Abstract

In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues caused by the inherent linearity and mechanism of computational ghost imaging. First, the primary information to be encrypted is transformed into the bits of information, which is used to control the formation of the customized data container. Then, the exclusive-OR (XOR) operation is performed on it with a randomly generated data container, and the XOR encoding result is scrambled based on the random sequence engendered with the logistic map so that the linearity of the cryptosystem is destroyed. Second, instead of using random phase-only masks, a number of phase masks retrieved from 2D patterns derived from the rows of the designed Hadamard matrix are used to record the measured intensities. The redundancy between these phase masks is low, which can reduce the number of the required phase-only masks greatly. Meanwhile, the conditions of the logistic map are considered as the secret keys, which can enhance the security level greatly due to their high sensitivity to tiny variation. The validity and feasibility of the proposed method have been demonstrated with a set of numerical simulations.

© 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

Full Article  |  PDF Article
OSA Recommended Articles
Optical image hiding under framework of computational ghost imaging based on an expansion strategy

Sui Liansheng, Wang Jiahao, Tian Ailing, and Anand Asundi
Opt. Express 27(5) 7213-7225 (2019)

Multiple-image encryption by space multiplexing based on vector quantization and interference

Liansheng Sui, MinJie Xu, Chongtian Huang, Achyut Adhikari, Ailing Tian, and Anand Asundi
OSA Continuum 1(4) 1370-1384 (2018)

Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps

Liansheng Sui, Kuaikuai Duan, Junli Liang, and Xinhong Hei
Opt. Express 22(9) 10605-10621 (2014)

References

  • View by:
  • |
  • |
  • |

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995).
    [Crossref] [PubMed]
  2. Q. Wang, D. Xiong, A. Alfalou, and C. Brosseau, “Optical image encryption method based on incoherent imaging and polarized light encoding,” Opt. Commun. 415, 56–63 (2018).
    [Crossref]
  3. A. Fatima and N. K. Nishchal, “Image authentication using a vector beam with sparse phase information,” J. Opt. Soc. Am. A 35(6), 1053–1062 (2018).
    [Crossref] [PubMed]
  4. D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).
    [Crossref] [PubMed]
  5. S. K. Rajput, D. Kumar, and N. K. Nishchal, “Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security,” Appl. Opt. 54(7), 1657–1666 (2015).
    [Crossref]
  6. I. Moon, F. Yi, M. Han, and J. Lee, “Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms,” Appl. Opt. 55(16), 4328–4335 (2016).
    [Crossref] [PubMed]
  7. I. Mehra and N. K. Nishchal, “Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging,” Opt. Lasers Eng. 68, 74–82 (2015).
    [Crossref]
  8. L. Chen, G. Chang, B. He, H. Mao, and D. Zhao, “Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition,” Opt. Lasers Eng. 88, 221–232 (2017).
    [Crossref]
  9. Y. Chen, Q. Liu, J. Wang, and Q. H. Wang, “Single-channel optical encryption of color image using chessboard grating and diffraction imaging scheme,” Opt. Eng. 56(12), 123106 (2017).
    [Crossref]
  10. N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17(6), 065704 (2015).
    [Crossref]
  11. M. R. Abuturab, “Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition,” Opt. Laser Technol. 98, 298–308 (2018).
    [Crossref]
  12. S. Liansheng, Z. Xiao, H. Chongtian, T. Ailing, and A. K. Asundi, “Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms,” Opt. Lasers Eng. 113, 29–37 (2019).
    [Crossref]
  13. A. Kumar, A. Fatima, and N. K. Nishchal, “An optical Hash function construction based on equal modulus decomposition for authentication verification,” Opt. Commun. 428, 7–14 (2018).
    [Crossref]
  14. X. Li, M. Zhao, Y. Xing, L. Li, S. T. Kim, X. Zhou, and Q. H. Wang, “Optical encryption via monospectral integral imaging,” Opt. Express 25(25), 31516–31527 (2017).
    [Crossref] [PubMed]
  15. Y. Wang, C. Quan, and C. J. Tay, “Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 78, 8–16 (2016).
    [Crossref]
  16. M. R. Abuturab, “Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 118, 42–51 (2019).
    [Crossref]
  17. P. W. M. Tsang, “Single-random-phase holographic encryption of images,” Opt. Lasers Eng. 89, 22–28 (2017).
    [Crossref]
  18. S. Yuan, X. Liu, X. Zhou, and Z. Li, “Multiple-image encryption scheme with a single-pixel detector,” J. Mod. Opt. 63(15), 1457–1465 (2016).
    [Crossref]
  19. S. Liansheng, C. Yin, W. Zhanman, T. Ailing, and A. K. Asundi, “Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm,” Opt. Lasers Eng. 111, 108–113 (2018).
    [Crossref]
  20. C. Zhang, W. He, J. Wu, and X. Peng, “Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation,” Opt. Express 23(7), 8845–8854 (2015).
    [Crossref] [PubMed]
  21. L. Sui, X. Zhao, C. Huang, A. Tian, and A. Anand, “An optical multiple-image authentication based on transport of intensity equation,” Opt. Lasers Eng. 116, 116–124 (2019).
    [Crossref]
  22. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photonics 1(3), 589–636 (2009).
    [Crossref]
  23. A. Alfalou and C. Brosseau, “Recent advances in optical image processing,” Prog. Opt. 60, 119–262 (2015).
    [Crossref]
  24. B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
    [Crossref]
  25. Q. Wang, A. Alfalou, and C. Brosseau, “New perspectives in face correlation research: a tutorial,” Adv. Opt. Photonics 9(1), 1–78 (2017).
    [Crossref]
  26. H. Xu, W. Xu, S. Wang, and S. Wu, “Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain,” Opt. Commun. 402, 302–310 (2017).
    [Crossref]
  27. X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
    [Crossref]
  28. Y. Su, C. Tang, X. Chen, B. Li, W. Xu, and Z. Lei, “Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map,” Opt. Lasers Eng. 88, 20–27 (2017).
    [Crossref]
  29. Y. Xiong, A. He, and C. Quan, “Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask,” Appl. Opt. 57(21), 6010–6016 (2018).
    [Crossref] [PubMed]
  30. T. Zhao, Q. Ran, L. Yuan, Y. Chi, and J. Ma, “Security of image encryption scheme based on multi-parameter fractional Fourier transform,” Opt. Commun. 376, 47–51 (2016).
    [Crossref]
  31. J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “Gyrator transform based double random phase encoding with sparse representation for information authentication,” Opt. Laser Technol. 70, 50–58 (2015).
    [Crossref]
  32. Z. Liu, C. Guo, J. Tan, Q. Wu, L. Pan, and S. Liu, “Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms,” J. Opt. 17(2), 025701 (2015).
    [Crossref]
  33. J. M. Vilardy, M. S. Millan, and E. Perez-Cabre, “Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain,” Opt. Lasers Eng. 89, 88–94 (2017).
    [Crossref]
  34. L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, “An asymmetric color image encryption method by using deduced gyrator transform,” Opt. Lasers Eng. 89, 72–79 (2017).
    [Crossref]
  35. H. Chen, C. Tanougast, Z. Liu, W. Blondel, and B. Hao, “Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform,” Opt. Lasers Eng. 107, 62–70 (2018).
    [Crossref]
  36. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35(14), 2391–2393 (2010).
    [Crossref] [PubMed]
  37. M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101(10), 101108 (2012).
    [Crossref]
  38. M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).
    [Crossref]
  39. W. Chen and X. Chen, “Grayscale object authentication based on ghost imaging using binary signals,” EPL 110(4), 44002 (2015).
    [Crossref]
  40. Z. Leihong, P. Zilan, W. Luying, and M. Xiuhua, “High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform,” Opt. Lasers Eng. 86, 329–337 (2016).
    [Crossref]
  41. J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, “Multiple-image encryption based on computational ghost imaging,” Opt. Commun. 359, 38–43 (2016).
    [Crossref]
  42. X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
    [Crossref]
  43. W. Chen, “Correlated-photon secured imaging by iterative phase retrieval using axially-varying distances,” IEEE Photonics Technol. Lett. 28(18), 1932–1935 (2016).
    [Crossref]
  44. S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
    [Crossref] [PubMed]
  45. Y. Zhang and S. Zhao, “Optical encryption scheme based on ghost imaging with disordered speckles,” Chin. Phys. B 26(5), 054205 (2017).
    [Crossref]
  46. S. Liansheng, W. Jiahao, T. Ailing, and A. Asundi, “Optical image hiding under framework of computational ghost imaging based on an expansion strategy,” Opt. Express 27(5), 7213–7225 (2019).
    [Crossref] [PubMed]
  47. J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21(5), 5373–5378 (2013).
    [Crossref] [PubMed]
  48. J. F. Barrera, A. Mira-Agudelo, and R. Torroba, “Experimental QR code optical encryption: noise-free data recovering,” Opt. Lett. 39(10), 3074–3077 (2014).
    [Crossref] [PubMed]
  49. S. Zhao, L. Wang, W. Liang, W. Cheng, and L. Gong, “High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique,” Opt. Commun. 353, 90–95 (2015).
    [Crossref]
  50. A. V. Zea, J. F. Barrera, and R. Torroba, “Customized data container for improved performance in optical cryptosystems,” J. Opt. 18(12), 125702 (2016).
    [Crossref]
  51. Y. Qin and Y. Zhang, “Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation,” IEEE Photonics J. 9(2), 1–8 (2017).
    [Crossref]
  52. Y. Qin, Z. Wang, H. Wang, Q. Gong, and N. Zhou, “Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container,” Opt. Lasers Eng. 105, 118–124 (2018).
    [Crossref]
  53. J. F. B. Ramírez, A. J. Osorio, A. V. Zea, and R. Torroba, “Experimental analysis of a joint free space cryptosystem,” Opt. Lasers Eng. 83, 126–130 (2016).
    [Crossref]
  54. A. V. Zea, J. F. Barrera, and R. Torroba, “Innovative speckle noise reduction procedure in optical encryption,” J. Opt. 19(5), 055704 (2017).
    [Crossref]
  55. A. V. Zea, J. F. Barrera, and R. Torroba, “Experimental optical encryption of grayscale information,” Appl. Opt. 56(21), 5883–5889 (2017).
    [Crossref] [PubMed]
  56. A. Velez Zea, J. F. Barrera Ramirez, and R. Torroba, “Optimized random phase encryption,” Opt. Lett. 43(15), 3558–3561 (2018).
    [Crossref] [PubMed]
  57. A. Jaramillo Osorio, J. F. B. Ramírez, S. Montoya, A. Mira-Agudelo, A. V. Zea, and R. Torroba, “Improved decryption quality with a random reference beam cryptosystem,” Opt. Lasers Eng. 112, 119–127 (2019).
    [Crossref]
  58. Y. Zhang, D. Xiao, W. Wen, and H. Liu, “Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding,” Opt. Lett. 38(21), 4506–4509 (2013).
    [Crossref] [PubMed]

