References
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999). https://doi.org/10.1364/OL.24.000762
- G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000). https://doi.org/10.1117/1.1313498
- Z. Liu, L. Xu, C. Lin, and S. Liu, "Image encryption by encoding with a nonuniform optical beam in gyrator transform domains," Appl. Opt. 49, 5632-5637 (2010). https://doi.org/10.1364/AO.49.005632
- W. Chen, X. Chen, and C. J. R. Sheppard, "Optical image encryption based on diffractive imaging," Opt. Lett. 35, 3817-3819 (2010). https://doi.org/10.1364/OL.35.003817
- X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, "Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain," J. Opt. A: Pure Appl. Opt. 9, 1070-1075 (2007). https://doi.org/10.1088/1464-4258/9/11/017
- W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010). https://doi.org/10.1364/OL.35.000118
- B. Javidi and T. Nomura, "Polarization encoding for optical security systems," Opt. Eng. 39, 2439-2443 (2000). https://doi.org/10.1117/1.1288369
- P. C. Mogenson and J. Gluckstad, "A phase based optical encryption system with polarization encoding," Opt. Commun. 173, 177-183 (2000). https://doi.org/10.1016/S0030-4018(99)00633-1
- G. Situ and J. Zhang, "Multiple-image encryption by wavelength multiplexing," Opt. Lett. 30, 1306-1308 (2005). https://doi.org/10.1364/OL.30.001306
- D. C. Weber and J. D. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999). https://doi.org/10.1117/1.602062
- T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng. 39, 2031-2035 (2000). https://doi.org/10.1117/1.1304844
- J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999). https://doi.org/10.1117/1.602060
- S. H. Jeon and S. K. Gil, "Optical implementation of triple DES algorithm based on dual XOR logic operations," J. Opt. Soc. Korea 17, 362-370 (2013). https://doi.org/10.3807/JOSK.2013.17.5.362
- B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
- O. Matoba and B. Javidi, "Optical retrieval of encrypted digital holograms for secure real-time display," Opt. Lett. 27, 321-323 (2002). https://doi.org/10.1364/OL.27.000321
- E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt. 39, 2313-2320 (2000). https://doi.org/10.1364/AO.39.002313
- L.-Z. Cai, M.-Z. He, Q. Liu, and X.-L. Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004). https://doi.org/10.1364/AO.43.003078
- X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
- S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011). https://doi.org/10.3807/JOSK.2011.15.3.244
- S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012). https://doi.org/10.3807/JOSK.2012.16.4.354
- S. H. Jeon and S. K. Gil, "Optical implementation of cipher block chaining mode algorithm by using phase-shifting digital holography," Opt. Eng. 55, 123112 (2016). https://doi.org/10.1117/1.OE.55.12.123112
- X. Peng, H. Wei, and P. Zhang, "Asymmetric cryptography based on wavefront sensing," Opt. Lett. 31, 3579-3581 (2006). https://doi.org/10.1364/OL.31.003579
- W. Liu, Z. Liu, and S. Liu, "Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm," Opt. Lett. 38, 1651-1653 (2013). https://doi.org/10.1364/OL.38.001651
- S. K. Rajput and N. K. Nishchal, "An optical encryption and authentication scheme using asymmetric keys," J. Opt. Soc. Am. A 31, 1233-1238 (2014). https://doi.org/10.1364/JOSAA.31.001233
- Y. Xiong, A. He, and C. Quan, "Security analysis of a double-image encryption technique based on an asymmetric algorithm," J. Opt. Soc. Am. A 35, 320-326 (2018). https://doi.org/10.1364/josaa.35.000320
- G. Luan, A. Li, D. Zhang, and D. Wang, "Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain," IEEE Photon. J. 11, 6900207 (2019).
- G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "Public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003). https://doi.org/10.1117/1.1588660
- S. Yuan, X. Zhou, D. H. Li, and D. F. Zhou, "Simultaneous transmission for an encrypted image and a double randomphase encryption key," Appl. Opt. 46, 3747-3753 (2007). https://doi.org/10.1364/AO.46.003747
- X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, "Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm," J. Opt. A: Pure Appl. Opt. 11, 085402 (2009). https://doi.org/10.1088/1464-4258/11/8/085402
- Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-feng, "Information hiding based on double random-phase encoding and public-key cryptography," Opt. Express 17, 3270-3284 (2009). https://doi.org/10.1364/OE.17.003270
- W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory 22, 644-654 (1976). https://doi.org/10.1109/TIT.1976.1055638
- R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM 21, 120-126 (1978). https://doi.org/10.1145/359340.359342