1 |
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).
DOI
|
2 |
E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry,” Appl. Opt. 39, 2313-2320 (2000).
DOI
|
3 |
I. H. Lee and M. J. Cho, “Double random phase encryption using orthogonal encoding for multiple-image transmission,” J. Opt. Soc. Korea 18, 201-206 (2014).
DOI
|
4 |
J. C. Zheng and X. Q. Li, “Image authentication using only partial phase information from a double-random-phase-encrypted image in the Fresnel domain,” J. Opt. Soc. Korea 19, 241-247 (2015).
DOI
|
5 |
S. Yuan, Y. H. Xin, M. T. Liu, S. X. Yao, and X. J. Sun, “An improved method to enhance the security of double random-phase encoding in the Fresnel domain,” Optics & Laser Technology 44, 51-56 (2012).
DOI
|
6 |
N. Sundararajan, “2-D Hartley transforms,” Geophysics 60, 262-267 (1995).
DOI
|
7 |
N. K. Nischal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235, 253-259 (2004).
DOI
|
8 |
Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Optics & Laser Technology 48, 267-279 (2013).
DOI
|
9 |
I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photonlimited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907-15920 (2015).
DOI
|
10 |
M. R. Abuturab, “Securing color information using Arnold transform in gyrator transform domain,” Optics and Lasers in Engineering 50, 772-779 (2012).
DOI
|
11 |
S. Q. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microwave Opt. Technol. Lett. 21, 318-323 (1999).
DOI
|
12 |
M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption for twin images in fractional Fourier domain,” Opt. Commun. 281, 5713-5720 (2008).
DOI
|
13 |
W. Chen, C. Quan, and C. Tay, “Optical color image encryption based on arnold transform and interference method,” Opt. Commun. 282, 3680-3685 (2009).
DOI
|
14 |
S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377-5386 (2012).
DOI
|
15 |
X. L. Wang, H. C. Zhai, Z. L. Li, and Q. Ge, “Double random-phase encryption based on discrete quaternion Fourier-transforms,” Optik 122, 1856-1859 (2011).
DOI
|
16 |
Z. H. Shao, H. Z. Shu, J. S. Wu, Z. F. Dong, G. Coatrieux, and J. L. Coatrieux, “Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain,” Opt. Express 22, 4932-4943 (2014).
DOI
|
17 |
I. Mehra and N. K. Nishchal, “Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding,” Opt. Express 22, 5474-5482 (2014).
DOI
|
18 |
X. X. Li and D. M. Zhao, “Optical color image encryption with redefined fractional Hartley transform,” Optik 121, 673-677 (2010).
DOI
|
19 |
M. R. Abuturab, “Generalized Arnold map-based optical multiple color-image encoding in gyrator transform domain,” Opt. Commun. 343, 157-171 (2015).
DOI
|
20 |
W. R. Hamilton, Elements of Quaternions (Cambridge University Press, Cambridge, UK, 2009), Chapter 2.
|
21 |
N. Gupta and D. K. Saxena, “Implementation and contrasting comparision of transform techniques of OFDM,” International Journal of Computer Applications 72, 47-51 (2013).
|
22 |
Z. J. Liu, D. Z. Chen, J. P. Ma, S. Y. Wei, Y. L. Zhang, J. M. Dai, and S. T. Liu, “Fast algorithm of discrete gyrator transform based on convolution operation,” Optik 122, 864-867 (2011).
DOI
|
23 |
S. Zhang, D. V. D. Weide, and J. Oliver, “Superfast phaseshifting method for 3-D shape measurement,” Opt. Express 18, 9684-9689 (2010).
DOI
|
24 |
D. M. Chen, Y. M. Liu, X. D. Chen, Y. P. Chang, and J. Wang, “A novel chaotic map and DES based file encryption algorithm,” International Journal of Advancements in Computing Technology 3, 198-205 (2011).
|
25 |
L. Z. Cai, Q. Liu, and X. L. Yang, “Phase-shift extraction and wave-front reconstruction in phase-shifting interferometry with arbitrary phase steps,” Opt. Lett. 28, 1808-1810 (2003).
DOI
|
26 |
Y. Wang, D. L. Zheng, and L. Ju, "Digital image encryption algorithm based on three-dimension Lorenz chaos," Journal of University of Science and Technology Beijing 26, 678-682 (2004). (in Chinese)
|
27 |
L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078-3084 (2004).
DOI
|
28 |
M. Z. He, Q. F. Tan, L. C. Cao, Q. S. He, and G. F. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17, 22462-22473 (2009).
DOI
|
29 |
M. Smila and S. Sankar, “Novel algorithms for finding an optimal scanning path for JPEG image compression,” IJETCSE 8, 230-236 (2014).
|
30 |
T. K. Tsui, X. P. Zhang, and D. Androutsos, “Color image watermarking using multidimensional Fourier transforms,” IEEE Trans. Inform. Forensics Secur. 3, 16-28 (2008).
DOI
|
31 |
X. G. Wang and D. M. Zhao, “Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry,” Opt. Commun. 268, 240-244 (2006).
DOI
|
32 |
Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51, 472-480 (2013).
DOI
|
33 |
P. Rajavel, “Directional Hartley transform and content based image retrieval,” Signal Processing 90, 1267-1278 (2010).
DOI
|
34 |
R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. (Prentice Hall, New Jersey, USA, 2007), Chapter 5.
|
35 |
X. Su, "Virtual optical encryption system based on coupling sawtooth spatiotemporal chaos," Master Thesis, Nanjing University of Posts and Telecommunications (2014). (in Chinese)
|
36 |
X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261-3263 (2006).
DOI
|
37 |
C. B. Li, Data Structure (Tsinghua University Press, Beijing, PRC, 2013), Chapter 9. (in Chinese)
|