2019 (5)

S. Liansheng, Z. Xiao, H. Chongtian, T. Ailing, and A. K. Asundi, “Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms,” Opt. Lasers Eng. 113, 29–37 (2019).
[Crossref]

M. R. Abuturab, “Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 118, 42–51 (2019).
[Crossref]

L. Sui, X. Zhao, C. Huang, A. Tian, and A. Anand, “An optical multiple-image authentication based on transport of intensity equation,” Opt. Lasers Eng. 116, 116–124 (2019).
[Crossref]

S. Liansheng, W. Jiahao, T. Ailing, and A. Asundi, “Optical image hiding under framework of computational ghost imaging based on an expansion strategy,” Opt. Express 27(5), 7213–7225 (2019).
[Crossref] [PubMed]

A. Jaramillo Osorio, J. F. B. Ramírez, S. Montoya, A. Mira-Agudelo, A. V. Zea, and R. Torroba, “Improved decryption quality with a random reference beam cryptosystem,” Opt. Lasers Eng. 112, 119–127 (2019).
[Crossref]

2018 (9)

A. Velez Zea, J. F. Barrera Ramirez, and R. Torroba, “Optimized random phase encryption,” Opt. Lett. 43(15), 3558–3561 (2018).
[Crossref] [PubMed]

Y. Qin, Z. Wang, H. Wang, Q. Gong, and N. Zhou, “Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container,” Opt. Lasers Eng. 105, 118–124 (2018).
[Crossref]

H. Chen, C. Tanougast, Z. Liu, W. Blondel, and B. Hao, “Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform,” Opt. Lasers Eng. 107, 62–70 (2018).
[Crossref]

S. Liansheng, C. Yin, W. Zhanman, T. Ailing, and A. K. Asundi, “Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm,” Opt. Lasers Eng. 111, 108–113 (2018).
[Crossref]

Y. Xiong, A. He, and C. Quan, “Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask,” Appl. Opt. 57(21), 6010–6016 (2018).
[Crossref] [PubMed]

M. R. Abuturab, “Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition,” Opt. Laser Technol. 98, 298–308 (2018).
[Crossref]

A. Kumar, A. Fatima, and N. K. Nishchal, “An optical Hash function construction based on equal modulus decomposition for authentication verification,” Opt. Commun. 428, 7–14 (2018).
[Crossref]

Q. Wang, D. Xiong, A. Alfalou, and C. Brosseau, “Optical image encryption method based on incoherent imaging and polarized light encoding,” Opt. Commun. 415, 56–63 (2018).
[Crossref]

A. Fatima and N. K. Nishchal, “Image authentication using a vector beam with sparse phase information,” J. Opt. Soc. Am. A 35(6), 1053–1062 (2018).
[Crossref] [PubMed]

2017 (15)

L. Chen, G. Chang, B. He, H. Mao, and D. Zhao, “Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition,” Opt. Lasers Eng. 88, 221–232 (2017).
[Crossref]

Y. Chen, Q. Liu, J. Wang, and Q. H. Wang, “Single-channel optical encryption of color image using chessboard grating and diffraction imaging scheme,” Opt. Eng. 56(12), 123106 (2017).
[Crossref]

X. Li, M. Zhao, Y. Xing, L. Li, S. T. Kim, X. Zhou, and Q. H. Wang, “Optical encryption via monospectral integral imaging,” Opt. Express 25(25), 31516–31527 (2017).
[Crossref] [PubMed]

P. W. M. Tsang, “Single-random-phase holographic encryption of images,” Opt. Lasers Eng. 89, 22–28 (2017).
[Crossref]

J. M. Vilardy, M. S. Millan, and E. Perez-Cabre, “Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain,” Opt. Lasers Eng. 89, 88–94 (2017).
[Crossref]

L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, “An asymmetric color image encryption method by using deduced gyrator transform,” Opt. Lasers Eng. 89, 72–79 (2017).
[Crossref]

Q. Wang, A. Alfalou, and C. Brosseau, “New perspectives in face correlation research: a tutorial,” Adv. Opt. Photonics 9(1), 1–78 (2017).
[Crossref]

H. Xu, W. Xu, S. Wang, and S. Wu, “Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain,” Opt. Commun. 402, 302–310 (2017).
[Crossref]

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

Y. Su, C. Tang, X. Chen, B. Li, W. Xu, and Z. Lei, “Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map,” Opt. Lasers Eng. 88, 20–27 (2017).
[Crossref]

S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
[Crossref] [PubMed]

Y. Zhang and S. Zhao, “Optical encryption scheme based on ghost imaging with disordered speckles,” Chin. Phys. B 26(5), 054205 (2017).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Innovative speckle noise reduction procedure in optical encryption,” J. Opt. 19(5), 055704 (2017).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Experimental optical encryption of grayscale information,” Appl. Opt. 56(21), 5883–5889 (2017).
[Crossref] [PubMed]

