[1]
O. Matoba, T. Nomura, E. Perez-Cabre, M.S. Millan, and B. Javidi, "Optical techniques for information security", Proc. IEEE, vol. 97, pp. 1128-1148, 2009.
[2]
A. Alfalou, and C. Brosseau, "Optical image compression and encryption methods", Adv. Opt. Photon, vol. 1, pp. 589-536, 2009.
[3]
M. S. Millan, and E. Perez-Cabre, "Optical Data Encryption, Optical and Digital Image Processing: Fundamentals and Applications", G. Cristobal P. Schelkens and H. Thienpont Eds (Wiley) 2011, pp. 739-767.
[4]
P. Refregier, and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding", Opt. Lett., vol. 20, pp. 767-769, 1995.
[5]
G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double random phase encoding in the Fractional Fourier domain", Opt. Lett., vol. 25, pp. 887-889, 2000.
[6]
X. Liu, W. Mei, and H. Du, "Optical image encryption based on compressive sensing and chaos in the Fractional Fourier domain", J. Mod. Opt., vol. 61, no. (19), pp. 1570-1577, 2014.
[7]
N. Zhou, T. Dong, and J. Wu, "Novel image encryption algorithm based on multiple-parameter discrete fractional random transform", Opt. Commun., vol. 283, no. (15), pp. 3037-3042, 2010.
[8]
H. Singh, Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domainAIP Conference Proceedings, 1728 020063-1/4, 2016.
[9]
O. Matoba, and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel Domain", Opt. Lett., vol. 24, pp. 762-764, 1999.
[10]
G. Situ, and J. Zhang, "Double random-phase encoding in the Fresnel domain", Opt. Lett., vol. 29, pp. 1584-1586, 2004.
[11]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Optical image encryption using Devil’s vortex Toroidal lens in the Fresnel transform domain", Int. J.of Opt., vol. 926135, pp. 1-13, 2015.
[12]
M.R. Abuturab, "Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain", Opt. Laser Technol., vol. 45, pp. 524-532, 2013.
[13]
J. Wu, L. Zhang, and N. Zhou, "Image encryption based on the multiple-order discrete fractional cosine transform", Opt. Commun., vol. 283, pp. 1720-1725, 2010.
[14]
N. Zhon, Y. Wang, and L. Gong, "Novel optical image encryption scheme based on fractional Mellin transform", Opt. Commun., vol. 284, pp. 3234-3242, 2011.
[15]
S. Vashisth, H. Singh, A.K. Yadav, and K. Singh, "Devil’s vortex phase structure as frequency plane mask for image encryption using the fractional Mellin transform", Int. J. Opt., vol. 728056, pp. 1-9, 2014.
[16]
N. Zhou, H. Li, D. Wang, S. Pan, and Z. Zhou, "Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform", Opt. Commun., vol. 343, pp. 10-21, 2015.
[17]
G. Situ, and J. Zhang, "Multiple-image encryption by wavelength multiplexing", Opt. Lett., vol. 30, pp. 1306-1308, 2005.
[18]
L. Chen, and D. Zhao, "Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms", Opt. Express, vol. 14, pp. 8552-8560, 2006.
[19]
U. Gopinathan, T.J. Naughton, and J.T. Sheridan, "Polarization encoding and multiplexing of two-dimensional signals: Application to image encryption", Appl. Opt., vol. 45, pp. 5693-5700, 2006.
[20]
H. Li, "Image encryption based on gyrator transform and two step phase shifting interferometry", Opt. Lasers Eng., vol. 47, pp. 45-50, 2009.
[21]
J. Masajada, and B. Dubik, "Optical vortex generation by three plane wave interference", Opt. Commun., vol. 198, pp. 21-27, 2001.
[22]
S. Vyas, and P. Senthilkumaran, "Interferometric optical vortex array generator", Appl. Opt., vol. 46, pp. 2893-2898, 2007.
[23]
L. Sui, B. Zhou, Z. Wang, and Q. Sun, "Amplitude-phase retrieval attack free image encryption based on two random masks and interference", Opt. Lasers Eng., vol. 86, pp. 1-10, 2016.
[24]
A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen–ciphertext attacks of optical encryption schemes based on double random phase keys", Opt. Lett., vol. 30, pp. 1644-1646, 2005.
[25]
X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys", Opt. Lett., vol. 31, pp. 1044-1046, 2006.
[26]
W. Chen, C. Quan, and C. Tay, "Optical color image encryption based on Arnold transform and interference method", Opt. Commun., vol. 282, no. (18), pp. 3680-3685, 2009.
[27]
L. Chen, D. Zhao, and F. Ge, "Image encryption based on singular value decomposition and Arnold transform in fractional domain", Opt. Commun., vol. 291, pp. 98-103, 2013.
[28]
L. Sui, and B. Gao, "Color image encryption based on gyrator transform and Arnold transform", Opt. Laser Technol., vol. 48, pp. 530-538, 2013.
[29]
P. L. Yadav, and H. Singh, "Optical double image hiding in the fractional Hartley transform using structured phase filter and Arnold transform", 3D Res., vol. 9, no. (20), pp. 1-20. 2018
[30]
J.A. Rodrigo, T. Alieva, and M.L. Calvo, "Gyrator transform: properties and applications", Opt. Express, vol. 15, pp. 2190-2203, 2007.
