2007).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007).

[CrossRef]
[PubMed]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14(8), 3181–3186 (2006).

[CrossRef]
[PubMed]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235(4-6), 253–259 (2004).

[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, “Optical image encryption based on XOR operations,” Opt. Eng. (Bellingham) 38(1), 47–54 (1999).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009).

[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, “Optical image encryption based on XOR operations,” Opt. Eng. (Bellingham) 38(1), 47–54 (1999).

[CrossRef]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235(4-6), 253–259 (2004).

[CrossRef]

Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202(4-6), 277–285 (2002).

[CrossRef]

P. K. Wang, L. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. (Bellingham) 35(9), 2464–2469 (1996).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009).

[CrossRef]

P. K. Wang, L. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. (Bellingham) 35(9), 2464–2469 (1996).

[CrossRef]

Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202(4-6), 277–285 (2002).

[CrossRef]

X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009).

[CrossRef]

Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202(4-6), 277–285 (2002).

[CrossRef]

Z. J. Liu and S. T. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275(2), 324–329 (2007).

[CrossRef]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235(4-6), 253–259 (2004).

[CrossRef]

P. K. Wang, L. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. (Bellingham) 35(9), 2464–2469 (1996).

[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, “Optical image encryption based on XOR operations,” Opt. Eng. (Bellingham) 38(1), 47–54 (1999).

[CrossRef]

J. W. Han, S. H. Lee, and E. S. Kin, “Optical key bit stream generator,” Opt. Eng. (Bellingham) 38(1), 33–38 (1999).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14(8), 3181–3186 (2006).

[CrossRef]
[PubMed]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007).

[CrossRef]
[PubMed]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33(21), 2443–2445 (2008).

[CrossRef]
[PubMed]

S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26(16), 1242–1244 (2001).

[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005).

[CrossRef]
[PubMed]

B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25(1), 28–30 (2000).

[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995).

[CrossRef]
[PubMed]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24(11), 762–764 (1999).

[CrossRef]