Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photonics 8(1), 1–7 (2016).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55(7), 73–103 (2016).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2016).

[Crossref]

D. Lu, W. He, M. Liao, and X. Peng, “Discussion and a new method of optical cryptosystem based on interference,” Opt. Lasers Eng. 89, 13–21 (2016).

[Crossref]

Q. Gong, Z. Wang, X. Lv, and Y. Qin, “Interference-based image encryption with silhouette removal by aid of compressive sensing,” Opt. Commun. 359, 290–296 (2016).

[Crossref]

W. Liu, Z. Liu, and S. Liu, “Optical security validation using Michelson interferometer,” Appl. Opt. 54(7), 1802–1807 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

Z. Zhong, Y. Zhang, M. Shan, Y. Wang, Y. Zhang, and H. Xie, “Optical movie encryption based on a discrete multiple-parameter fractional Fourier transform,” J. Opt. 16(12), 125404 (2014).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(6), 120–155 (2014).

[Crossref]

J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).

[Crossref]
[PubMed]

W. Chen and X. Chen, “Iterative phase retrieval for simultaneously generating two phase-only masks with silhouette removal in interference-based optical encryption,” Opt. Commun. 331(331), 133–138 (2014).

[Crossref]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286(1), 123–129 (2013).

S. Liansheng, X. Meiting, and T. Ailing, “Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain,” Opt. Lett. 38(11), 1996–1998 (2013).

[Crossref]
[PubMed]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52(4), 871–878 (2013).

[Crossref]
[PubMed]

M. Shan, J. Chang, Z. Zhong, and B. Hao, “Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps,” Opt. Commun. 285(21–22), 4227–4234 (2012).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012).

[Crossref]

X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51(6), 686–691 (2012).

[Crossref]
[PubMed]

Q. Wang, “Optical image encryption with silhouette removal based on interference and phase blend processing,” Opt. Commun. 285(21–22), 4294–4301 (2012).

[Crossref]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284(10), 2485–2487 (2011).

[Crossref]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50(13), 1805–1811 (2011).

[Crossref]
[PubMed]

H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun. 284(16–17), 3895–3903 (2011).

[Crossref]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A, Pure Appl. Opt. 11(12), 125406 (2009).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

M. Shan, J. Chang, Z. Zhong, and B. Hao, “Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps,” Opt. Commun. 285(21–22), 4227–4234 (2012).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).

[Crossref]
[PubMed]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2016).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(6), 120–155 (2014).

[Crossref]

W. Chen and X. Chen, “Iterative phase retrieval for simultaneously generating two phase-only masks with silhouette removal in interference-based optical encryption,” Opt. Commun. 331(331), 133–138 (2014).

[Crossref]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286(1), 123–129 (2013).

W. Chen and X. Chen, “Iterative phase retrieval for simultaneously generating two phase-only masks with silhouette removal in interference-based optical encryption,” Opt. Commun. 331(331), 133–138 (2014).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(6), 120–155 (2014).

[Crossref]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286(1), 123–129 (2013).

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55(7), 73–103 (2016).

[Crossref]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A, Pure Appl. Opt. 11(12), 125406 (2009).

[Crossref]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).

[Crossref]
[PubMed]

Q. Gong, Z. Wang, X. Lv, and Y. Qin, “Interference-based image encryption with silhouette removal by aid of compressive sensing,” Opt. Commun. 359, 290–296 (2016).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2016).

[Crossref]

M. Shan, J. Chang, Z. Zhong, and B. Hao, “Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps,” Opt. Commun. 285(21–22), 4227–4234 (2012).

[Crossref]

D. Lu, W. He, M. Liao, and X. Peng, “Discussion and a new method of optical cryptosystem based on interference,” Opt. Lasers Eng. 89, 13–21 (2016).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55(7), 73–103 (2016).

[Crossref]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

D. Lu, W. He, M. Liao, and X. Peng, “Discussion and a new method of optical cryptosystem based on interference,” Opt. Lasers Eng. 89, 13–21 (2016).

[Crossref]

H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun. 284(16–17), 3895–3903 (2011).

[Crossref]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284(10), 2485–2487 (2011).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2016).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photonics 8(1), 1–7 (2016).

[Crossref]

W. Liu, Z. Liu, and S. Liu, “Optical security validation using Michelson interferometer,” Appl. Opt. 54(7), 1802–1807 (2015).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55(7), 73–103 (2016).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photonics 8(1), 1–7 (2016).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2016).

[Crossref]

W. Liu, Z. Liu, and S. Liu, “Optical security validation using Michelson interferometer,” Appl. Opt. 54(7), 1802–1807 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).

[Crossref]
[PubMed]

D. Lu, W. He, M. Liao, and X. Peng, “Discussion and a new method of optical cryptosystem based on interference,” Opt. Lasers Eng. 89, 13–21 (2016).

[Crossref]

Q. Gong, Z. Wang, X. Lv, and Y. Qin, “Interference-based image encryption with silhouette removal by aid of compressive sensing,” Opt. Commun. 359, 290–296 (2016).

[Crossref]

D. Lu, W. He, M. Liao, and X. Peng, “Discussion and a new method of optical cryptosystem based on interference,” Opt. Lasers Eng. 89, 13–21 (2016).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35(2), 118–120 (2010).

[Crossref]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

Q. Gong, Z. Wang, X. Lv, and Y. Qin, “Interference-based image encryption with silhouette removal by aid of compressive sensing,” Opt. Commun. 359, 290–296 (2016).

[Crossref]

Z. Zhong, Y. Zhang, M. Shan, Y. Wang, Y. Zhang, and H. Xie, “Optical movie encryption based on a discrete multiple-parameter fractional Fourier transform,” J. Opt. 16(12), 125404 (2014).