[31]
J.A. Rodrigo, T. Alieva, and M.L. Calvo, "Applications of gyrator transform for image processing", Opt. Commun., vol. 278, pp. 279-284, 2007.
[32]
S-C. Pei, and J-J. Ding, Properties, digital implementation, applications, and self-image phenomena of the gyrator transformIn Signal Processing Conference, 2009 17th European, Glasgow, Scotland, 2009, pp. 441-445.
[33]
M.R. Abuturab, "Color image security system using double random-structured phase encoding in gyrator domain", Appl. Opt., vol. 51, pp. 3006-3016, 2012.
[34]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Fully-Phase image encryption using double random-structured phase masks in gyrator domain", Appl. Opt., vol. 53, pp. 6472-6481, 2014.
[35]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane", Opt. Lasers Eng., vol. 67, pp. 145-156, 2015.
[36]
L. Sui, B. Liu, Q. Wang, Y. Li, and J. Liang, "Color-image encryption by using Yang-Gu mixture amplitude-phase retrieval algorithm in gyrator transform domain and two-dimensional sine logistic modulation map", Opt. Lasers Eng., vol. 75, pp. 17-26, 2015.
[37]
J-X. Chen, Z-L. Zhu, C. Fu, L-B. Zhang, and H. Yu, "Analysis and improvement of double image encryption scheme using pixel scrambling technique in gyrator domains", Opt. Lasers Eng., vol. 66, pp. 1-9, 2015.
[38]
S. Vashisth, A. K. Yadav, H. Singh, and K. Singh, "Watermarking in gyrator domain using an asymmetric cryptosystem", Proc SPIE. 9654 96542E–1/8, 2015.
[39]
M.R. Abuturab, "An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform", Opt. Lasers Eng., vol. 69, pp. 49-57, 2015.
[40]
I. Mehra, and N.K. Nishchal, "Optical asymmetric image encryption using gyrator wavelet transform", Opt. Commun., vol. 354, pp. 344-352, 2015.
[41]
J. Chen, Y. Zhang, J. Li, and L-B. Zhang, "Security enhancement of double random phase encoding using rear-mounted phase masking", Opt. Lasers Eng., vol. 101, pp. 51-59, 2018.
[42]
J.A. Davis, D.E. McNamara, D.M. Cottrell, and J. Campos, "Image processing with the radial Hilbert transform: Theory and experiments", Opt. Lett., vol. 25, pp. 99-101, 2000.
[43]
M. Joshi, C. Shakher, and K. Singh, "Image encryption and decryption using fractional Fourier transform and radial Hilbert transform", Opt. Lasers Eng., vol. 46, pp. 522-526, 2008.
[44]
J.F. Barrera, R. Henao, and R. Torroba, "Optical encryption method using toroidal zone plates", Opt. Commun., vol. 248, pp. 35-40, 2005.
[45]
J.F. Barrera, R. Henao, and R. Torroba, "Fault tolerances using toroidal zone plate encryption", Opt. Commun., vol. 256, pp. 489-494, 2005.
[46]
M. Khurana, and H. Singh, "Optical image encryption using Fresnel zone plate mask based on fast walsh hadamard transform International Conference on Condensed Matter and Applied Physics", AIP Conf. Proceeding, vol. 1953, no. 1, pp. 140043-1/4, 2017.
[47]
M. Khurana, and H. Singh, "Spiral-phase masked optical image health care encryption system for medical images based on fast walsh-hadamard transform for security enhancement", Inter. J. Healthcare Infor. Sys. Informatics., vol. 13, no. (4), pp. 98-117, 2018.
[48]
A.K. Yadav, S. Vashisth, H. Singh, and K. Singh, "A phase-image watermarking scheme in gyrator domain using devil’s vortex Fresnel lens as a phase mask", Opt. Commun., vol. 344, pp. 172-180, 2015.
[49]
H. Singh, "Nonlinear optical double image encryption using random-vortex in fractional Hartley transform domain", Optica Applicata., vol. 47, no. (4), pp. 557-578, 2017.
[50]
W. Zamrani, E. Ahouzi, A. Lizana, J. Campos, and M. Yzuel, "Optical image encryption technique based on deterministic phase masks", Opt. Eng., vol. 55, no. (10), pp. 103108-, 1-9, 2016.
[51]
R. Girija, and H. Singh, "A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition", Opt. Quantum Electron., vol. 50, no. (210), pp. 1-24, 2018.
[52]
M. Khurana, and H. Singh, "An asymmetric image encryption based on phase truncated hybrid transform", 3D Res., vol. 8, no. 28, pp. 17-28. 2017
[53]
M. Khurana, and H. Singh, "Data Computation and Secure Encryption Based on Gyrator Transform using Singular Value Decomposition and Randomization, International Conference on Computational Intelligence and Data Science (ICCIDS)", Procedia Computer Science., vol. 132, pp. 1636-1645, 2018.
[54]
M. Khurana, and H. Singh, "Asymmetric optical image encryption using random Hilbert mask based on fast Walsh Hadamard transform", International Conference on Computing and Communication Technologies for Smart Nation IEEE, 2017pp. 374-377
[55]
M. Khurana, and H. Singh, "“Asymmetric optical image triple masking encryption based on gyrator and Fresnel transforms to remove silhouette problem”, 3D Res", Express, vol. 9, no. (38), pp. 1-17, 2018.