Y. Qin and Y. Zhang, “Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation,” IEEE Photonics J. 9(2), 1–8 (2017).
[Crossref]

2016 (11)

J. F. B. Ramírez, A. J. Osorio, A. V. Zea, and R. Torroba, “Experimental analysis of a joint free space cryptosystem,” Opt. Lasers Eng. 83, 126–130 (2016).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Customized data container for improved performance in optical cryptosystems,” J. Opt. 18(12), 125702 (2016).
[Crossref]

Z. Leihong, P. Zilan, W. Luying, and M. Xiuhua, “High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform,” Opt. Lasers Eng. 86, 329–337 (2016).
[Crossref]

J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, “Multiple-image encryption based on computational ghost imaging,” Opt. Commun. 359, 38–43 (2016).
[Crossref]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

W. Chen, “Correlated-photon secured imaging by iterative phase retrieval using axially-varying distances,” IEEE Photonics Technol. Lett. 28(18), 1932–1935 (2016).
[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

T. Zhao, Q. Ran, L. Yuan, Y. Chi, and J. Ma, “Security of image encryption scheme based on multi-parameter fractional Fourier transform,” Opt. Commun. 376, 47–51 (2016).
[Crossref]

S. Yuan, X. Liu, X. Zhou, and Z. Li, “Multiple-image encryption scheme with a single-pixel detector,” J. Mod. Opt. 63(15), 1457–1465 (2016).
[Crossref]

Y. Wang, C. Quan, and C. J. Tay, “Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 78, 8–16 (2016).
[Crossref]

I. Moon, F. Yi, M. Han, and J. Lee, “Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms,” Appl. Opt. 55(16), 4328–4335 (2016).
[Crossref] [PubMed]

2015 (10)

I. Mehra and N. K. Nishchal, “Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging,” Opt. Lasers Eng. 68, 74–82 (2015).
[Crossref]

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17(6), 065704 (2015).
[Crossref]

D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).
[Crossref] [PubMed]

S. K. Rajput, D. Kumar, and N. K. Nishchal, “Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security,” Appl. Opt. 54(7), 1657–1666 (2015).
[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “Gyrator transform based double random phase encoding with sparse representation for information authentication,” Opt. Laser Technol. 70, 50–58 (2015).
[Crossref]

Z. Liu, C. Guo, J. Tan, Q. Wu, L. Pan, and S. Liu, “Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms,” J. Opt. 17(2), 025701 (2015).
[Crossref]

A. Alfalou and C. Brosseau, “Recent advances in optical image processing,” Prog. Opt. 60, 119–262 (2015).
[Crossref]

C. Zhang, W. He, J. Wu, and X. Peng, “Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation,” Opt. Express 23(7), 8845–8854 (2015).
[Crossref] [PubMed]

S. Zhao, L. Wang, W. Liang, W. Cheng, and L. Gong, “High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique,” Opt. Commun. 353, 90–95 (2015).
[Crossref]

W. Chen and X. Chen, “Grayscale object authentication based on ghost imaging using binary signals,” EPL 110(4), 44002 (2015).
[Crossref]

2014 (2)

J. F. Barrera, A. Mira-Agudelo, and R. Torroba, “Experimental QR code optical encryption: noise-free data recovering,” Opt. Lett. 39(10), 3074–3077 (2014).
[Crossref] [PubMed]

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).
[Crossref]

2013 (2)

2012 (1)

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101(10), 101108 (2012).
[Crossref]

2010 (1)

2009 (1)

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photonics 1(3), 589–636 (2009).
[Crossref]

1995 (1)

Abuturab, M. R.

M. R. Abuturab, “Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 118, 42–51 (2019).
[Crossref]

M. R. Abuturab, “Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition,” Opt. Laser Technol. 98, 298–308 (2018).
[Crossref]

Ahmadi-Kandjani, S.

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).
[Crossref]

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101(10), 101108 (2012).
[Crossref]

Ailing, T.

S. Liansheng, Z. Xiao, H. Chongtian, T. Ailing, and A. K. Asundi, “Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms,” Opt. Lasers Eng. 113, 29–37 (2019).
[Crossref]

S. Liansheng, W. Jiahao, T. Ailing, and A. Asundi, “Optical image hiding under framework of computational ghost imaging based on an expansion strategy,” Opt. Express 27(5), 7213–7225 (2019).
[Crossref] [PubMed]

S. Liansheng, C. Yin, W. Zhanman, T. Ailing, and A. K. Asundi, “Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm,” Opt. Lasers Eng. 111, 108–113 (2018).
[Crossref]

Alfalou, A.

Q. Wang, D. Xiong, A. Alfalou, and C. Brosseau, “Optical image encryption method based on incoherent imaging and polarized light encoding,” Opt. Commun. 415, 56–63 (2018).
[Crossref]

Q. Wang, A. Alfalou, and C. Brosseau, “New perspectives in face correlation research: a tutorial,” Adv. Opt. Photonics 9(1), 1–78 (2017).
[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

A. Alfalou and C. Brosseau, “Recent advances in optical image processing,” Prog. Opt. 60, 119–262 (2015).
[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photonics 1(3), 589–636 (2009).
[Crossref]

Anand, A.

L. Sui, X. Zhao, C. Huang, A. Tian, and A. Anand, “An optical multiple-image authentication based on transport of intensity equation,” Opt. Lasers Eng. 116, 116–124 (2019).
[Crossref]

Asundi, A.

Asundi, A. K.

S. Liansheng, Z. Xiao, H. Chongtian, T. Ailing, and A. K. Asundi, “Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms,” Opt. Lasers Eng. 113, 29–37 (2019).
[Crossref]

S. Liansheng, C. Yin, W. Zhanman, T. Ailing, and A. K. Asundi, “Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm,” Opt. Lasers Eng. 111, 108–113 (2018).
[Crossref]

Barrera, J. F.

A. V. Zea, J. F. Barrera, and R. Torroba, “Experimental optical encryption of grayscale information,” Appl. Opt. 56(21), 5883–5889 (2017).
[Crossref] [PubMed]

A. V. Zea, J. F. Barrera, and R. Torroba, “Innovative speckle noise reduction procedure in optical encryption,” J. Opt. 19(5), 055704 (2017).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Customized data container for improved performance in optical cryptosystems,” J. Opt. 18(12), 125702 (2016).
[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

J. F. Barrera, A. Mira-Agudelo, and R. Torroba, “Experimental QR code optical encryption: noise-free data recovering,” Opt. Lett. 39(10), 3074–3077 (2014).
[Crossref] [PubMed]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21(5), 5373–5378 (2013).
[Crossref] [PubMed]

Barrera Ramirez, J. F.

Blondel, W.

H. Chen, C. Tanougast, Z. Liu, W. Blondel, and B. Hao, “Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform,” Opt. Lasers Eng. 107, 62–70 (2018).
[Crossref]

Brosseau, C.

Q. Wang, D. Xiong, A. Alfalou, and C. Brosseau, “Optical image encryption method based on incoherent imaging and polarized light encoding,” Opt. Commun. 415, 56–63 (2018).
[Crossref]

Q. Wang, A. Alfalou, and C. Brosseau, “New perspectives in face correlation research: a tutorial,” Adv. Opt. Photonics 9(1), 1–78 (2017).
[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

A. Alfalou and C. Brosseau, “Recent advances in optical image processing,” Prog. Opt. 60, 119–262 (2015).
[Crossref]

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photonics 1(3), 589–636 (2009).
[Crossref]

Carnicer, A.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).
[Crossref] [PubMed]

Chang, G.

L. Chen, G. Chang, B. He, H. Mao, and D. Zhao, “Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition,” Opt. Lasers Eng. 88, 221–232 (2017).
[Crossref]

Chen, H.

