References
- Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett. 1995;20(7):767–769. DOI:10.1364/OL.20.000767.
- Deng X, Zhao D. Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain. Opt Laser Technol. 2012;44(2):374–377. DOI:10.1016/j.optlastec.2011.07.019.
- Unnikrishnan G, Joseph J, Singh K. Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett. 2000;25(12):887–889. DOI:10.1364/OL.25.000887.
- Hennelly B, Sheridan JT. Optical image encryption by random shifting in fractional Fourier domains. Opt Lett. 2003;28(4):269–271. DOI:10.1364/OL.28.000269.
- Nishchal NK, Joseph J, Singh K. Securing information using fractional Fourier transform in digital holography. Opt Commun. 2004;235(4):253–259. DOI:10.1016/j.optcom.2004.02.052.
- Abuturab MR. Group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform. J Opt Soc Am A. 2015;32(10):1811–1820. DOI:10.1364/JOSAA.32.001811.
- Zhou N, Wang Y, Gong L. Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun. 2011;284(13):3234–3242. DOI:10.1016/j.optcom.2011.02.065.
- Chen L, Zhao D. Optical image encryption with Hartley transforms. Opt Lett. 2006;31(23):3438–3440. DOI:10.1364/OL.31.003438.
- Mehra I, Nishchal NK. Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding. Opt Express. 2014;22(5):5474–5482. DOI:10.1364/OE.22.005474.
- Yadav B, Kumar A, Kumar Y. A Robust digital image watermarking algorithm using DWT and SVD. In: Pant M, Ray K, Sharma TK, editors. Soft computing: theories and Applications. advances in intelligent systems and computing. Jalandhar (Punjab): Springer Singapore; 2018. p. 25–36.
- Situ G, Zhang J. Double random-phase encoding in the Fresnel domain. Opt Lett. 2004;29(14):1584–1586. DOI:10.1364/OL.29.001584.
- Liu Z, Chen H, Liu T, et al. Image encryption by using gyrator transform and Arnold transform. J Electron Imaging. 2011;20(1):013020, DOI:10.1117/1.3557790.
- Chen W, Chen X, Sheppard CJR. Optical image encryption based on diffractive imaging. Opt Lett. 2010;35(22):3817–3819. DOI:10.1364/OL.35.003817.
- Liu W, Liu Z, Liu S. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. Opt Lett. 2013;38(10):1651–1653. DOI:10.1364/OL.38.001651.
- Huang J-J, Hwang H-E, Chen C-Y, et al. Lensless multiple-image optical encryption based on improved phase retrieval algorithm. Appl Opt. 2012;51(13):2388–2394. DOI:10.1364/AO.51.002388.
- Cho M, Javidi B. Three-dimensional photon counting double-random-phase encryption. Opt Lett. 2013;38(17):3198–3201. DOI:10.1364/OL.38.003198.
- Maluenda D, Carnicer A, Martínez-Herrero R, et al. Optical encryption using photon-counting polarimetric imaging. Opt Express. 2015;23(2):655–666. DOI:10.1364/OE.23.000655.
- Zhou N, Li H, Wang D, et al. Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun. 2015;343:10–21. DOI:10.1016/j.optcom.2014.12.084.
- Zhou N, Pan S, Cheng S, et al. Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol. 2016;82:121–133. DOI:10.1016/j.optlastec.2016.02.018.
- Nomura T, Javidi B. Optical encryption using a joint transform correlator architecture. Opt Eng. 2000;39(8):2031–2036. DOI:10.1117/1.1304844.
- Javidi B, Nomura T. Securing information by use of digital holography. Opt Lett. 2000;25(1):28–30. DOI:10.1364/OL.25.000028.
- Singh P, Yadav AK, Singh K, et al. Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conf Proc. 2017;1802(1):020017, DOI:10.1063/1.4973267.
- Tajahuerce E, Matoba O, Verrall SC, et al. Optoelectronic information encryption with phase-shifting interferometry. Appl Opt. 2000;39(14):2313–2320. DOI:10.1364/AO.39.002313.