[Crossref]

M. Shan, J. Chang, Z. Zhong, and B. Hao, “Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps,” Opt. Commun. 285(21–22), 4227–4234 (2012).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photonics 8(1), 1–7 (2016).

[Crossref]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photonics 8(1), 1–7 (2016).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2016).

[Crossref]

Q. Wang, “Optical image encryption with silhouette removal based on interference and phase blend processing,” Opt. Commun. 285(21–22), 4294–4301 (2012).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012).

[Crossref]

X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51(6), 686–691 (2012).

[Crossref]
[PubMed]

H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun. 284(16–17), 3895–3903 (2011).

[Crossref]

Z. Zhong, Y. Zhang, M. Shan, Y. Wang, Y. Zhang, and H. Xie, “Optical movie encryption based on a discrete multiple-parameter fractional Fourier transform,” J. Opt. 16(12), 125404 (2014).

[Crossref]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284(10), 2485–2487 (2011).

[Crossref]

Q. Gong, Z. Wang, X. Lv, and Y. Qin, “Interference-based image encryption with silhouette removal by aid of compressive sensing,” Opt. Commun. 359, 290–296 (2016).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2016).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284(10), 2485–2487 (2011).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2016).

[Crossref]

Z. Zhong, Y. Zhang, M. Shan, Y. Wang, Y. Zhang, and H. Xie, “Optical movie encryption based on a discrete multiple-parameter fractional Fourier transform,” J. Opt. 16(12), 125404 (2014).

[Crossref]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284(10), 2485–2487 (2011).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).

[Crossref]
[PubMed]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55(7), 73–103 (2016).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

Z. Zhong, Y. Zhang, M. Shan, Y. Wang, Y. Zhang, and H. Xie, “Optical movie encryption based on a discrete multiple-parameter fractional Fourier transform,” J. Opt. 16(12), 125404 (2014).

[Crossref]

Z. Zhong, Y. Zhang, M. Shan, Y. Wang, Y. Zhang, and H. Xie, “Optical movie encryption based on a discrete multiple-parameter fractional Fourier transform,” J. Opt. 16(12), 125404 (2014).

[Crossref]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A, Pure Appl. Opt. 11(12), 125406 (2009).

[Crossref]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33(21), 2443–2445 (2008).

[Crossref]
[PubMed]

Z. Zhong, Y. Zhang, M. Shan, Y. Wang, Y. Zhang, and H. Xie, “Optical movie encryption based on a discrete multiple-parameter fractional Fourier transform,” J. Opt. 16(12), 125404 (2014).

[Crossref]

M. Shan, J. Chang, Z. Zhong, and B. Hao, “Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps,” Opt. Commun. 285(21–22), 4227–4234 (2012).

[Crossref]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284(10), 2485–2487 (2011).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).

[Crossref]
[PubMed]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(6), 120–155 (2014).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52(4), 871–878 (2013).

[Crossref]
[PubMed]

P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50(13), 1805–1811 (2011).

[Crossref]
[PubMed]

X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51(6), 686–691 (2012).

[Crossref]
[PubMed]

W. Liu, Z. Liu, and S. Liu, “Optical security validation using Michelson interferometer,” Appl. Opt. 54(7), 1802–1807 (2015).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photonics 8(1), 1–7 (2016).

[Crossref]

Z. Zhong, Y. Zhang, M. Shan, Y. Wang, Y. Zhang, and H. Xie, “Optical movie encryption based on a discrete multiple-parameter fractional Fourier transform,” J. Opt. 16(12), 125404 (2014).

[Crossref]

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A, Pure Appl. Opt. 11(12), 125406 (2009).

[Crossref]

Q. Gong, Z. Wang, X. Lv, and Y. Qin, “Interference-based image encryption with silhouette removal by aid of compressive sensing,” Opt. Commun. 359, 290–296 (2016).

[Crossref]

Q. Wang, “Optical image encryption with silhouette removal based on interference and phase blend processing,” Opt. Commun. 285(21–22), 4294–4301 (2012).

[Crossref]

W. Chen and X. Chen, “Iterative phase retrieval for simultaneously generating two phase-only masks with silhouette removal in interference-based optical encryption,” Opt. Commun. 331(331), 133–138 (2014).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012).

[Crossref]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284(10), 2485–2487 (2011).

[Crossref]

W. Chen and X. Chen, “Security-enhanced interference-based optical image encryption,” Opt. Commun. 286(1), 123–129 (2013).

H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun. 284(16–17), 3895–3903 (2011).

[Crossref]

L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt. Commun. 343, 140–149 (2015).

[Crossref]

M. Shan, J. Chang, Z. Zhong, and B. Hao, “Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps,” Opt. Commun. 285(21–22), 4227–4234 (2012).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55(7), 73–103 (2016).

[Crossref]

L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22(9), 10605–10621 (2014).

[Crossref]
[PubMed]

J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).

[Crossref]
[PubMed]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2016).

[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Opt. Lasers Eng. 67, 191–204 (2015).

[Crossref]

X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng. 66, 10–18 (2015).

[Crossref]

D. Lu, W. He, M. Liao, and X. Peng, “Discussion and a new method of optical cryptosystem based on interference,” Opt. Lasers Eng. 89, 13–21 (2016).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35(2), 118–120 (2010).

[Crossref]
[PubMed]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33(21), 2443–2445 (2008).

[Crossref]
[PubMed]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005).

[Crossref]
[PubMed]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).

[Crossref]
[PubMed]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).

[Crossref]
[PubMed]

S. Liansheng, X. Meiting, and T. Ailing, “Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain,” Opt. Lett. 38(11), 1996–1998 (2013).

[Crossref]
[PubMed]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995).

[Crossref]
[PubMed]