W. Chen, “3D Gerchberg-Saxton optical correlation,” IEEE Photon. J. 10, 7800409 (2018).

[Crossref]

W. Chen, “Hierarchically optical double-image correlation using 3D phase retrieval algorithm in fractional Fourier transform domain,” Opt. Commun. 427, 374–381 (2018).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2017).

[Crossref]

Z. Zhong, H. Qin, L. Liu, Y. Zhang, and M. Shan, “Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain,” Opt. Express 25, 6974–6982 (2017).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

W. N. Li, S. M. Lee, S. K. Gil, and N. Kim, “Multiple-3D-object decryption based on one interference using two phase-only functions,” Appl. Opt. 56, 6214–6221 (2017).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. J. 8, 7801807 (2016).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55, 073103 (2016).

[Crossref]

W. N. Li, C. X. Shi, M. L. Piao, and N. Kim, “Multiple-3D-object secure information system based on phase shifting method and single interference,” Appl. Opt. 55, 4052–4059 (2016).

[Crossref]

W. N. Li, A. H. Phan, M. L. Piao, and N. Kim, “Multiple-image encryption based on triple interferences for flexibly decrypting high-quality images,” Appl. Opt. 54, 3273–3279 (2015).

[Crossref]

C. Guo, S. Liu, and J. T. Sheridan, “Iterative phase retrieval algorithms. I: Optimization,” Appl. Opt. 54, 4698–4708 (2015).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photon. 6, 120–155 (2014).

[Crossref]

S. Liu, C. Guo, and J. T. Sheridan, “A review of optical image encryption techniques,” Opt. Laser Technol. 57, 327–342 (2014).

[Crossref]

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint-transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[Crossref]

M. R. Abuturab, “Color image security system based on discrete Hartley transform in gyrator transform domain,” Opt. Lasers Eng. 51, 317–324 (2013).

[Crossref]

A. Alfalou, C. Brosseau, N. Abdallah, and M. Jridi, “Simulation fusion, compression, and encryption of multiple images,” Opt. Express 19, 24023–24029 (2011).

[Crossref]

W. Chen and X. Chen, “Optical asymmetric cryptography using a three-dimensional space-based model,” J. Opt. 13, 075404 (2011).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

B. Hennelly and J. T. Sheridan, “Fractional Fourier transform-based on image encryption: phase retrieval algorithm,” Opt. Commun. 226, 61–80 (2003).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett. 25, 1159–1161 (2000).

[Crossref]

E. Tajahuerce and B. Javidi, “Encryption three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

Y. Bitran, D. Mendlovic, R. G. Dorsch, A. W. Lohmann, and H. M. Ozaktas, “Fractional Fourier transform: simulation and experimental results,” Appl. Opt. 34, 1329–1332 (1995).

[Crossref]

M. R. Abuturab, “Color image security system based on discrete Hartley transform in gyrator transform domain,” Opt. Lasers Eng. 51, 317–324 (2013).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2017).

[Crossref]

W. Chen, “3D Gerchberg-Saxton optical correlation,” IEEE Photon. J. 10, 7800409 (2018).

[Crossref]

W. Chen, “Hierarchically optical double-image correlation using 3D phase retrieval algorithm in fractional Fourier transform domain,” Opt. Commun. 427, 374–381 (2018).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photon. 6, 120–155 (2014).

[Crossref]

W. Chen and X. Chen, “Optical asymmetric cryptography using a three-dimensional space-based model,” J. Opt. 13, 075404 (2011).

[Crossref]

X. Deng and D. Zhao, “Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55, 073103 (2016).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2017).

[Crossref]

C. Guo, S. Liu, and J. T. Sheridan, “Iterative phase retrieval algorithms. I: Optimization,” Appl. Opt. 54, 4698–4708 (2015).

[Crossref]

S. Liu, C. Guo, and J. T. Sheridan, “A review of optical image encryption techniques,” Opt. Laser Technol. 57, 327–342 (2014).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

B. Hennelly and J. T. Sheridan, “Fractional Fourier transform-based on image encryption: phase retrieval algorithm,” Opt. Commun. 226, 61–80 (2003).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]

W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photon. 6, 120–155 (2014).