- Li T, Shi Y. Security risk of diffractive-imaging-based optical cryptosystem. Opt Express. 2015;23(16):21384–21391. DOI:10.1364/OE.23.021384.
- Zhao S, Wang L, Liang W, et al. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique. Opt Commun. 2015;353:90–95. DOI:10.1016/j.optcom.2015.04.063.
- Zhou NR, Hua TX, Gong LH, et al. Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process. 2015;14(4):1193–1213. DOI:10.1007/s11128-015-0926-z.
- Wang X, Gao S. Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci (Ny). 2020;507:16–36. DOI:10.1016/j.ins.2019.08.041.
- Peng X, Zhang P, Wei H, et al. Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett. 2006;31(8):1044–1046. DOI:10.1364/OL.31.001044.
- Gopinathan U, Monaghan DS, Naughton TJ, et al. A known-plaintext heuristic attack on the Fourier plane encryption algorithm. Opt Express. 2006;14(8):3181–3186. DOI:10.1364/OE.14.003181.
- Biryukov A. Known plaintext attack. In: Henk C. A. van Tilborg, Sushil Jajodia, editors. Encyclopedia of cryptography and security. Boston (MA:): Springer; 2011. p. 704–705. DOI:10.1007/978-1-4419-5906-5_588.
- Qin W, Peng X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett. 2010;35(2):118–120. DOI:10.1364/OL.35.000118.
- Wang X, Zhao D. Security enhancement of a phase-truncation based image encryption algorithm. Appl Opt. 2011;50(36):6645–6651.
- Wang X, Zhao D. Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle. Appl Opt. 2013;52(25):6170–6178.
- Qin W. Universal and special keys based on phase-truncated Fourier transform. Opt Eng. 2011;50(8):080501. DOI:10.1117/1.3607421.
- Wang Y, Quan C, Tay CJ. Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Opt. 2015;54(22):6874–6881. DOI:10.1364/AO.54.006874.
- Rajput SK, Nishchal NK. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. Appl Opt. 2013;52(4):871–878. DOI:10.1364/AO.52.000871.
- Rajput SK, Nishchal NK. Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem. Opt Commun. 2013;309:231–235. DOI:10.1016/j.optcom.2013.06.036.
- Wang X, Zhao D. Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask. Opt Lett. 2013;38(18):3684–3686. DOI:10.1364/OL.38.003684.
- Wang X, Chen Y, Dai C, et al. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Opt. 2014;53(2):208–213. DOI:10.1364/AO.53.000208.
- Cai J, Shen X, Lei M, et al. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt Lett. 2015;40(4):475–478. DOI:10.1364/OL.40.000475.
- Deng X. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition: comment. Opt Lett. 2015;40(16):3913–3913. DOI:10.1364/OL.40.003913.
- Barfungpa SP, Abuturab MR. Asymmetric cryptosystem using coherent superposition and equal modulus decomposition of fractional Fourier spectrum. Opt Quant Electron. 2016;48(11):520. DOI:10.1007/s11082-016-0786-5.
- Chen H, Tanougast C, Liu Z, et al. Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt Lasers Eng. 2017;93:1–8. DOI:10.1016/j.optlaseng.2017.01.005.
- Fatima A, Mehra I, Nishchal NK. Optical image encryption using equal modulus decomposition and multiple diffractive imaging. J Opt. 2016;18(8):085701. DOI:10.1088/2040-8978/18/8/085701.
- Cai J, Shen X. Modified optical asymmetric image cryptosystem based on coherent superposition and equal modulus decomposition. Opt Laser Technol. 2017;95:105–112. DOI:10.1016/j.optlastec.2017.04.018.
- Rakheja P, Vig R, Singh P. An asymmetric watermarking scheme based on random decomposition in hybrid multi-resolution wavelet domain using 3D Lorenz chaotic system. Optik. 2019;198:163289. DOI:10.1016/j.ijleo.2019.163289.
- Rakheja P, Vig R, Singh P. A hybrid multiresolution wavelet transform based encryption scheme. AIP Conf Proc. 2019;2061(1):020008. DOI:10.1063/1.5086630.
