L. Ma and W. Jin, “Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography,” Opt. Commun. 407, 51–56 (2018).

[Crossref]

Z. Liu, H. Chen, W. Blondel, Z. Shen, and S. Liu, “Image security based on iterative random phase encoding in expanded fractional Fourier domains,” Opt. Lasers Eng. 105, 1–5 (2018).

[Crossref]

M.-L. Piao, Z.-X. Liu, Y.-L. Piao, H.-Y. Wu, Y. Zhao, and N. Kim, “Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains,” Appl. Opt. 57, 7609–7617 (2018).

[Crossref]

H. Zhang, L. Cao, and G. Jin, “Computer-generated hologram with occlusion effect using layer-based processing,” Appl. Opt. 56, F138–F143 (2017).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

Y. Zhao, C.-X. Shi, K.-C. Kwon, Y.-L. Piao, M.-L. Piao, and N. Kim, “Fast calculation method of computer-generated hologram using a depth camera with point cloud gridding,” Opt. Commun. 411, 166–169 (2017).

[Crossref]

D. Kong, X. Shen, L. Cao, H. Zhang, S. Zong, and G. Jin, “Three-dimensional information hierarchical encryption based on computer-generated holograms,” Opt. Commun. 380, 387–393 (2016).

[Crossref]

A. Sinha, “Nonlinear optical cryptosystem resistant to standard and hybrid attacks,” Opt. Lasers Eng. 81, 79–86 (2016).

[Crossref]

W. Chen, “Optical cryptosystem based on single-pixel encoding using the modified Gerchberg-Saxton algorithm with a cascaded structure,” J. Opt. Soc. Am. A. 33, 2305–2311 (2016).

[Crossref]

W. N. Li, C. X. Shi, M. L. Piao, and N. Kim, “Multiple-3D-object secure information system based on phase shifting method and single interference,” Appl. Opt. 55, 4052–4059 (2016).

[Crossref]

A. Fatima and N. K. Nishchal, “Discussion on comparative analysis and a new attack on optical asymmetric cryptosystem,” J. Opt. Soc. Am. A 33, 2034–2040 (2016).

[Crossref]

D. Kong, L. Cao, G. Jin, and B. Javidi, “Three-dimensional scene encryption and display based on computer-generated holograms,” Appl. Opt. 55, 8296–8300 (2016).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17, 065704 (2015).

[Crossref]

X. Wang, C. Dai, and J. Chen, “Optical image encryption via reverse engineering of a modified amplitude-phase retrieval-based attack,” Opt. Commun. 328, 67–72 (2014).

[Crossref]

X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[Crossref]

M. Cho and B. Javidi, “Three-dimensional photon counting double random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[Crossref]

P. Tsang, K. W. K. Cheung, and T.-C. Poon, “Fast numerical generation and hybrid encryption of a computer-generated Fresnel holographic video sequence,” Chinese Opt. Lett. 11, 020901 (2013).

[Crossref]

Y.-Y. Wang, Y.-R. Wang, Y. Wang, H.-J. Li, and W.-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]

G. Sito and J. Zhang, “A lensless optical security system based on computer-generated phase only mask,” Opt. Commun. 232, 115–122 (2004).

[Crossref]

Z. Liu, H. Chen, W. Blondel, Z. Shen, and S. Liu, “Image security based on iterative random phase encoding in expanded fractional Fourier domains,” Opt. Lasers Eng. 105, 1–5 (2018).

[Crossref]

H. Zhang, L. Cao, and G. Jin, “Computer-generated hologram with occlusion effect using layer-based processing,” Appl. Opt. 56, F138–F143 (2017).

[Crossref]

D. Kong, L. Cao, G. Jin, and B. Javidi, “Three-dimensional scene encryption and display based on computer-generated holograms,” Appl. Opt. 55, 8296–8300 (2016).

[Crossref]

D. Kong, X. Shen, L. Cao, H. Zhang, S. Zong, and G. Jin, “Three-dimensional information hierarchical encryption based on computer-generated holograms,” Opt. Commun. 380, 387–393 (2016).

[Crossref]

Z. Liu, H. Chen, W. Blondel, Z. Shen, and S. Liu, “Image security based on iterative random phase encoding in expanded fractional Fourier domains,” Opt. Lasers Eng. 105, 1–5 (2018).

[Crossref]

X. Wang, C. Dai, and J. Chen, “Optical image encryption via reverse engineering of a modified amplitude-phase retrieval-based attack,” Opt. Commun. 328, 67–72 (2014).

[Crossref]

W. Chen, “Optical cryptosystem based on single-pixel encoding using the modified Gerchberg-Saxton algorithm with a cascaded structure,” J. Opt. Soc. Am. A. 33, 2305–2311 (2016).