H. Chen, C. Tanougast, Z. Liu, W. Blondel, and B. Hao, “Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform,” Opt. Lasers Eng. 107, 62–70 (2018).
[Crossref]

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

Chen, J. X.

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “Gyrator transform based double random phase encoding with sparse representation for information authentication,” Opt. Laser Technol. 70, 50–58 (2015).
[Crossref]

Chen, L.

L. Chen, G. Chang, B. He, H. Mao, and D. Zhao, “Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition,” Opt. Lasers Eng. 88, 221–232 (2017).
[Crossref]

Chen, W.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

W. Chen, “Correlated-photon secured imaging by iterative phase retrieval using axially-varying distances,” IEEE Photonics Technol. Lett. 28(18), 1932–1935 (2016).
[Crossref]

W. Chen and X. Chen, “Grayscale object authentication based on ghost imaging using binary signals,” EPL 110(4), 44002 (2015).
[Crossref]

Chen, X.

Y. Su, C. Tang, X. Chen, B. Li, W. Xu, and Z. Lei, “Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map,” Opt. Lasers Eng. 88, 20–27 (2017).
[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

W. Chen and X. Chen, “Grayscale object authentication based on ghost imaging using binary signals,” EPL 110(4), 44002 (2015).
[Crossref]

Chen, Y.

Y. Chen, Q. Liu, J. Wang, and Q. H. Wang, “Single-channel optical encryption of color image using chessboard grating and diffraction imaging scheme,” Opt. Eng. 56(12), 123106 (2017).
[Crossref]

Cheng, W.

S. Zhao, L. Wang, W. Liang, W. Cheng, and L. Gong, “High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique,” Opt. Commun. 353, 90–95 (2015).
[Crossref]

Chi, Y.

T. Zhao, Q. Ran, L. Yuan, Y. Chi, and J. Ma, “Security of image encryption scheme based on multi-parameter fractional Fourier transform,” Opt. Commun. 376, 47–51 (2016).
[Crossref]

Chongtian, H.

S. Liansheng, Z. Xiao, H. Chongtian, T. Ailing, and A. K. Asundi, “Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms,” Opt. Lasers Eng. 113, 29–37 (2019).
[Crossref]

Clemente, P.

Dong, G.

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

Durán, V.

Fatima, A.

A. Fatima and N. K. Nishchal, “Image authentication using a vector beam with sparse phase information,” J. Opt. Soc. Am. A 35(6), 1053–1062 (2018).
[Crossref] [PubMed]

A. Kumar, A. Fatima, and N. K. Nishchal, “An optical Hash function construction based on equal modulus decomposition for authentication verification,” Opt. Commun. 428, 7–14 (2018).
[Crossref]

Feng, S.

L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, “An asymmetric color image encryption method by using deduced gyrator transform,” Opt. Lasers Eng. 89, 72–79 (2017).
[Crossref]

Fu, C.

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “Gyrator transform based double random phase encoding with sparse representation for information authentication,” Opt. Laser Technol. 70, 50–58 (2015).
[Crossref]

Gong, L.

S. Zhao, L. Wang, W. Liang, W. Cheng, and L. Gong, “High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique,” Opt. Commun. 353, 90–95 (2015).
[Crossref]

Gong, Q.

Y. Qin, Z. Wang, H. Wang, Q. Gong, and N. Zhou, “Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container,” Opt. Lasers Eng. 105, 118–124 (2018).
[Crossref]

Guo, C.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Z. Liu, C. Guo, J. Tan, Q. Wu, L. Pan, and S. Liu, “Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms,” J. Opt. 17(2), 025701 (2015).
[Crossref]

Han, M.

Hao, B.

H. Chen, C. Tanougast, Z. Liu, W. Blondel, and B. Hao, “Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform,” Opt. Lasers Eng. 107, 62–70 (2018).
[Crossref]

He, A.

He, B.

L. Chen, G. Chang, B. He, H. Mao, and D. Zhao, “Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition,” Opt. Lasers Eng. 88, 221–232 (2017).
[Crossref]

He, W.

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

C. Zhang, W. He, J. Wu, and X. Peng, “Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation,” Opt. Express 23(7), 8845–8854 (2015).
[Crossref] [PubMed]

Huang, C.

L. Sui, X. Zhao, C. Huang, A. Tian, and A. Anand, “An optical multiple-image authentication based on transport of intensity equation,” Opt. Lasers Eng. 116, 116–124 (2019).
[Crossref]

Hwang, I. C.

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17(6), 065704 (2015).
[Crossref]

Jaramillo Osorio, A.

A. Jaramillo Osorio, J. F. B. Ramírez, S. Montoya, A. Mira-Agudelo, A. V. Zea, and R. Torroba, “Improved decryption quality with a random reference beam cryptosystem,” Opt. Lasers Eng. 112, 119–127 (2019).
[Crossref]

Javidi, B.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).
[Crossref] [PubMed]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995).
[Crossref] [PubMed]

Jiahao, W.

Jiang, S.

S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
[Crossref] [PubMed]

Juvells, I.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

D. Maluenda, A. Carnicer, R. Martínez-Herrero, I. Juvells, and B. Javidi, “Optical encryption using photon-counting polarimetric imaging,” Opt. Express 23(2), 655–666 (2015).
[Crossref] [PubMed]

Kheradmand, R.

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).
[Crossref]

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101(10), 101108 (2012).
[Crossref]

Kim, S. T.

Kumar, A.

A. Kumar, A. Fatima, and N. K. Nishchal, “An optical Hash function construction based on equal modulus decomposition for authentication verification,” Opt. Commun. 428, 7–14 (2018).
[Crossref]

Kumar, D.

Lancis, J.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35(14), 2391–2393 (2010).
[Crossref] [PubMed]

Lee, B. G.

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17(6), 065704 (2015).
[Crossref]

Lee, J.

Lei, Z.

Y. Su, C. Tang, X. Chen, B. Li, W. Xu, and Z. Lei, “Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map,” Opt. Lasers Eng. 88, 20–27 (2017).
[Crossref]

Leihong, Z.

Z. Leihong, P. Zilan, W. Luying, and M. Xiuhua, “High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform,” Opt. Lasers Eng. 86, 329–337 (2016).
[Crossref]

Li, B.

Y. Su, C. Tang, X. Chen, B. Li, W. Xu, and Z. Lei, “Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map,” Opt. Lasers Eng. 88, 20–27 (2017).
[Crossref]

Li, L.

Li, X.

X. Li, M. Zhao, Y. Xing, L. Li, S. T. Kim, X. Zhou, and Q. H. Wang, “Optical encryption via monospectral integral imaging,” Opt. Express 25(25), 31516–31527 (2017).
[Crossref] [PubMed]

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

Li, Z.

S. Yuan, X. Liu, X. Zhou, and Z. Li, “Multiple-image encryption scheme with a single-pixel detector,” J. Mod. Opt. 63(15), 1457–1465 (2016).
[Crossref]

Liang, W.

S. Zhao, L. Wang, W. Liang, W. Cheng, and L. Gong, “High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique,” Opt. Commun. 353, 90–95 (2015).
[Crossref]

Liansheng, S.

S. Liansheng, W. Jiahao, T. Ailing, and A. Asundi, “Optical image hiding under framework of computational ghost imaging based on an expansion strategy,” Opt. Express 27(5), 7213–7225 (2019).
[Crossref] [PubMed]

S. Liansheng, Z. Xiao, H. Chongtian, T. Ailing, and A. K. Asundi, “Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms,” Opt. Lasers Eng. 113, 29–37 (2019).
[Crossref]

S. Liansheng, C. Yin, W. Zhanman, T. Ailing, and A. K. Asundi, “Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm,” Opt. Lasers Eng. 111, 108–113 (2018).
[Crossref]

Liu, H.

Liu, Q.

