X. W. Li and I. K. Lee, “Robust copyright protection using multiple ownership watermarks,” Opt. Express 23(3), 3035–3046 (2015).

[Crossref]
[PubMed]

N. Rawat, B. Kim, I. Muniraj, G. Situ, and B. G. Lee, “Compressive sensing based robust multispectral double-image encryption,” Appl. Opt. 54(7), 1782–1793 (2015).

[Crossref]

D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).

[Crossref]
[PubMed]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and H. Yu, “Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains,” Opt. Lasers Eng. 66, 1–9 (2015).

[Crossref]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

N. Zhou, H. Li, D. Wang, S. Pan, and Z. Zhou, “Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform,” Opt. Commun. 343, 10–21 (2015).

[Crossref]

A. Alfalou and C. Brosseau, “Chapter two – Recent advances in optical image processing,” Progress in Opt. 60, 119–262 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

L. Chen, J. Liu, J. Wen, H. Mao, F. Ge, and D. Zhao, “Pseudo color image encryption based on three-beams interference principle and common vector composition,” Opt. Commun. 338, 110–116 (2015).

[Crossref]

H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, “Double phase-image encryption using gyrator transforms and structured phase mask in the frequency plane,” Opt. Lasers Eng. 67, 145–156 (2015).

[Crossref]

I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images using two beam interference phenomenon,” Opt. Laser Technol. 60, 1–7 (2014).

[Crossref]

S. Vashisth, H. Singh, A. K. Yadav, and K. Singh, “Image encryption using fractional Mellin transform, structured phase filters, and phase retrieval,” Optik (Stuttg.) 125(18), 5309–5315 (2014).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding,” Opt. Express 22(19), 22981–22995 (2014).

[Crossref]
[PubMed]

J. Li, J. Li, L. Shen, Y. Pan, and R. Li, “Optical image encryption and hiding based on a modified Mach-Zehnder interferometer,” Opt. Express 22(4), 4849–4860 (2014).

[Crossref]
[PubMed]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(2), 120–155 (2014).

[Crossref]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).

[Crossref]

Y. Shi, T. Li, Y. Wang, Q. Gao, S. Zhang, and H. Li, “Optical image encryption via ptychography,” Opt. Lett. 38(9), 1425–1427 (2013).

[Crossref]
[PubMed]

S. Liansheng, X. Meiting, and T. Ailing, “Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain,” Opt. Lett. 38(11), 1996–1998 (2013).

[Crossref]
[PubMed]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52(4), 871–878 (2013).

[Crossref]
[PubMed]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain,” Appl. Opt. 52(18), 4343–4352 (2013).

[Crossref]
[PubMed]

R. Abuturab, “Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain,” Opt. Laser Technol. 45, 524–532 (2013).

S. Yuan, T. Zhang, X. Zhou, X. Liu, and M. Liu, “Optical authentication technique based on interference image hiding system and phase-only correlation,” Opt. Commun. 304, 129–135 (2013).

[Crossref]

Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51(4), 472–480 (2013).

[Crossref]

Q. Wang, “Optical image encryption with silhouette removal based on interference and phase blend processing,” Opt. Commun. 285(21–22), 4294–4301 (2012).

[Crossref]

X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51(6), 686–691 (2012).

[Crossref]
[PubMed]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012).

[Crossref]

W. Chen, X. Chen, and C. J. R. Sheppard, “Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain,” Opt. Express 20(4), 3853–3865 (2012).

[Crossref]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

R. Abuturab, “Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain,” Opt. Laser Technol. 45, 524–532 (2013).

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).

[Crossref]

A. Alfalou and C. Brosseau, “Chapter two – Recent advances in optical image processing,” Progress in Opt. 60, 119–262 (2015).

[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photonics 1(3), 589–636 (2009).

[Crossref]

D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).

[Crossref]
[PubMed]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005).