[Crossref]

B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060–1062 (2007).

[Crossref]

E. Tajahuerce and B. Javidi, “Encryption three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55, 073103 (2016).

[Crossref]

W. N. Li, S. M. Lee, S. K. Gil, and N. Kim, “Multiple-3D-object decryption based on one interference using two phase-only functions,” Appl. Opt. 56, 6214–6221 (2017).

[Crossref]

W. N. Li, C. X. Shi, M. L. Piao, and N. Kim, “Multiple-3D-object secure information system based on phase shifting method and single interference,” Appl. Opt. 55, 4052–4059 (2016).

[Crossref]

W. N. Li, A. H. Phan, M. L. Piao, and N. Kim, “Multiple-image encryption based on triple interferences for flexibly decrypting high-quality images,” Appl. Opt. 54, 3273–3279 (2015).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

H. Li and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749 (2008).

[Crossref]

W. N. Li, S. M. Lee, S. K. Gil, and N. Kim, “Multiple-3D-object decryption based on one interference using two phase-only functions,” Appl. Opt. 56, 6214–6221 (2017).

[Crossref]

W. N. Li, C. X. Shi, M. L. Piao, and N. Kim, “Multiple-3D-object secure information system based on phase shifting method and single interference,” Appl. Opt. 55, 4052–4059 (2016).

[Crossref]

W. N. Li, A. H. Phan, M. L. Piao, and N. Kim, “Multiple-image encryption based on triple interferences for flexibly decrypting high-quality images,” Appl. Opt. 54, 3273–3279 (2015).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2017).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. J. 8, 7801807 (2016).

[Crossref]

C. Guo, S. Liu, and J. T. Sheridan, “Iterative phase retrieval algorithms. I: Optimization,” Appl. Opt. 54, 4698–4708 (2015).

[Crossref]

S. Liu, C. Guo, and J. T. Sheridan, “A review of optical image encryption techniques,” Opt. Laser Technol. 57, 327–342 (2014).

[Crossref]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett. 25, 1159–1161 (2000).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55, 073103 (2016).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2017).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. J. 8, 7801807 (2016).

[Crossref]

Y. Bitran, D. Mendlovic, R. G. Dorsch, A. W. Lohmann, and H. M. Ozaktas, “Fractional Fourier transform: simulation and experimental results,” Appl. Opt. 34, 1329–1332 (1995).

[Crossref]

A. W. Lohmann, “Image rotation, Wigner rotation, and the fractional Fourier transform,” J. Opt. Soc. Am. A 10, 2181–2186 (1993).

[Crossref]

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint-transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint-transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[Crossref]

W. N. Li, C. X. Shi, M. L. Piao, and N. Kim, “Multiple-3D-object secure information system based on phase shifting method and single interference,” Appl. Opt. 55, 4052–4059 (2016).

[Crossref]

W. N. Li, A. H. Phan, M. L. Piao, and N. Kim, “Multiple-image encryption based on triple interferences for flexibly decrypting high-quality images,” Appl. Opt. 54, 3273–3279 (2015).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. J. 8, 7801807 (2016).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

C. Guo, S. Liu, and J. T. Sheridan, “Iterative phase retrieval algorithms. I: Optimization,” Appl. Opt. 54, 4698–4708 (2015).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

S. Liu, C. Guo, and J. T. Sheridan, “A review of optical image encryption techniques,” Opt. Laser Technol. 57, 327–342 (2014).

[Crossref]

B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060–1062 (2007).

[Crossref]

B. Hennelly and J. T. Sheridan, “Fractional Fourier transform-based on image encryption: phase retrieval algorithm,” Opt. Commun. 226, 61–80 (2003).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2017).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. J. 8, 7801807 (2016).