Y. Chen, Q. Liu, J. Wang, and Q. H. Wang, “Single-channel optical encryption of color image using chessboard grating and diffraction imaging scheme,” Opt. Eng. 56(12), 123106 (2017).
[Crossref]

Liu, S.

J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, “Multiple-image encryption based on computational ghost imaging,” Opt. Commun. 359, 38–43 (2016).
[Crossref]

Z. Liu, C. Guo, J. Tan, Q. Wu, L. Pan, and S. Liu, “Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms,” J. Opt. 17(2), 025701 (2015).
[Crossref]

Liu, W.

J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, “Multiple-image encryption based on computational ghost imaging,” Opt. Commun. 359, 38–43 (2016).
[Crossref]

Liu, X.

S. Yuan, X. Liu, X. Zhou, and Z. Li, “Multiple-image encryption scheme with a single-pixel detector,” J. Mod. Opt. 63(15), 1457–1465 (2016).
[Crossref]

Liu, Z.

H. Chen, C. Tanougast, Z. Liu, W. Blondel, and B. Hao, “Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform,” Opt. Lasers Eng. 107, 62–70 (2018).
[Crossref]

J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, “Multiple-image encryption based on computational ghost imaging,” Opt. Commun. 359, 38–43 (2016).
[Crossref]

Z. Liu, C. Guo, J. Tan, Q. Wu, L. Pan, and S. Liu, “Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms,” J. Opt. 17(2), 025701 (2015).
[Crossref]

Long, T.

S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
[Crossref] [PubMed]

Luying, W.

Z. Leihong, P. Zilan, W. Luying, and M. Xiuhua, “High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform,” Opt. Lasers Eng. 86, 329–337 (2016).
[Crossref]

Ma, J.

T. Zhao, Q. Ran, L. Yuan, Y. Chi, and J. Ma, “Security of image encryption scheme based on multi-parameter fractional Fourier transform,” Opt. Commun. 376, 47–51 (2016).
[Crossref]

Maluenda, D.

Mao, H.

L. Chen, G. Chang, B. He, H. Mao, and D. Zhao, “Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition,” Opt. Lasers Eng. 88, 221–232 (2017).
[Crossref]

Markman, A.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Martínez-Herrero, R.

Matsumoto, T.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Mehra, I.

I. Mehra and N. K. Nishchal, “Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging,” Opt. Lasers Eng. 68, 74–82 (2015).
[Crossref]

Meng, X.

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
[Crossref] [PubMed]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

Millan, M. S.

J. M. Vilardy, M. S. Millan, and E. Perez-Cabre, “Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain,” Opt. Lasers Eng. 89, 88–94 (2017).
[Crossref]

Millán, M. S.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Mira, A.

Mira-Agudelo, A.

A. Jaramillo Osorio, J. F. B. Ramírez, S. Montoya, A. Mira-Agudelo, A. V. Zea, and R. Torroba, “Improved decryption quality with a random reference beam cryptosystem,” Opt. Lasers Eng. 112, 119–127 (2019).
[Crossref]

J. F. Barrera, A. Mira-Agudelo, and R. Torroba, “Experimental QR code optical encryption: noise-free data recovering,” Opt. Lett. 39(10), 3074–3077 (2014).
[Crossref] [PubMed]

Montoya, S.

A. Jaramillo Osorio, J. F. B. Ramírez, S. Montoya, A. Mira-Agudelo, A. V. Zea, and R. Torroba, “Improved decryption quality with a random reference beam cryptosystem,” Opt. Lasers Eng. 112, 119–127 (2019).
[Crossref]

Moon, I.

Mosk, A. P.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Naruse, M.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Nie, S.

L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, “An asymmetric color image encryption method by using deduced gyrator transform,” Opt. Lasers Eng. 89, 72–79 (2017).
[Crossref]

Nishchal, N. K.

A. Kumar, A. Fatima, and N. K. Nishchal, “An optical Hash function construction based on equal modulus decomposition for authentication verification,” Opt. Commun. 428, 7–14 (2018).
[Crossref]

A. Fatima and N. K. Nishchal, “Image authentication using a vector beam with sparse phase information,” J. Opt. Soc. Am. A 35(6), 1053–1062 (2018).
[Crossref] [PubMed]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

I. Mehra and N. K. Nishchal, “Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging,” Opt. Lasers Eng. 68, 74–82 (2015).
[Crossref]

S. K. Rajput, D. Kumar, and N. K. Nishchal, “Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security,” Appl. Opt. 54(7), 1657–1666 (2015).
[Crossref]

Nomura, T.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Osorio, A. J.

J. F. B. Ramírez, A. J. Osorio, A. V. Zea, and R. Torroba, “Experimental analysis of a joint free space cryptosystem,” Opt. Lasers Eng. 83, 126–130 (2016).
[Crossref]

Pan, L.

Z. Liu, C. Guo, J. Tan, Q. Wu, L. Pan, and S. Liu, “Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms,” J. Opt. 17(2), 025701 (2015).
[Crossref]

Peng, X.

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

C. Zhang, W. He, J. Wu, and X. Peng, “Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation,” Opt. Express 23(7), 8845–8854 (2015).
[Crossref] [PubMed]

Perez-Cabre, E.

J. M. Vilardy, M. S. Millan, and E. Perez-Cabre, “Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain,” Opt. Lasers Eng. 89, 88–94 (2017).
[Crossref]

Pérez-Cabré, E.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Pinkse, P. W. H.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Qiang, J.

L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, “An asymmetric color image encryption method by using deduced gyrator transform,” Opt. Lasers Eng. 89, 72–79 (2017).
[Crossref]

Qin, Y.

Y. Qin, Z. Wang, H. Wang, Q. Gong, and N. Zhou, “Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container,” Opt. Lasers Eng. 105, 118–124 (2018).
[Crossref]

Y. Qin and Y. Zhang, “Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation,” IEEE Photonics J. 9(2), 1–8 (2017).
[Crossref]

Quan, C.

Y. Xiong, A. He, and C. Quan, “Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask,” Appl. Opt. 57(21), 6010–6016 (2018).
[Crossref] [PubMed]

Y. Wang, C. Quan, and C. J. Tay, “Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 78, 8–16 (2016).
[Crossref]

Rajput, S. K.

Ramírez, J. F. B.

A. Jaramillo Osorio, J. F. B. Ramírez, S. Montoya, A. Mira-Agudelo, A. V. Zea, and R. Torroba, “Improved decryption quality with a random reference beam cryptosystem,” Opt. Lasers Eng. 112, 119–127 (2019).
[Crossref]

J. F. B. Ramírez, A. J. Osorio, A. V. Zea, and R. Torroba, “Experimental analysis of a joint free space cryptosystem,” Opt. Lasers Eng. 83, 126–130 (2016).
[Crossref]

Ran, Q.

T. Zhao, Q. Ran, L. Yuan, Y. Chi, and J. Ma, “Security of image encryption scheme based on multi-parameter fractional Fourier transform,” Opt. Commun. 376, 47–51 (2016).
[Crossref]

Rawat, N.

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17(6), 065704 (2015).
[Crossref]

Refregier, P.

Rivenson, Y.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Sheridan, J. T.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Shi, Y.

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17(6), 065704 (2015).
[Crossref]

Shu, R.

S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
[Crossref] [PubMed]

Situ, G.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Stern, A.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Su, Y.

Y. Su, C. Tang, X. Chen, B. Li, W. Xu, and Z. Lei, “Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map,” Opt. Lasers Eng. 88, 20–27 (2017).
[Crossref]

Sui, L.

L. Sui, X. Zhao, C. Huang, A. Tian, and A. Anand, “An optical multiple-image authentication based on transport of intensity equation,” Opt. Lasers Eng. 116, 116–124 (2019).
[Crossref]

Sun, B.