[Crossref]

P. Tsang, K. W. K. Cheung, and T.-C. Poon, “Fast numerical generation and hybrid encryption of a computer-generated Fresnel holographic video sequence,” Chinese Opt. Lett. 11, 020901 (2013).

[Crossref]

P. W. M. Tsang, T.-C. Poon, and K. W. K. Cheung, “Fast numerical generation and encryption of computer-generated Fresnel holograms,” Appl. Opt. 50, B46–B52 (2011).

[Crossref]

X. Wang, C. Dai, and J. Chen, “Optical image encryption via reverse engineering of a modified amplitude-phase retrieval-based attack,” Opt. Commun. 328, 67–72 (2014).

[Crossref]

X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17, 065704 (2015).

[Crossref]

D. Kong, L. Cao, G. Jin, and B. Javidi, “Three-dimensional scene encryption and display based on computer-generated holograms,” Appl. Opt. 55, 8296–8300 (2016).

[Crossref]

M. Cho and B. Javidi, “Three-dimensional photon counting double random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

E. Tajahuerce and B. Javidi, “Encryption three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[Crossref]

H. Zhang, L. Cao, and G. Jin, “Computer-generated hologram with occlusion effect using layer-based processing,” Appl. Opt. 56, F138–F143 (2017).

[Crossref]

D. Kong, L. Cao, G. Jin, and B. Javidi, “Three-dimensional scene encryption and display based on computer-generated holograms,” Appl. Opt. 55, 8296–8300 (2016).

[Crossref]

D. Kong, X. Shen, L. Cao, H. Zhang, S. Zong, and G. Jin, “Three-dimensional information hierarchical encryption based on computer-generated holograms,” Opt. Commun. 380, 387–393 (2016).

[Crossref]

L. Ma and W. Jin, “Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography,” Opt. Commun. 407, 51–56 (2018).

[Crossref]

M.-L. Piao, Z.-X. Liu, Y.-L. Piao, H.-Y. Wu, Y. Zhao, and N. Kim, “Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains,” Appl. Opt. 57, 7609–7617 (2018).

[Crossref]

Y. Zhao, C.-X. Shi, K.-C. Kwon, Y.-L. Piao, M.-L. Piao, and N. Kim, “Fast calculation method of computer-generated hologram using a depth camera with point cloud gridding,” Opt. Commun. 411, 166–169 (2017).

[Crossref]

W. N. Li, C. X. Shi, M. L. Piao, and N. Kim, “Multiple-3D-object secure information system based on phase shifting method and single interference,” Appl. Opt. 55, 4052–4059 (2016).

[Crossref]

D. Kong, L. Cao, G. Jin, and B. Javidi, “Three-dimensional scene encryption and display based on computer-generated holograms,” Appl. Opt. 55, 8296–8300 (2016).

[Crossref]

D. Kong, X. Shen, L. Cao, H. Zhang, S. Zong, and G. Jin, “Three-dimensional information hierarchical encryption based on computer-generated holograms,” Opt. Commun. 380, 387–393 (2016).

[Crossref]

Y. Zhao, C.-X. Shi, K.-C. Kwon, Y.-L. Piao, M.-L. Piao, and N. Kim, “Fast calculation method of computer-generated hologram using a depth camera with point cloud gridding,” Opt. Commun. 411, 166–169 (2017).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17, 065704 (2015).

[Crossref]

Y.-Y. Wang, Y.-R. Wang, Y. Wang, H.-J. Li, and W.-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

Z. Liu, H. Chen, W. Blondel, Z. Shen, and S. Liu, “Image security based on iterative random phase encoding in expanded fractional Fourier domains,” Opt. Lasers Eng. 105, 1–5 (2018).

[Crossref]

S. Liu, J. Wu, and C. Li, “Cascading the multiple stages of the optical fractional Fourier transforms under different variable scale,” Opt. Lett. 20, 1415–1417 (1995).

[Crossref]

Z. Liu, H. Chen, W. Blondel, Z. Shen, and S. Liu, “Image security based on iterative random phase encoding in expanded fractional Fourier domains,” Opt. Lasers Eng. 105, 1–5 (2018).

[Crossref]

L. Ma and W. Jin, “Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography,” Opt. Commun. 407, 51–56 (2018).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[Crossref]

M.-L. Piao, Z.-X. Liu, Y.-L. Piao, H.-Y. Wu, Y. Zhao, and N. Kim, “Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains,” Appl. Opt. 57, 7609–7617 (2018).

[Crossref]

Y. Zhao, C.-X. Shi, K.-C. Kwon, Y.-L. Piao, M.-L. Piao, and N. Kim, “Fast calculation method of computer-generated hologram using a depth camera with point cloud gridding,” Opt. Commun. 411, 166–169 (2017).

