Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domains,” Opt. Commun. 282, 518–522 (2009).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, “A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains,” Opt. Commun. 282, 1536–1540 (2009).

[Crossref]

Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32, 2088–2090 (2007).

[Crossref]
[PubMed]

Z. Liu and S. Liu, “Randomization of the Fourier transform,” Opt. Lett. 32, 478–480 (2007).

[Crossref]
[PubMed]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[Crossref]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]
[PubMed]

L. Chen and D. Zhao, “Optical image encryption with Hartley transforms,” Opt. Lett. 31, 3438–3440 (2006).

[Crossref]
[PubMed]

X. Wang and D. Zhao, “Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry,” Opt. Commun. 268, 240–244 (2006).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]
[PubMed]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]
[PubMed]

Y. Zhang, CH. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002).

[Crossref]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999).

[Crossref]

J. W. Han, S. Lee, and E. S. Kim, “Optical key bit stream generator,” Opt. Eng. 38, 33–38 (1999).

[Crossref]

S. Zhang and R. Karim, “High-security optical integrated stream ciphers,” Opt. Eng. 38, 20–24 (1999).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain” Opt. Lett. 24, 762–764 (1999).

[Crossref]

B. Javidi, G. Zhang, and J. Li, “Encrypted optical memory using double-random phase encoding,” Opt. Eng. 36, 1054–1058 (1997).

M. Madjarova, M. Kakuta, M. Yamaguchi, and N. Ohyama, “Optical implementation of the stream cipher based on the irreversible cellular automata algorithm,” Opt. Lett. 22, 1624–1626 (1997).

[Crossref]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, “A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains,” Opt. Commun. 282, 1536–1540 (2009).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domains,” Opt. Commun. 282, 518–522 (2009).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, “A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains,” Opt. Commun. 282, 1536–1540 (2009).

[Crossref]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999).

[Crossref]

J. W. Han, S. Lee, and E. S. Kim, “Optical key bit stream generator,” Opt. Eng. 38, 33–38 (1999).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain” Opt. Lett. 24, 762–764 (1999).

[Crossref]

B. Javidi, G. Zhang, and J. Li, “Encrypted optical memory using double-random phase encoding,” Opt. Eng. 36, 1054–1058 (1997).

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]
[PubMed]

S. Zhang and R. Karim, “High-security optical integrated stream ciphers,” Opt. Eng. 38, 20–24 (1999).

[Crossref]

J. W. Han, S. Lee, and E. S. Kim, “Optical key bit stream generator,” Opt. Eng. 38, 33–38 (1999).

[Crossref]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999).

[Crossref]

J. W. Han, S. Lee, and E. S. Kim, “Optical key bit stream generator,” Opt. Eng. 38, 33–38 (1999).

[Crossref]

H. Li and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749 (2008).

[Crossref]

B. Javidi, G. Zhang, and J. Li, “Encrypted optical memory using double-random phase encoding,” Opt. Eng. 36, 1054–1058 (1997).

Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, “A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains,” Opt. Commun. 282, 1536–1540 (2009).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domains,” Opt. Commun. 282, 518–522 (2009).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, “A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains,” Opt. Commun. 282, 1536–1540 (2009).

[Crossref]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[Crossref]

Z. Liu and S. Liu, “Randomization of the Fourier transform,” Opt. Lett. 32, 478–480 (2007).

[Crossref]
[PubMed]

Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32, 2088–2090 (2007).

[Crossref]
[PubMed]

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, “A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains,” Opt. Commun. 282, 1536–1540 (2009).

[Crossref]

Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domains,” Opt. Commun. 282, 518–522 (2009).

[Crossref]

Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32, 2088–2090 (2007).

[Crossref]
[PubMed]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[Crossref]

Z. Liu and S. Liu, “Randomization of the Fourier transform,” Opt. Lett. 32, 478–480 (2007).

[Crossref]
[PubMed]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999).

[Crossref]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999).

[Crossref]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domains,” Opt. Commun. 282, 518–522 (2009).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, “A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains,” Opt. Commun. 282, 1536–1540 (2009).

[Crossref]

Y. Zhang, CH. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002).

[Crossref]

X. Wang and D. Zhao, “Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry,” Opt. Commun. 268, 240–244 (2006).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

H. Li and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749 (2008).

[Crossref]

B. Javidi, G. Zhang, and J. Li, “Encrypted optical memory using double-random phase encoding,” Opt. Eng. 36, 1054–1058 (1997).

S. Zhang and R. Karim, “High-security optical integrated stream ciphers,” Opt. Eng. 38, 20–24 (1999).

[Crossref]

Y. Zhang, CH. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002).

[Crossref]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[Crossref]
[PubMed]

T. Sasaki, H. Togo, J. Tanida, and Y. Ichioka, “Stream cipher based on pseudorandom number generation with optical affine transformation,” Appl. Opt. 39, 2340–2346 (2000).

[Crossref]

J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21, 2758–2769 (1982).

[Crossref]
[PubMed]

Y. Zhang, CH. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002).

[Crossref]

X. Wang and D. Zhao, “Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry,” Opt. Commun. 268, 240–244 (2006).

[Crossref]

Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007).

[Crossref]

H. Li and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749 (2008).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domains,” Opt. Commun. 282, 518–522 (2009).

[Crossref]

Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, “A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains,” Opt. Commun. 282, 1536–1540 (2009).

[Crossref]

B. Javidi, G. Zhang, and J. Li, “Encrypted optical memory using double-random phase encoding,” Opt. Eng. 36, 1054–1058 (1997).

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999).

[Crossref]

J. W. Han, S. Lee, and E. S. Kim, “Optical key bit stream generator,” Opt. Eng. 38, 33–38 (1999).

[Crossref]

S. Zhang and R. Karim, “High-security optical integrated stream ciphers,” Opt. Eng. 38, 20–24 (1999).

[Crossref]

Z. Liu and S. Liu, “Randomization of the Fourier transform,” Opt. Lett. 32, 478–480 (2007).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005).

[Crossref]
[PubMed]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).

[Crossref]
[PubMed]

M. Madjarova, M. Kakuta, M. Yamaguchi, and N. Ohyama, “Optical implementation of the stream cipher based on the irreversible cellular automata algorithm,” Opt. Lett. 22, 1624–1626 (1997).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain” Opt. Lett. 24, 762–764 (1999).

[Crossref]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).

[Crossref]
[PubMed]

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[Crossref]

Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32, 2088–2090 (2007).

[Crossref]
[PubMed]

L. Chen and D. Zhao, “Optical image encryption with Hartley transforms,” Opt. Lett. 31, 3438–3440 (2006).

[Crossref]
[PubMed]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]
[PubMed]

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).