S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
[Crossref] [PubMed]

Tajahuerce, E.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35(14), 2391–2393 (2010).
[Crossref] [PubMed]

Tan, J.

Z. Liu, C. Guo, J. Tan, Q. Wu, L. Pan, and S. Liu, “Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms,” J. Opt. 17(2), 025701 (2015).
[Crossref]

Tang, C.

Y. Su, C. Tang, X. Chen, B. Li, W. Xu, and Z. Lei, “Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map,” Opt. Lasers Eng. 88, 20–27 (2017).
[Crossref]

Tanha, M.

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101(10), 101108 (2012).
[Crossref]

Tanougast, C.

H. Chen, C. Tanougast, Z. Liu, W. Blondel, and B. Hao, “Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform,” Opt. Lasers Eng. 107, 62–70 (2018).
[Crossref]

Tay, C. J.

Y. Wang, C. Quan, and C. J. Tay, “Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 78, 8–16 (2016).
[Crossref]

Tian, A.

L. Sui, X. Zhao, C. Huang, A. Tian, and A. Anand, “An optical multiple-image authentication based on transport of intensity equation,” Opt. Lasers Eng. 116, 116–124 (2019).
[Crossref]

Torres-Company, V.

Torroba, R.

A. Jaramillo Osorio, J. F. B. Ramírez, S. Montoya, A. Mira-Agudelo, A. V. Zea, and R. Torroba, “Improved decryption quality with a random reference beam cryptosystem,” Opt. Lasers Eng. 112, 119–127 (2019).
[Crossref]

A. Velez Zea, J. F. Barrera Ramirez, and R. Torroba, “Optimized random phase encryption,” Opt. Lett. 43(15), 3558–3561 (2018).
[Crossref] [PubMed]

A. V. Zea, J. F. Barrera, and R. Torroba, “Experimental optical encryption of grayscale information,” Appl. Opt. 56(21), 5883–5889 (2017).
[Crossref] [PubMed]

A. V. Zea, J. F. Barrera, and R. Torroba, “Innovative speckle noise reduction procedure in optical encryption,” J. Opt. 19(5), 055704 (2017).
[Crossref]

J. F. B. Ramírez, A. J. Osorio, A. V. Zea, and R. Torroba, “Experimental analysis of a joint free space cryptosystem,” Opt. Lasers Eng. 83, 126–130 (2016).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Customized data container for improved performance in optical cryptosystems,” J. Opt. 18(12), 125702 (2016).
[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

J. F. Barrera, A. Mira-Agudelo, and R. Torroba, “Experimental QR code optical encryption: noise-free data recovering,” Opt. Lett. 39(10), 3074–3077 (2014).
[Crossref] [PubMed]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21(5), 5373–5378 (2013).
[Crossref] [PubMed]

Tsang, P. W. M.

P. W. M. Tsang, “Single-random-phase holographic encryption of images,” Opt. Lasers Eng. 89, 22–28 (2017).
[Crossref]

Velez Zea, A.

Vilardy, J. M.

J. M. Vilardy, M. S. Millan, and E. Perez-Cabre, “Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain,” Opt. Lasers Eng. 89, 88–94 (2017).
[Crossref]

Wang, H.

Y. Qin, Z. Wang, H. Wang, Q. Gong, and N. Zhou, “Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container,” Opt. Lasers Eng. 105, 118–124 (2018).
[Crossref]

Wang, J.

Y. Chen, Q. Liu, J. Wang, and Q. H. Wang, “Single-channel optical encryption of color image using chessboard grating and diffraction imaging scheme,” Opt. Eng. 56(12), 123106 (2017).
[Crossref]

Wang, L.

S. Zhao, L. Wang, W. Liang, W. Cheng, and L. Gong, “High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique,” Opt. Commun. 353, 90–95 (2015).
[Crossref]

Wang, Q.

Q. Wang, D. Xiong, A. Alfalou, and C. Brosseau, “Optical image encryption method based on incoherent imaging and polarized light encoding,” Opt. Commun. 415, 56–63 (2018).
[Crossref]

Q. Wang, A. Alfalou, and C. Brosseau, “New perspectives in face correlation research: a tutorial,” Adv. Opt. Photonics 9(1), 1–78 (2017).
[Crossref]

Wang, Q. H.

Y. Chen, Q. Liu, J. Wang, and Q. H. Wang, “Single-channel optical encryption of color image using chessboard grating and diffraction imaging scheme,” Opt. Eng. 56(12), 123106 (2017).
[Crossref]

X. Li, M. Zhao, Y. Xing, L. Li, S. T. Kim, X. Zhou, and Q. H. Wang, “Optical encryption via monospectral integral imaging,” Opt. Express 25(25), 31516–31527 (2017).
[Crossref] [PubMed]

Wang, S.

H. Xu, W. Xu, S. Wang, and S. Wu, “Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain,” Opt. Commun. 402, 302–310 (2017).
[Crossref]

Wang, Y.

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
[Crossref] [PubMed]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

Y. Wang, C. Quan, and C. J. Tay, “Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 78, 8–16 (2016).
[Crossref]

Wang, Z.

Y. Qin, Z. Wang, H. Wang, Q. Gong, and N. Zhou, “Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container,” Opt. Lasers Eng. 105, 118–124 (2018).
[Crossref]

Wen, W.

Wu, J.

J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, “Multiple-image encryption based on computational ghost imaging,” Opt. Commun. 359, 38–43 (2016).
[Crossref]

C. Zhang, W. He, J. Wu, and X. Peng, “Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation,” Opt. Express 23(7), 8845–8854 (2015).
[Crossref] [PubMed]

Wu, Q.

Z. Liu, C. Guo, J. Tan, Q. Wu, L. Pan, and S. Liu, “Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms,” J. Opt. 17(2), 025701 (2015).
[Crossref]

Wu, S.

H. Xu, W. Xu, S. Wang, and S. Wu, “Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain,” Opt. Commun. 402, 302–310 (2017).
[Crossref]

Xiao, D.

Xiao, Z.

S. Liansheng, Z. Xiao, H. Chongtian, T. Ailing, and A. K. Asundi, “Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms,” Opt. Lasers Eng. 113, 29–37 (2019).
[Crossref]

Xie, Z.

J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, “Multiple-image encryption based on computational ghost imaging,” Opt. Commun. 359, 38–43 (2016).
[Crossref]

Xing, Y.

Xiong, D.

Q. Wang, D. Xiong, A. Alfalou, and C. Brosseau, “Optical image encryption method based on incoherent imaging and polarized light encoding,” Opt. Commun. 415, 56–63 (2018).
[Crossref]

Xiong, Y.

Xiuhua, M.

Z. Leihong, P. Zilan, W. Luying, and M. Xiuhua, “High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform,” Opt. Lasers Eng. 86, 329–337 (2016).
[Crossref]

Xu, H.

H. Xu, W. Xu, S. Wang, and S. Wu, “Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain,” Opt. Commun. 402, 302–310 (2017).
[Crossref]

Xu, W.

H. Xu, W. Xu, S. Wang, and S. Wu, “Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain,” Opt. Commun. 402, 302–310 (2017).
[Crossref]

Y. Su, C. Tang, X. Chen, B. Li, W. Xu, and Z. Lei, “Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map,” Opt. Lasers Eng. 88, 20–27 (2017).
[Crossref]

Yamaguchi, M.

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Yang, X.

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
[Crossref] [PubMed]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

Yao, L.

L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, “An asymmetric color image encryption method by using deduced gyrator transform,” Opt. Lasers Eng. 89, 72–79 (2017).
[Crossref]

Yi, F.

Yin, C.

S. Liansheng, C. Yin, W. Zhanman, T. Ailing, and A. K. Asundi, “Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm,” Opt. Lasers Eng. 111, 108–113 (2018).
[Crossref]

Yin, Y.

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

Yu, H.

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “Gyrator transform based double random phase encoding with sparse representation for information authentication,” Opt. Laser Technol. 70, 50–58 (2015).
[Crossref]

Yuan, C.