[Crossref]

M.-L. Piao, Z.-X. Liu, Y.-L. Piao, H.-Y. Wu, Y. Zhao, and N. Kim, “Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains,” Appl. Opt. 57, 7609–7617 (2018).

[Crossref]

Y. Zhao, C.-X. Shi, K.-C. Kwon, Y.-L. Piao, M.-L. Piao, and N. Kim, “Fast calculation method of computer-generated hologram using a depth camera with point cloud gridding,” Opt. Commun. 411, 166–169 (2017).

[Crossref]

P. Tsang, K. W. K. Cheung, and T.-C. Poon, “Fast numerical generation and hybrid encryption of a computer-generated Fresnel holographic video sequence,” Chinese Opt. Lett. 11, 020901 (2013).

[Crossref]

P. W. M. Tsang, T.-C. Poon, and K. W. K. Cheung, “Fast numerical generation and encryption of computer-generated Fresnel holograms,” Appl. Opt. 50, B46–B52 (2011).

[Crossref]

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17, 065704 (2015).

[Crossref]

D. Kong, X. Shen, L. Cao, H. Zhang, S. Zong, and G. Jin, “Three-dimensional information hierarchical encryption based on computer-generated holograms,” Opt. Commun. 380, 387–393 (2016).

[Crossref]

Z. Liu, H. Chen, W. Blondel, Z. Shen, and S. Liu, “Image security based on iterative random phase encoding in expanded fractional Fourier domains,” Opt. Lasers Eng. 105, 1–5 (2018).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[Crossref]

Y. Zhao, C.-X. Shi, K.-C. Kwon, Y.-L. Piao, M.-L. Piao, and N. Kim, “Fast calculation method of computer-generated hologram using a depth camera with point cloud gridding,” Opt. Commun. 411, 166–169 (2017).

[Crossref]

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17, 065704 (2015).

[Crossref]

A. Sinha, “Nonlinear optical cryptosystem resistant to standard and hybrid attacks,” Opt. Lasers Eng. 81, 79–86 (2016).

[Crossref]

G. Sito and J. Zhang, “A lensless optical security system based on computer-generated phase only mask,” Opt. Commun. 232, 115–122 (2004).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

Y.-Y. Wang, Y.-R. Wang, Y. Wang, H.-J. Li, and W.-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

P. Tsang, K. W. K. Cheung, and T.-C. Poon, “Fast numerical generation and hybrid encryption of a computer-generated Fresnel holographic video sequence,” Chinese Opt. Lett. 11, 020901 (2013).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[Crossref]

X. Wang, C. Dai, and J. Chen, “Optical image encryption via reverse engineering of a modified amplitude-phase retrieval-based attack,” Opt. Commun. 328, 67–72 (2014).

[Crossref]

Y.-Y. Wang, Y.-R. Wang, Y. Wang, H.-J. Li, and W.-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

Y.-Y. Wang, Y.-R. Wang, Y. Wang, H.-J. Li, and W.-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

Y.-Y. Wang, Y.-R. Wang, Y. Wang, H.-J. Li, and W.-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

H. Zhang, L. Cao, and G. Jin, “Computer-generated hologram with occlusion effect using layer-based processing,” Appl. Opt. 56, F138–F143 (2017).

[Crossref]

D. Kong, X. Shen, L. Cao, H. Zhang, S. Zong, and G. Jin, “Three-dimensional information hierarchical encryption based on computer-generated holograms,” Opt. Commun. 380, 387–393 (2016).

[Crossref]

G. Sito and J. Zhang, “A lensless optical security system based on computer-generated phase only mask,” Opt. Commun. 232, 115–122 (2004).

[Crossref]

M.-L. Piao, Z.-X. Liu, Y.-L. Piao, H.-Y. Wu, Y. Zhao, and N. Kim, “Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains,” Appl. Opt. 57, 7609–7617 (2018).

[Crossref]

Y. Zhao, C.-X. Shi, K.-C. Kwon, Y.-L. Piao, M.-L. Piao, and N. Kim, “Fast calculation method of computer-generated hologram using a depth camera with point cloud gridding,” Opt. Commun. 411, 166–169 (2017).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

D. Kong, X. Shen, L. Cao, H. Zhang, S. Zong, and G. Jin, “Three-dimensional information hierarchical encryption based on computer-generated holograms,” Opt. Commun. 380, 387–393 (2016).

[Crossref]

E. Tajahuerce and B. Javidi, “Encryption three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[Crossref]

W. N. Li, C. X. Shi, M. L. Piao, and N. Kim, “Multiple-3D-object secure information system based on phase shifting method and single interference,” Appl. Opt. 55, 4052–4059 (2016).