[Crossref]
[PubMed]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and H. Yu, “Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains,” Opt. Lasers Eng. 66, 1–9 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

L. Chen, J. Liu, J. Wen, H. Mao, F. Ge, and D. Zhao, “Pseudo color image encryption based on three-beams interference principle and common vector composition,” Opt. Commun. 338, 110–116 (2015).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(2), 120–155 (2014).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding,” Opt. Express 22(19), 22981–22995 (2014).

[Crossref]
[PubMed]

W. Chen, X. Chen, and C. J. R. Sheppard, “Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain,” Opt. Express 20(4), 3853–3865 (2012).

[Crossref]
[PubMed]

X. Wang, W. Chen, and X. Chen, “Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding,” Opt. Express 22(19), 22981–22995 (2014).

[Crossref]
[PubMed]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(2), 120–155 (2014).

[Crossref]

W. Chen, X. Chen, and C. J. R. Sheppard, “Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain,” Opt. Express 20(4), 3853–3865 (2012).

[Crossref]
[PubMed]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and H. Yu, “Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains,” Opt. Lasers Eng. 66, 1–9 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

L. Chen, J. Liu, J. Wen, H. Mao, F. Ge, and D. Zhao, “Pseudo color image encryption based on three-beams interference principle and common vector composition,” Opt. Commun. 338, 110–116 (2015).

[Crossref]

D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).

[Crossref]
[PubMed]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(2), 120–155 (2014).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995).

[Crossref]
[PubMed]

D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).

[Crossref]
[PubMed]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005).

[Crossref]
[PubMed]

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).

[Crossref]

N. Zhou, H. Li, D. Wang, S. Pan, and Z. Zhou, “Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform,” Opt. Commun. 343, 10–21 (2015).

[Crossref]

Y. Shi, T. Li, Y. Wang, Q. Gao, S. Zhang, and H. Li, “Optical image encryption via ptychography,” Opt. Lett. 38(9), 1425–1427 (2013).

[Crossref]
[PubMed]

J. Li, J. Li, L. Shen, Y. Pan, and R. Li, “Optical image encryption and hiding based on a modified Mach-Zehnder interferometer,” Opt. Express 22(4), 4849–4860 (2014).

[Crossref]
[PubMed]

J. Li, J. Li, L. Shen, Y. Pan, and R. Li, “Optical image encryption and hiding based on a modified Mach-Zehnder interferometer,” Opt. Express 22(4), 4849–4860 (2014).

[Crossref]
[PubMed]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun. 284(16–17), 3895–3903 (2011).

[Crossref]

L. Chen, J. Liu, J. Wen, H. Mao, F. Ge, and D. Zhao, “Pseudo color image encryption based on three-beams interference principle and common vector composition,” Opt. Commun. 338, 110–116 (2015).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

S. Yuan, T. Zhang, X. Zhou, X. Liu, and M. Liu, “Optical authentication technique based on interference image hiding system and phase-only correlation,” Opt. Commun. 304, 129–135 (2013).

[Crossref]

S. Yuan, T. Zhang, X. Zhou, X. Liu, and M. Liu, “Optical authentication technique based on interference image hiding system and phase-only correlation,” Opt. Commun. 304, 129–135 (2013).

[Crossref]

L. Chen, J. Liu, J. Wen, H. Mao, F. Ge, and D. Zhao, “Pseudo color image encryption based on three-beams interference principle and common vector composition,” Opt. Commun. 338, 110–116 (2015).

[Crossref]

I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images using two beam interference phenomenon,” Opt. Laser Technol. 60, 1–7 (2014).

[Crossref]

N. Zhou, H. Li, D. Wang, S. Pan, and Z. Zhou, “Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform,” Opt. Commun. 343, 10–21 (2015).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35(2), 118–120 (2010).

[Crossref]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, “Double phase-image encryption using gyrator transforms and structured phase mask in the frequency plane,” Opt. Lasers Eng. 67, 145–156 (2015).

[Crossref]

S. Vashisth, H. Singh, A. K. Yadav, and K. Singh, “Image encryption using fractional Mellin transform, structured phase filters, and phase retrieval,” Optik (Stuttg.) 125(18), 5309–5315 (2014).