[Crossref]

B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060–1062 (2007).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint-transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

H. Li and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749 (2008).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2017).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2017).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55, 073103 (2016).

[Crossref]

X. Deng and D. Zhao, “Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

W. N. Li, A. H. Phan, M. L. Piao, and N. Kim, “Multiple-image encryption based on triple interferences for flexibly decrypting high-quality images,” Appl. Opt. 54, 3273–3279 (2015).

[Crossref]

C. Guo, S. Liu, and J. T. Sheridan, “Iterative phase retrieval algorithms. I: Optimization,” Appl. Opt. 54, 4698–4708 (2015).

[Crossref]

W. N. Li, C. X. Shi, M. L. Piao, and N. Kim, “Multiple-3D-object secure information system based on phase shifting method and single interference,” Appl. Opt. 55, 4052–4059 (2016).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012).

[Crossref]

W. N. Li, S. M. Lee, S. K. Gil, and N. Kim, “Multiple-3D-object decryption based on one interference using two phase-only functions,” Appl. Opt. 56, 6214–6221 (2017).

[Crossref]

E. Tajahuerce and B. Javidi, “Encryption three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[Crossref]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled encryption via a joint transform correlator architecture,” Appl. Opt. 47, 5903–5907 (2008).

[Crossref]

Y. Bitran, D. Mendlovic, R. G. Dorsch, A. W. Lohmann, and H. M. Ozaktas, “Fractional Fourier transform: simulation and experimental results,” Appl. Opt. 34, 1329–1332 (1995).

[Crossref]

W. Chen, “3D Gerchberg-Saxton optical correlation,” IEEE Photon. J. 10, 7800409 (2018).

[Crossref]

Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photon. J. 8, 7801807 (2016).

[Crossref]

W. Chen and X. Chen, “Optical asymmetric cryptography using a three-dimensional space-based model,” J. Opt. 13, 075404 (2011).

[Crossref]

J. M. Vilardy, M. S. Millán, and E. Pérez-Cabré, “Improved decryption quality and security of a joint-transform correlator-based encryption system,” J. Opt. 15, 025401 (2013).

[Crossref]

G. Situ and J. Zhang, “Position multiplexing for multiple image encryption,” J. Opt. A 8, 391–397 (2006).

[Crossref]

W. Chen, “Hierarchically optical double-image correlation using 3D phase retrieval algorithm in fractional Fourier transform domain,” Opt. Commun. 427, 374–381 (2018).

[Crossref]

B. Hennelly and J. T. Sheridan, “Fractional Fourier transform-based on image encryption: phase retrieval algorithm,” Opt. Commun. 226, 61–80 (2003).

[Crossref]

H. Li and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749 (2008).

[Crossref]

X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

[Crossref]

H. Di, Y. Kang, Y. Liu, and X. Zhang, “Multiple image encryption by phase retrieval,” Opt. Eng. 55, 073103 (2016).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009).

[Crossref]

A. Alfalou, C. Brosseau, N. Abdallah, and M. Jridi, “Simulation fusion, compression, and encryption of multiple images,” Opt. Express 19, 24023–24029 (2011).

[Crossref]

Z. Zhong, H. Qin, L. Liu, Y. Zhang, and M. Shan, “Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain,” Opt. Express 25, 6974–6982 (2017).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

S. Liu, C. Guo, and J. T. Sheridan, “A review of optical image encryption techniques,” Opt. Laser Technol. 57, 327–342 (2014).

[Crossref]

X. Deng and D. Zhao, “Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012).

[Crossref]

C. Guo, C. Wei, J. Tan, K. Chen, S. Liu, Q. Wu, and Z. Liu, “A review of iterative phase retrieval for measurement and encryption,” Opt. Lasers Eng. 89, 2–12 (2017).

[Crossref]

M. R. Abuturab, “Color image security system based on discrete Hartley transform in gyrator transform domain,” Opt. Lasers Eng. 51, 317–324 (2013).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett. 25, 1159–1161 (2000).

[Crossref]

H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).

[Crossref]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060–1062 (2007).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]