[Crossref]

P. W. M. Tsang, T.-C. Poon, and K. W. K. Cheung, “Fast numerical generation and encryption of computer-generated Fresnel holograms,” Appl. Opt. 50, B46–B52 (2011).

[Crossref]

X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

[Crossref]

S. K. Rajput and N. K. Nishchal, “Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform,” Appl. Opt. 52, 871–878 (2013).

[Crossref]

D. Kong, L. Cao, G. Jin, and B. Javidi, “Three-dimensional scene encryption and display based on computer-generated holograms,” Appl. Opt. 55, 8296–8300 (2016).

[Crossref]

H. Zhang, L. Cao, and G. Jin, “Computer-generated hologram with occlusion effect using layer-based processing,” Appl. Opt. 56, F138–F143 (2017).

[Crossref]

M.-L. Piao, Z.-X. Liu, Y.-L. Piao, H.-Y. Wu, Y. Zhao, and N. Kim, “Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains,” Appl. Opt. 57, 7609–7617 (2018).

[Crossref]

S. Coëtmellec, D. Lebrun, and C. Özkul, “Characterization of diffraction patterns directly from in-line holograms with the fractional Fourier transform,” Appl. Opt. 41, 312–319 (2002).

[Crossref]

P. Tsang, K. W. K. Cheung, and T.-C. Poon, “Fast numerical generation and hybrid encryption of a computer-generated Fresnel holographic video sequence,” Chinese Opt. Lett. 11, 020901 (2013).

[Crossref]

N. Rawat, I. C. Hwang, Y. Shi, and B. G. Lee, “Optical image encryption via photon-counting imaging and compressive sensing based ptychography,” J. Opt. 17, 065704 (2015).

[Crossref]

W. Chen, “Optical cryptosystem based on single-pixel encoding using the modified Gerchberg-Saxton algorithm with a cascaded structure,” J. Opt. Soc. Am. A. 33, 2305–2311 (2016).

[Crossref]

L. Ma and W. Jin, “Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography,” Opt. Commun. 407, 51–56 (2018).

[Crossref]

X. Wang, C. Dai, and J. Chen, “Optical image encryption via reverse engineering of a modified amplitude-phase retrieval-based attack,” Opt. Commun. 328, 67–72 (2014).

[Crossref]

D. Kong, X. Shen, L. Cao, H. Zhang, S. Zong, and G. Jin, “Three-dimensional information hierarchical encryption based on computer-generated holograms,” Opt. Commun. 380, 387–393 (2016).

[Crossref]

Y. Zhao, C.-X. Shi, K.-C. Kwon, Y.-L. Piao, M.-L. Piao, and N. Kim, “Fast calculation method of computer-generated hologram using a depth camera with point cloud gridding,” Opt. Commun. 411, 166–169 (2017).

[Crossref]

G. Sito and J. Zhang, “A lensless optical security system based on computer-generated phase only mask,” Opt. Commun. 232, 115–122 (2004).

[Crossref]

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907–15920 (2015).

[Crossref]

S. Xi, X. Wang, L. Song, Z. Zhu, B. Zhu, S. Huang, N. Yu, and H. Wang, “Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram,” Opt. Express 25, 8212–8222 (2017).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).

[Crossref]

A. Sinha, “Nonlinear optical cryptosystem resistant to standard and hybrid attacks,” Opt. Lasers Eng. 81, 79–86 (2016).

[Crossref]

Z. Liu, H. Chen, W. Blondel, Z. Shen, and S. Liu, “Image security based on iterative random phase encoding in expanded fractional Fourier domains,” Opt. Lasers Eng. 105, 1–5 (2018).

[Crossref]

Y.-Y. Wang, Y.-R. Wang, Y. Wang, H.-J. Li, and W.-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007).

[Crossref]

T. Shimobaba, N. Masuda, and T. lto, “Simple and fast calculation algorithm for computer-generated hologram with wavefront recording plane,” Opt. Lett. 34, 3133–3135 (2009).

[Crossref]

M. Cho and B. Javidi, “Three-dimensional photon counting double random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).

[Crossref]

I. Muniraj, C. L. Guo, M. Ra’ed, J. P. Ryle, J. J. Healy, B. G. Lee, and J. T. Sheridan, “Low photon count based digital holography for quadratic phase cryptography,” Opt. Lett. 42, 2774–2777 (2017).

[Crossref]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

S. Liu, J. Wu, and C. Li, “Cascading the multiple stages of the optical fractional Fourier transforms under different variable scale,” Opt. Lett. 20, 1415–1417 (1995).

[Crossref]

X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006).

[Crossref]