L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, “An asymmetric color image encryption method by using deduced gyrator transform,” Opt. Lasers Eng. 89, 72–79 (2017).
[Crossref]

Yuan, L.

T. Zhao, Q. Ran, L. Yuan, Y. Chi, and J. Ma, “Security of image encryption scheme based on multi-parameter fractional Fourier transform,” Opt. Commun. 376, 47–51 (2016).
[Crossref]

Yuan, S.

S. Yuan, X. Liu, X. Zhou, and Z. Li, “Multiple-image encryption scheme with a single-pixel detector,” J. Mod. Opt. 63(15), 1457–1465 (2016).
[Crossref]

Zafari, M.

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).
[Crossref]

Zea, A. V.

A. Jaramillo Osorio, J. F. B. Ramírez, S. Montoya, A. Mira-Agudelo, A. V. Zea, and R. Torroba, “Improved decryption quality with a random reference beam cryptosystem,” Opt. Lasers Eng. 112, 119–127 (2019).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Innovative speckle noise reduction procedure in optical encryption,” J. Opt. 19(5), 055704 (2017).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Experimental optical encryption of grayscale information,” Appl. Opt. 56(21), 5883–5889 (2017).
[Crossref] [PubMed]

J. F. B. Ramírez, A. J. Osorio, A. V. Zea, and R. Torroba, “Experimental analysis of a joint free space cryptosystem,” Opt. Lasers Eng. 83, 126–130 (2016).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Customized data container for improved performance in optical cryptosystems,” J. Opt. 18(12), 125702 (2016).
[Crossref]

Zhang, C.

Zhang, L. B.

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “Gyrator transform based double random phase encoding with sparse representation for information authentication,” Opt. Laser Technol. 70, 50–58 (2015).
[Crossref]

Zhang, Y.

Y. Qin and Y. Zhang, “Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation,” IEEE Photonics J. 9(2), 1–8 (2017).
[Crossref]

Y. Zhang and S. Zhao, “Optical encryption scheme based on ghost imaging with disordered speckles,” Chin. Phys. B 26(5), 054205 (2017).
[Crossref]

J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, “Multiple-image encryption based on computational ghost imaging,” Opt. Commun. 359, 38–43 (2016).
[Crossref]

Y. Zhang, D. Xiao, W. Wen, and H. Liu, “Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding,” Opt. Lett. 38(21), 4506–4509 (2013).
[Crossref] [PubMed]

Zhanman, W.

S. Liansheng, C. Yin, W. Zhanman, T. Ailing, and A. K. Asundi, “Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm,” Opt. Lasers Eng. 111, 108–113 (2018).
[Crossref]

Zhao, D.

L. Chen, G. Chang, B. He, H. Mao, and D. Zhao, “Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition,” Opt. Lasers Eng. 88, 221–232 (2017).
[Crossref]

Zhao, M.

Zhao, S.

Y. Zhang and S. Zhao, “Optical encryption scheme based on ghost imaging with disordered speckles,” Chin. Phys. B 26(5), 054205 (2017).
[Crossref]

S. Zhao, L. Wang, W. Liang, W. Cheng, and L. Gong, “High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique,” Opt. Commun. 353, 90–95 (2015).
[Crossref]

Zhao, T.

T. Zhao, Q. Ran, L. Yuan, Y. Chi, and J. Ma, “Security of image encryption scheme based on multi-parameter fractional Fourier transform,” Opt. Commun. 376, 47–51 (2016).
[Crossref]

Zhao, X.

L. Sui, X. Zhao, C. Huang, A. Tian, and A. Anand, “An optical multiple-image authentication based on transport of intensity equation,” Opt. Lasers Eng. 116, 116–124 (2019).
[Crossref]

Zhou, N.

Y. Qin, Z. Wang, H. Wang, Q. Gong, and N. Zhou, “Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container,” Opt. Lasers Eng. 105, 118–124 (2018).
[Crossref]

Zhou, X.

X. Li, M. Zhao, Y. Xing, L. Li, S. T. Kim, X. Zhou, and Q. H. Wang, “Optical encryption via monospectral integral imaging,” Opt. Express 25(25), 31516–31527 (2017).
[Crossref] [PubMed]

S. Yuan, X. Liu, X. Zhou, and Z. Li, “Multiple-image encryption scheme with a single-pixel detector,” J. Mod. Opt. 63(15), 1457–1465 (2016).
[Crossref]

Zhu, Z. L.

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “Gyrator transform based double random phase encoding with sparse representation for information authentication,” Opt. Laser Technol. 70, 50–58 (2015).
[Crossref]

Zilan, P.

Z. Leihong, P. Zilan, W. Luying, and M. Xiuhua, “High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform,” Opt. Lasers Eng. 86, 329–337 (2016).
[Crossref]

Adv. Opt. Photonics (2)

A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photonics 1(3), 589–636 (2009).
[Crossref]

Q. Wang, A. Alfalou, and C. Brosseau, “New perspectives in face correlation research: a tutorial,” Adv. Opt. Photonics 9(1), 1–78 (2017).
[Crossref]

Appl. Opt. (4)

Appl. Phys. Lett. (1)

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101(10), 101108 (2012).
[Crossref]

Chin. Phys. B (1)

Y. Zhang and S. Zhao, “Optical encryption scheme based on ghost imaging with disordered speckles,” Chin. Phys. B 26(5), 054205 (2017).
[Crossref]

EPL (1)

W. Chen and X. Chen, “Grayscale object authentication based on ghost imaging using binary signals,” EPL 110(4), 44002 (2015).
[Crossref]

IEEE Photonics J. (2)

X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, “Multiple-image encryption based on compressive ghost imaging and coordinate sampling,” IEEE Photonics J. 8(4), 1–11 (2016).
[Crossref]

Y. Qin and Y. Zhang, “Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation,” IEEE Photonics J. 9(2), 1–8 (2017).
[Crossref]

IEEE Photonics Technol. Lett. (1)

W. Chen, “Correlated-photon secured imaging by iterative phase retrieval using axially-varying distances,” IEEE Photonics Technol. Lett. 28(18), 1932–1935 (2016).
[Crossref]

J. Mod. Opt. (1)

S. Yuan, X. Liu, X. Zhou, and Z. Li, “Multiple-image encryption scheme with a single-pixel detector,” J. Mod. Opt. 63(15), 1457–1465 (2016).
[Crossref]

J. Opt. (6)

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17(6), 065704 (2015).
[Crossref]

B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M. S. Millán, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, “Roadmap on optical security,” J. Opt. 18(8), 083001 (2016).
[Crossref]

Z. Liu, C. Guo, J. Tan, Q. Wu, L. Pan, and S. Liu, “Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms,” J. Opt. 17(2), 025701 (2015).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Customized data container for improved performance in optical cryptosystems,” J. Opt. 18(12), 125702 (2016).
[Crossref]

A. V. Zea, J. F. Barrera, and R. Torroba, “Innovative speckle noise reduction procedure in optical encryption,” J. Opt. 19(5), 055704 (2017).
[Crossref]

M. Zafari, R. Kheradmand, and S. Ahmadi-Kandjani, “Optical encryption with selective computational ghost imaging,” J. Opt. 16(10), 105405 (2014).
[Crossref]

J. Opt. Soc. Am. A (1)

Opt. Commun. (6)

Q. Wang, D. Xiong, A. Alfalou, and C. Brosseau, “Optical image encryption method based on incoherent imaging and polarized light encoding,” Opt. Commun. 415, 56–63 (2018).
[Crossref]

A. Kumar, A. Fatima, and N. K. Nishchal, “An optical Hash function construction based on equal modulus decomposition for authentication verification,” Opt. Commun. 428, 7–14 (2018).
[Crossref]