[Crossref]

H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, “Double phase-image encryption using gyrator transforms and structured phase mask in the frequency plane,” Opt. Lasers Eng. 67, 145–156 (2015).

[Crossref]

S. Vashisth, H. Singh, A. K. Yadav, and K. Singh, “Image encryption using fractional Mellin transform, structured phase filters, and phase retrieval,” Optik (Stuttg.) 125(18), 5309–5315 (2014).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50(13), 1805–1811 (2011).

[Crossref]
[PubMed]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, “Double phase-image encryption using gyrator transforms and structured phase mask in the frequency plane,” Opt. Lasers Eng. 67, 145–156 (2015).

[Crossref]

S. Vashisth, H. Singh, A. K. Yadav, and K. Singh, “Image encryption using fractional Mellin transform, structured phase filters, and phase retrieval,” Optik (Stuttg.) 125(18), 5309–5315 (2014).

[Crossref]

N. Zhou, H. Li, D. Wang, S. Pan, and Z. Zhou, “Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform,” Opt. Commun. 343, 10–21 (2015).

[Crossref]

Q. Wang, “Optical image encryption with silhouette removal based on interference and phase blend processing,” Opt. Commun. 285(21–22), 4294–4301 (2012).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding,” Opt. Express 22(19), 22981–22995 (2014).

[Crossref]
[PubMed]

X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51(6), 686–691 (2012).

[Crossref]
[PubMed]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012).

[Crossref]

H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun. 284(16–17), 3895–3903 (2011).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

L. Chen, J. Liu, J. Wen, H. Mao, F. Ge, and D. Zhao, “Pseudo color image encryption based on three-beams interference principle and common vector composition,” Opt. Commun. 338, 110–116 (2015).

[Crossref]

Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51(4), 472–480 (2013).

[Crossref]

H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, “Double phase-image encryption using gyrator transforms and structured phase mask in the frequency plane,” Opt. Lasers Eng. 67, 145–156 (2015).

[Crossref]

S. Vashisth, H. Singh, A. K. Yadav, and K. Singh, “Image encryption using fractional Mellin transform, structured phase filters, and phase retrieval,” Optik (Stuttg.) 125(18), 5309–5315 (2014).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and H. Yu, “Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains,” Opt. Lasers Eng. 66, 1–9 (2015).

[Crossref]

S. Yuan, T. Zhang, X. Zhou, X. Liu, and M. Liu, “Optical authentication technique based on interference image hiding system and phase-only correlation,” Opt. Commun. 304, 129–135 (2013).

[Crossref]

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and H. Yu, “Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains,” Opt. Lasers Eng. 66, 1–9 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

S. Yuan, T. Zhang, X. Zhou, X. Liu, and M. Liu, “Optical authentication technique based on interference image hiding system and phase-only correlation,” Opt. Commun. 304, 129–135 (2013).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51(4), 472–480 (2013).

[Crossref]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33(21), 2443–2445 (2008).

[Crossref]
[PubMed]

L. Chen, J. Liu, J. Wen, H. Mao, F. Ge, and D. Zhao, “Pseudo color image encryption based on three-beams interference principle and common vector composition,” Opt. Commun. 338, 110–116 (2015).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012).

[Crossref]

X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51(6), 686–691 (2012).

[Crossref]
[PubMed]

N. Zhou, H. Li, D. Wang, S. Pan, and Z. Zhou, “Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform,” Opt. Commun. 343, 10–21 (2015).

[Crossref]

S. Yuan, T. Zhang, X. Zhou, X. Liu, and M. Liu, “Optical authentication technique based on interference image hiding system and phase-only correlation,” Opt. Commun. 304, 129–135 (2013).

[Crossref]

N. Zhou, H. Li, D. Wang, S. Pan, and Z. Zhou, “Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform,” Opt. Commun. 343, 10–21 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and H. Yu, “Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains,” Opt. Lasers Eng. 66, 1–9 (2015).

