B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

A. Alfalou and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).

[Crossref]

A. Alfalou, Q. Wang, and C. Brosseau, “Multiple-image authentication based on random sparse encoding of optical discrete cosine transform,” in Frontiers in Optics, OSA Technical Digest (Optical Society of America, 2017), paper JTu2A.96.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

A. Alfalou and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).

[Crossref]

A. Alfalou, Q. Wang, and C. Brosseau, “Multiple-image authentication based on random sparse encoding of optical discrete cosine transform,” in Frontiers in Optics, OSA Technical Digest (Optical Society of America, 2017), paper JTu2A.96.

J. Cai, X. Shen, and M. Lei, “Optical asymmetric cryptography based on amplitude reconstruction of elliptically polarized light,” Opt. Commun. 403, 211–216 (2017).

[Crossref]

A. Carnicer, I. Juvells, B. Javidi, and R. Martinez-Herrero, “Optical encryption in the axial domain using beams with arbitrary polarization,” Opt. Lasers Eng. 89, 145–149 (2017).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

A. Carnicer, A. Hassanfiroozi, P. Latorre-Carmona, Y. Huang, and B. Javidi, “Security authentication using phase-encoded nanoparticle structures and polarized light,” Opt. Lett. 40, 135–138 (2015).

[Crossref]

D. Maluenda, A. Carnicer, R. M. Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23, 655–666 (2015).

[Crossref]

A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

J. Hao, Z. Yu, H. Chen, Z. Chen, H. Wang, and J. Ding, “Light field shaping by tailoring both phase and polarization,” Appl. Opt. 53, 785–791 (2014).

[Crossref]

H. Chen, J. Hao, B. Zhang, J. Xu, J. Ding, and H. Wang, “Generation of vector beam with space-variant distribution of both polarization and phase,” Opt. Lett. 36, 3179–3181 (2011).

[Crossref]

J. Chen, Z. Zhu, C. Fu, L. Zhang, and Y. Zhang, “Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain,” Optik 136, 1–7 (2017).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Optical encryption and authentication based on phase retrieval and sparsity constraints,” IEEE Photon. J. 7, 7800310 (2015).

[Crossref]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

X. Wang, W. Chen, and X. Chen, “Optical encryption and authentication based on phase retrieval and sparsity constraints,” IEEE Photon. J. 7, 7800310 (2015).

[Crossref]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[Crossref]

J. Hao, Z. Yu, H. Chen, Z. Chen, H. Wang, and J. Ding, “Light field shaping by tailoring both phase and polarization,” Appl. Opt. 53, 785–791 (2014).

[Crossref]

H. Chen, J. Hao, B. Zhang, J. Xu, J. Ding, and H. Wang, “Generation of vector beam with space-variant distribution of both polarization and phase,” Opt. Lett. 36, 3179–3181 (2011).

[Crossref]

X. Wang, J. Ding, W. Ni, C. Guo, and H. Wang, “Generation of arbitrary vector beams with a spatial light modulator and a common path interferometric arrangement,” Opt. Lett. 32, 3549–3551 (2007).

[Crossref]

A. Fatima and N. K. Nishchal, “Optical image security using Stokes polarimetry of spatially variant polarized beam,” Opt. Commun. 417, 30–36 (2018).

[Crossref]

A. Fatima, I. Mehra, and N. K. Nishchal, “Optical asymmetric cryptosystem using equal modulus decomposition and multiple diffractive imaging,” J. Opt. 18, 085701 (2016).

[Crossref]

J. Chen, Z. Zhu, C. Fu, L. Zhang, and Y. Zhang, “Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain,” Optik 136, 1–7 (2017).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

X. Wang, J. Ding, W. Ni, C. Guo, and H. Wang, “Generation of arbitrary vector beams with a spatial light modulator and a common path interferometric arrangement,” Opt. Lett. 32, 3549–3551 (2007).

[Crossref]

J. Hao, Z. Yu, H. Chen, Z. Chen, H. Wang, and J. Ding, “Light field shaping by tailoring both phase and polarization,” Appl. Opt. 53, 785–791 (2014).

[Crossref]

H. Chen, J. Hao, B. Zhang, J. Xu, J. Ding, and H. Wang, “Generation of vector beam with space-variant distribution of both polarization and phase,” Opt. Lett. 36, 3179–3181 (2011).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

C. Lin, X. Shen, B. Hua, and Z. Wang, “Three-dimensional polarization marked multiple-QR code encryption by optimizing a single vectorial beam,” Opt. Commun. 352, 25–32 (2015).

