References
- Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett. 1995 Apr 1;20(7):767–769. doi: 10.1364/OL.20.000767
- Amaya D, Tebaldi M, Torroba R, et al. Multichanneled encryption via a joint transform correlator architecture. Appl Opt. 2008;47(31):5903–5907. doi: 10.1364/AO.47.005903
- Tajahuerce E, Javidi B. Encrypting three-dimensional information with digital holography. Appl Opt. 2001;39(35):6595–6601. doi: 10.1364/AO.39.006595
- Clemente P, Durán V, Torres-Company V, et al. Optical encryption based on computational ghost imaging. Opt Lett. 2010;35(14):2391–2393. doi: 10.1364/OL.35.002391
- Zhang Y, Wang B. Optical image encryption based on interference. Opt Lett. 2008 Nov 1;33(21):2443–2445. doi: 10.1364/OL.33.002443
- Zhu N, Wang Y, Liu J, et al. Optical image encryption based on interference of polarized light. Acta Opt Sin. 2009;17(16):13418–13424.
- Yuan S, Liu X, Zhou X, et al. Multiple-image encryption scheme with a single-pixel detector. J Mod Opt. 2016 Aug 21;63(15):1457–1465. doi: 10.1080/09500340.2016.1154196
- Wu J, Xie Z, Liu Z, et al. Multiple-image encryption based on computational ghost imaging. Opt Commun. 2016;359:38–43. doi: 10.1016/j.optcom.2015.09.039
- Zhu J, Yang X, Meng X, et al. Optical image encryption scheme with multiple light paths based on compressive ghost imaging. J Mod Opt. 2017;65(3):1–8.
- Li X, Meng X, Yang X, et al. Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme. Opt Lasers Eng. 2018;102:106–111. doi: 10.1016/j.optlaseng.2017.10.023
- Yuan S, Yao J, Liu X, et al. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging. Opt Commun. 2016;365:180–185. doi: 10.1016/j.optcom.2015.12.013
- Yi K, Leihong Z, Dawei Z. Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng. 2018;111:58–64. doi: 10.1016/j.optlaseng.2018.07.014
- Yuan S, Yang Y, Liu X, et al. Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imaging. Opt Lasers Eng. 2018;100:105–110. doi: 10.1016/j.optlaseng.2017.07.015
- Zhou NR, Hua TX, Gong LH, et al. Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process. 2015;14(4):1193–1213. doi: 10.1007/s11128-015-0926-z
- Zhao S, Wang L, Liang W, et al. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique. Opt Commun. 2015;353:90–95. doi: 10.1016/j.optcom.2015.04.063
- Zhang Y, Tang Y. A plaintext-related image encryption algorithm based on chaos. Multimedia Tools Appl. 2018;77(6):6647–6669. doi: 10.1007/s11042-017-4577-1
- Zhang Y, Xia J, Cai P, et al. Plaintext related two-level secret key image encryption scheme. Telkomnika Indonesian J Electr Eng. 2012;10(6):1254–1262.
- Zhang Y. The image encryption algorithm with plaintext-related shuffling. IETE Tech Rev. 2016;33(3):310–322. doi: 10.1080/02564602.2015.1087350
- Zhang Y. A Chaotic system based image encryption algorithm using plaintext- related confusion. TELKOMNIKA Indonesian J Electr Eng. 2014;12(11):7952–7962.
- Bromberg Y, Katz O, Silberberg Y. Ghost imaging with a single detector. Phys Rev A. 2009 May 19;79(5):053840. doi: 10.1103/PhysRevA.79.053840
- Shapiro JH. Computational ghost imaging. Phys Rev A; 78(6):061802. doi: 10.1103/PhysRevA.78.061802
- Zhu J, Yang X, Meng X, et al. Computational ghost imaging encryption based on fingerprint phase mask. Opt Commun. 2018;420:34–39. doi: 10.1016/j.optcom.2018.03.014
- Nag A, Singh JP, Khan S, et al. Image encryption using affine transform and XOR operation. 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN); IEEE, 2011.