[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photonics 1(3), 589–636 (2009).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(2), 120–155 (2014).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52(4), 871–878 (2013).

[Crossref]
[PubMed]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain,” Appl. Opt. 52(18), 4343–4352 (2013).

[Crossref]
[PubMed]

N. Rawat, B. Kim, I. Muniraj, G. Situ, and B. G. Lee, “Compressive sensing based robust multispectral double-image encryption,” Appl. Opt. 54(7), 1782–1793 (2015).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50(13), 1805–1811 (2011).

[Crossref]
[PubMed]

X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51(6), 686–691 (2012).

[Crossref]
[PubMed]

A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48(31), 5933–5947 (2009).

[Crossref]
[PubMed]

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).

[Crossref]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

N. Zhou, H. Li, D. Wang, S. Pan, and Z. Zhou, “Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform,” Opt. Commun. 343, 10–21 (2015).

[Crossref]

Q. Wang, “Optical image encryption with silhouette removal based on interference and phase blend processing,” Opt. Commun. 285(21–22), 4294–4301 (2012).

[Crossref]

S. Yuan, T. Zhang, X. Zhou, X. Liu, and M. Liu, “Optical authentication technique based on interference image hiding system and phase-only correlation,” Opt. Commun. 304, 129–135 (2013).

[Crossref]

H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun. 284(16–17), 3895–3903 (2011).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012).

[Crossref]

L. Chen, J. Liu, J. Wen, H. Mao, F. Ge, and D. Zhao, “Pseudo color image encryption based on three-beams interference principle and common vector composition,” Opt. Commun. 338, 110–116 (2015).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding,” Opt. Express 22(19), 22981–22995 (2014).

[Crossref]
[PubMed]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).

[Crossref]
[PubMed]

W. Chen, X. Chen, and C. J. R. Sheppard, “Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain,” Opt. Express 20(4), 3853–3865 (2012).

[Crossref]
[PubMed]

X. W. Li and I. K. Lee, “Robust copyright protection using multiple ownership watermarks,” Opt. Express 23(3), 3035–3046 (2015).

[Crossref]
[PubMed]

J. Li, J. Li, L. Shen, Y. Pan, and R. Li, “Optical image encryption and hiding based on a modified Mach-Zehnder interferometer,” Opt. Express 22(4), 4849–4860 (2014).

[Crossref]
[PubMed]

R. Abuturab, “Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain,” Opt. Laser Technol. 45, 524–532 (2013).

I. Mehra and N. K. Nishchal, “Asymmetric cryptosystem for securing multiple images using two beam interference phenomenon,” Opt. Laser Technol. 60, 1–7 (2014).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and H. Yu, “Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains,” Opt. Lasers Eng. 66, 1–9 (2015).

[Crossref]

Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51(4), 472–480 (2013).

[Crossref]

H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, “Double phase-image encryption using gyrator transforms and structured phase mask in the frequency plane,” Opt. Lasers Eng. 67, 145–156 (2015).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995).

[Crossref]
[PubMed]

Y. Shi, T. Li, Y. Wang, Q. Gao, S. Zhang, and H. Li, “Optical image encryption via ptychography,” Opt. Lett. 38(9), 1425–1427 (2013).

[Crossref]
[PubMed]

S. Liansheng, X. Meiting, and T. Ailing, “Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain,” Opt. Lett. 38(11), 1996–1998 (2013).

[Crossref]
[PubMed]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35(2), 118–120 (2010).

[Crossref]
[PubMed]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33(21), 2443–2445 (2008).

[Crossref]
[PubMed]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005).

[Crossref]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

S. Vashisth, H. Singh, A. K. Yadav, and K. Singh, “Image encryption using fractional Mellin transform, structured phase filters, and phase retrieval,” Optik (Stuttg.) 125(18), 5309–5315 (2014).

[Crossref]

A. Alfalou and C. Brosseau, “Chapter two – Recent advances in optical image processing,” Progress in Opt. 60, 119–262 (2015).

[Crossref]

Original images: http://sipi.usc.edu/database/database.php .