[Crossref]

A. Carnicer, I. Juvells, B. Javidi, and R. Martinez-Herrero, “Optical encryption in the axial domain using beams with arbitrary polarization,” Opt. Lasers Eng. 89, 145–149 (2017).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

A. Carnicer, A. Hassanfiroozi, P. Latorre-Carmona, Y. Huang, and B. Javidi, “Security authentication using phase-encoded nanoparticle structures and polarized light,” Opt. Lett. 40, 135–138 (2015).

[Crossref]

D. Maluenda, A. Carnicer, R. M. Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23, 655–666 (2015).

[Crossref]

A. Markman and B. Javidi, “Full-phase photon-counting double random-phase encryption,” J. Opt. Soc. Am. A 31, 394–403 (2014).

[Crossref]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[Crossref]

E. Perez-Cabre, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[Crossref]

M. S. Millan, E. Perez-Cabre, and B. Javidi, “Multifactor authentication reinforces optical security,” Opt. Lett. 31, 721–723 (2006).

[Crossref]

B. Javidi, “Nonlinear joint power spectrum based optical correlation,” Appl. Opt. 28, 2358–2367 (1989).

[Crossref]

A. Carnicer, I. Juvells, B. Javidi, and R. Martinez-Herrero, “Optical encryption in the axial domain using beams with arbitrary polarization,” Opt. Lasers Eng. 89, 145–149 (2017).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

D. Maluenda, A. Carnicer, R. M. Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23, 655–666 (2015).

[Crossref]

A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

S. K. Rajput, D. Kumar, and N. K. Nishchal, “Photon counting imaging and polarized light encoding for secure image verification and hologram watermarking,” J. Opt. 16, 125406 (2014).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

J. Cai, X. Shen, and M. Lei, “Optical asymmetric cryptography based on amplitude reconstruction of elliptically polarized light,” Opt. Commun. 403, 211–216 (2017).

[Crossref]

C. Lin and J. Ren, “Security validation based on orthogonal polarization multiplexing in three-dimensional space,” Appl. Opt. 56, 9583–9591 (2017).

[Crossref]

C. Lin, X. Shen, B. Hua, and Z. Wang, “Three-dimensional polarization marked multiple-QR code encryption by optimizing a single vectorial beam,” Opt. Commun. 352, 25–32 (2015).

[Crossref]

C. Lin, X. Shen, Z. Wang, and C. Zhao, “Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique,” Appl. Opt. 53, 3920–3928 (2014).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

A. Markman and B. Javidi, “Full-phase photon-counting double random-phase encryption,” J. Opt. Soc. Am. A 31, 394–403 (2014).

[Crossref]

A. Carnicer, I. Juvells, B. Javidi, and R. Martinez-Herrero, “Optical encryption in the axial domain using beams with arbitrary polarization,” Opt. Lasers Eng. 89, 145–149 (2017).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

A. Fatima, I. Mehra, and N. K. Nishchal, “Optical asymmetric cryptosystem using equal modulus decomposition and multiple diffractive imaging,” J. Opt. 18, 085701 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

E. Perez-Cabre, E. A. Mohammed, M. S. Millan, and H. L. Saadon, “Photon-counting multifactor optical encryption and authentication,” J. Opt. 17, 025706 (2015).

[Crossref]

M. S. Millan, E. Perez-Cabre, and B. Javidi, “Multifactor authentication reinforces optical security,” Opt. Lett. 31, 721–723 (2006).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

A. Fatima and N. K. Nishchal, “Optical image security using Stokes polarimetry of spatially variant polarized beam,” Opt. Commun. 417, 30–36 (2018).

[Crossref]

A. Fatima, I. Mehra, and N. K. Nishchal, “Optical asymmetric cryptosystem using equal modulus decomposition and multiple diffractive imaging,” J. Opt. 18, 085701 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

S. K. Rajput, D. Kumar, and N. K. Nishchal, “Photon counting imaging and polarized light encoding for secure image verification and hologram watermarking,” J. Opt. 16, 125406 (2014).

[Crossref]

S. K. Rajput and N. K. Nishchal, “An optical encryption and authentication scheme using asymmetric keys,” J. Opt. Soc. Am. A 31, 1233–1238 (2014).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in Fresnel domain,” Appl. Opt. 52, 4343–4352 (2013).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption and authentication verification scheme using fractional nonconventional joint transform correlator,” Opt. Lasers Eng. 50, 1474–1483 (2012).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

E. Perez-Cabre, E. A. Mohammed, M. S. Millan, and H. L. Saadon, “Photon-counting multifactor optical encryption and authentication,” J. Opt. 17, 025706 (2015).