- Rakheja P, Vig R, Singh P. An asymmetric hybrid cryptosystem using hyperchaotic system and random decomposition in hybrid multi resolution wavelet domain. Multimed Tools Appl. 2019;78(15):20809–20834. DOI:10.1007/s11042-019-7406-x.
- Rakheja P, Vig R, Singh P. An asymmetric hybrid cryptosystem using equal modulus and random decomposition in hybrid transform domain. Opt Quant Electron. 2019;51(2):54. DOI:10.1007/s11082-019-1769-0.
- Chai X, Chen Y, Broyde L. A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng. 2017;88:197–213. DOI:10.1016/j.optlaseng.2016.08.009.
- Sharma N, Saini I, Yadav A, et al. Phase-image encryption based on 3D-Lorenz chaotic system and double random phase encoding. 3D Research. 2017;8(4). DOI:10.1007/s13319-017-0149-4.
- Wang X-Y, Yang L, Liu R, et al. A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 2010;62(3):615–621. DOI:10.1007/s11071-010-9749-8.
- Fu C, Zhang G, Zhu M, Chen Z, Lei W. A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy. Security and Communication Networks. doi: 10.1155/2018/2708532
- Liu H, Wang X. Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl. 2010;59(10):3320–3327. DOI:10.1016/j.camwa.2010.03.017.
- Chen J-X, Zhu Z-L, Fu C, et al. Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding. J Opt. 2014;16(12):125403. DOI:10.1088/2040-8978/16/12/125403.
- Elshamy AM, Rashed ANZ, Mohamed AENA, et al. Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol. 2013;31(15):2533–2539. DOI:10.1109/JLT.2013.2267891.
- Liu H, Wang X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun. 2011;284(16):3895–3903. DOI:10.1016/j.optcom.2011.04.001.
- Liu H. Wang X, kadir A. image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput. 2012;12(5):1457–1466. DOI:10.1016/j.asoc.2012.01.016.
- Kekre HB, Sarode TK, Vig R. A new multi-resolution hybrid wavelet for analysis and image compression. Int J Electron. 2015;102(12):2108–2126. DOI:10.1080/00207217.2015.1020882.
- Poon T-C, Liu J-P. Introduction to modern digital holography by Ting-Chung Poon. Cambridge Core. doi: 10.1017/CBO9781139061346
- Zhang Y-Q, Wang X-Y. A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci (Ny). 2014;273:329–351. DOI:10.1016/j.ins.2014.02.156.
- Zhu Z, Zhang W, Wong K, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci (Ny). 2011;181(6):1171–1186. DOI:10.1016/j.ins.2010.11.009.
- Wang X, Teng L, Qin X. A novel colour image encryption algorithm based on chaos. Signal Processing. 2012;92(4):1101–1108. DOI:10.1016/j.sigpro.2011.10.023.
- Towghi N, Javidi B, Luo Z. Fully phase encrypted image processor. J Opt Soc Am A. 1999;16(8):1915. DOI:10.1364/JOSAA.16.001915.
- Singh P, Saini I, Yadav AK. Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme. Int J Soc Comput Cyber-Phys Syst. 2017;2(1):59. DOI:10.1504/IJSCCPS.2017.10009739.
- Singh H. Hybrid structured phase mask in frequency plane for optical double image encryption in gyrator transform domain. J Mod Opt. 2018;65(18):2065–2078. DOI:10.1080/09500340.2018.1496286.
- Sui L, Gao B. Single-channel color image encryption based on iterative fractional Fourier transform and chaos. Opt Laser Technol. 2013;48:117–127. DOI:10.1016/j.optlastec.2012.10.016.
- Ge M, Ye R. A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties. Egypt Inform J. October 2018. doi: 10.1016/j.eij.2018.10.001
- Wang X-Y, Zhang Y-Q, Bao X-M. A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng. 2015;73:53–61. DOI:10.1016/j.optlaseng.2015.03.022.
- Wang X, Liu L, Zhang Y. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng. 2015;66:10–18. DOI:10.1016/j.optlaseng.2014.08.005.
- Zhang Y-Q, Wang X-Y. A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput. 2015;26:10–20. DOI:10.1016/j.asoc.2014.09.039.