T. Zhao, Q. Ran, L. Yuan, Y. Chi, and J. Ma, “Security of image encryption scheme based on multi-parameter fractional Fourier transform,” Opt. Commun. 376, 47–51 (2016).
[Crossref]

H. Xu, W. Xu, S. Wang, and S. Wu, “Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain,” Opt. Commun. 402, 302–310 (2017).
[Crossref]

J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, “Multiple-image encryption based on computational ghost imaging,” Opt. Commun. 359, 38–43 (2016).
[Crossref]

S. Zhao, L. Wang, W. Liang, W. Cheng, and L. Gong, “High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique,” Opt. Commun. 353, 90–95 (2015).
[Crossref]

Opt. Eng. (1)

Y. Chen, Q. Liu, J. Wang, and Q. H. Wang, “Single-channel optical encryption of color image using chessboard grating and diffraction imaging scheme,” Opt. Eng. 56(12), 123106 (2017).
[Crossref]

Opt. Express (5)

Opt. Laser Technol. (2)

M. R. Abuturab, “Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition,” Opt. Laser Technol. 98, 298–308 (2018).
[Crossref]

J. X. Chen, Z. L. Zhu, C. Fu, H. Yu, and L. B. Zhang, “Gyrator transform based double random phase encoding with sparse representation for information authentication,” Opt. Laser Technol. 70, 50–58 (2015).
[Crossref]

Opt. Lasers Eng. (17)

J. M. Vilardy, M. S. Millan, and E. Perez-Cabre, “Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain,” Opt. Lasers Eng. 89, 88–94 (2017).
[Crossref]

L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, “An asymmetric color image encryption method by using deduced gyrator transform,” Opt. Lasers Eng. 89, 72–79 (2017).
[Crossref]

H. Chen, C. Tanougast, Z. Liu, W. Blondel, and B. Hao, “Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform,” Opt. Lasers Eng. 107, 62–70 (2018).
[Crossref]

L. Sui, X. Zhao, C. Huang, A. Tian, and A. Anand, “An optical multiple-image authentication based on transport of intensity equation,” Opt. Lasers Eng. 116, 116–124 (2019).
[Crossref]

X. Li, X. Meng, Y. Wang, X. Yang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, “Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain,” Opt. Lasers Eng. 96, 7–16 (2017).
[Crossref]

Y. Su, C. Tang, X. Chen, B. Li, W. Xu, and Z. Lei, “Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map,” Opt. Lasers Eng. 88, 20–27 (2017).
[Crossref]

S. Liansheng, Z. Xiao, H. Chongtian, T. Ailing, and A. K. Asundi, “Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms,” Opt. Lasers Eng. 113, 29–37 (2019).
[Crossref]

S. Liansheng, C. Yin, W. Zhanman, T. Ailing, and A. K. Asundi, “Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm,” Opt. Lasers Eng. 111, 108–113 (2018).
[Crossref]

Y. Wang, C. Quan, and C. J. Tay, “Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 78, 8–16 (2016).
[Crossref]

M. R. Abuturab, “Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm,” Opt. Lasers Eng. 118, 42–51 (2019).
[Crossref]

P. W. M. Tsang, “Single-random-phase holographic encryption of images,” Opt. Lasers Eng. 89, 22–28 (2017).
[Crossref]

I. Mehra and N. K. Nishchal, “Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging,” Opt. Lasers Eng. 68, 74–82 (2015).
[Crossref]

L. Chen, G. Chang, B. He, H. Mao, and D. Zhao, “Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition,” Opt. Lasers Eng. 88, 221–232 (2017).
[Crossref]

Z. Leihong, P. Zilan, W. Luying, and M. Xiuhua, “High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform,” Opt. Lasers Eng. 86, 329–337 (2016).
[Crossref]

Y. Qin, Z. Wang, H. Wang, Q. Gong, and N. Zhou, “Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container,” Opt. Lasers Eng. 105, 118–124 (2018).
[Crossref]

J. F. B. Ramírez, A. J. Osorio, A. V. Zea, and R. Torroba, “Experimental analysis of a joint free space cryptosystem,” Opt. Lasers Eng. 83, 126–130 (2016).
[Crossref]

A. Jaramillo Osorio, J. F. B. Ramírez, S. Montoya, A. Mira-Agudelo, A. V. Zea, and R. Torroba, “Improved decryption quality with a random reference beam cryptosystem,” Opt. Lasers Eng. 112, 119–127 (2019).
[Crossref]

Opt. Lett. (5)

Prog. Opt. (1)

A. Alfalou and C. Brosseau, “Recent advances in optical image processing,” Prog. Opt. 60, 119–262 (2015).
[Crossref]

Sci. Rep. (1)

S. Jiang, Y. Wang, T. Long, X. Meng, X. Yang, R. Shu, and B. Sun, “Information security scheme based on computational temporal ghost imaging,” Sci. Rep. 7(1), 7676 (2017).
[Crossref] [PubMed]

Cited By

OSA participates in Crossref's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (7)

Fig. 1
Fig. 1 (a) The customized data container with 256 bits of information, (b) the container encoded with the primary information and (c) the 8 bits of information calculated for the character “X”.
Fig. 2
Fig. 2 The schematic setup for illustrating the encoded process: SLM, spatial light modulator; BD, bucket detector; POMs, phase-only masks.
Fig. 3
Fig. 3 (a) The random data container, (b) the XOR encoding result, (c) the scrambled data container, (d) a 2D pattern formed with one row of the Hadamard matrix, and (e) the corresponding phase-only mask.
Fig. 4
Fig. 4 (a)-(f) The reconstructed XOR encoding result when100%, 80%, 40%, 20%, 15% and 10% of the total masks are used to collect the measured intensities.
Fig. 5
Fig. 5 (a)-(b) The reconstructed data container with the tiny changes of the bifurcate parameter, and (c) the relation curve between CC values and the deviation of the bifurcate parameter.
Fig. 6
Fig. 6 (a)-(b) The reconstructed data container with the tiny variation of the initial value, and (c) the relation curve between CC values and the deviation of the initial value.
Fig. 7
Fig. 7 (a)-(b) The reconstructed data container with the tiny variation of the integer, and (c) the relation curve between CC values and the deviation of the integer.

Tables (4)

Tables Icon

Table 1 The recovered primary information when different thresholds are used.

Tables Icon

Table 2 The recovered characters extracted with different thresholds when the bifurcate parameter has tiny changes.

Tables Icon

Table 3 The recovered characters extracted with different thresholds when the initial value has tiny changes.

Tables Icon

Table 4 The recovered characters extracted with different thresholds when the integer has tiny changes.

Equations (12)

Equations on this page are rendered with MathJax. Learn more.

H 2 =[ 1 1 1 1 ] .
H 2 k =[ H 2 k1 H 2 k1 H 2 k1 H 2 k1 ] .
E i ( n ) ( μ,υ )=Fr T λ,z { exp( j φ i ( n ) ( x,y ) ) } ,
E ^ i ( n ) ( μ,υ )= h i ( μ,υ ) exp( jarg( E i ( n ) ( μ,υ ) ) ) ,
G i ( n ) ( x,y )=Fr T λ,z { E ^ i ( n ) ( μ,υ ) } ,
exp( j φ i ( n+1 ) ( x,y ) )=exp{ jarg( G i ( n ) ( x,y ) ) } .
CC= E[[ | U | 2 E[ | U | 2 ]][hE[h]]] E[[ | U | 2 E[ | U | 2 ] ] 2 ] E[ [hE[h]] 2 ] .
B i = dμdυ I i ( μ,υ )T( μ,υ ) ,
x( n+1 )=p×x( n )×( 1x( n ) ) ,
X ={ x( j )| j=1,2,,NN } ,
Y ={ x( j )| j=NN+1,NN+2,,2NN } .
f = 1 K i=1 K ( B i B i ) ( I i ( μ,υ ) I i ( μ,υ ) ) ,

Metrics