[Crossref]

E. Perez-Cabre, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).

[Crossref]

M. S. Millan, E. Perez-Cabre, and B. Javidi, “Multifactor authentication reinforces optical security,” Opt. Lett. 31, 721–723 (2006).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

G. Unnikrishnan, M. Pohit, and K. Singh, “A polarization optical encryption system using ferroelectric spatial light modulator,” Opt. Commun. 185, 25–31 (2000).

[Crossref]

S. K. Rajput and N. K. Nishchal, “An optical encryption and authentication scheme using asymmetric keys,” J. Opt. Soc. Am. A 31, 1233–1238 (2014).

[Crossref]

S. K. Rajput, D. Kumar, and N. K. Nishchal, “Photon counting imaging and polarized light encoding for secure image verification and hologram watermarking,” J. Opt. 16, 125406 (2014).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in Fresnel domain,” Appl. Opt. 52, 4343–4352 (2013).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Image encryption and authentication verification scheme using fractional nonconventional joint transform correlator,” Opt. Lasers Eng. 50, 1474–1483 (2012).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

J. Cai, X. Shen, and M. Lei, “Optical asymmetric cryptography based on amplitude reconstruction of elliptically polarized light,” Opt. Commun. 403, 211–216 (2017).

[Crossref]

C. Lin, X. Shen, B. Hua, and Z. Wang, “Three-dimensional polarization marked multiple-QR code encryption by optimizing a single vectorial beam,” Opt. Commun. 352, 25–32 (2015).

[Crossref]

C. Lin, X. Shen, Z. Wang, and C. Zhao, “Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique,” Appl. Opt. 53, 3920–3928 (2014).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

G. Unnikrishnan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[Crossref]

G. Unnikrishnan, M. Pohit, and K. Singh, “A polarization optical encryption system using ferroelectric spatial light modulator,” Opt. Commun. 185, 25–31 (2000).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

W. Chen, X. Chen, A. Stern, and B. Javidi, “Phase-modulated optical system with sparse representation for information encoding and authentication,” IEEE Photon. J. 5, 6900113 (2013).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

G. Unnikrishnan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[Crossref]

G. Unnikrishnan, M. Pohit, and K. Singh, “A polarization optical encryption system using ferroelectric spatial light modulator,” Opt. Commun. 185, 25–31 (2000).

[Crossref]

J. Hao, Z. Yu, H. Chen, Z. Chen, H. Wang, and J. Ding, “Light field shaping by tailoring both phase and polarization,” Appl. Opt. 53, 785–791 (2014).

[Crossref]

H. Chen, J. Hao, B. Zhang, J. Xu, J. Ding, and H. Wang, “Generation of vector beam with space-variant distribution of both polarization and phase,” Opt. Lett. 36, 3179–3181 (2011).

[Crossref]

X. Wang, J. Ding, W. Ni, C. Guo, and H. Wang, “Generation of arbitrary vector beams with a spatial light modulator and a common path interferometric arrangement,” Opt. Lett. 32, 3549–3551 (2007).

[Crossref]

A. Alfalou, Q. Wang, and C. Brosseau, “Multiple-image authentication based on random sparse encoding of optical discrete cosine transform,” in Frontiers in Optics, OSA Technical Digest (Optical Society of America, 2017), paper JTu2A.96.

X. Wang, W. Chen, and X. Chen, “Optical encryption and authentication based on phase retrieval and sparsity constraints,” IEEE Photon. J. 7, 7800310 (2015).

[Crossref]

X. Wang, J. Ding, W. Ni, C. Guo, and H. Wang, “Generation of arbitrary vector beams with a spatial light modulator and a common path interferometric arrangement,” Opt. Lett. 32, 3549–3551 (2007).

[Crossref]

C. Lin, X. Shen, B. Hua, and Z. Wang, “Three-dimensional polarization marked multiple-QR code encryption by optimizing a single vectorial beam,” Opt. Commun. 352, 25–32 (2015).

[Crossref]

C. Lin, X. Shen, Z. Wang, and C. Zhao, “Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique,” Appl. Opt. 53, 3920–3928 (2014).

[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap to optical security,” J. Opt. 18, 083001 (2016).

[Crossref]

J. Chen, Z. Zhu, C. Fu, L. Zhang, and Y. Zhang, “Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain,” Optik 136, 1–7 (2017).

[Crossref]

J. Chen, Z. Zhu, C. Fu, L. Zhang, and Y. Zhang, “Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain,” Optik 136, 1–7 (2017).

[Crossref]

J. Chen, Z. Zhu, C. Fu, L. Zhang, and Y. Zhang, “Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain,” Optik 136, 1–7 (2017).

[Crossref]