[1]
J. Leach, E. Yao, and M.J. Padgett, "Observation of the vortex structure of a non-integer vortex beam", New J. Phys., vol. 6, pp. 1-8, 2004.
[2]
M.V. Berry, "Optical vortices evolving from helicoidal integer and fractional phase steps", J. Opt. A, Pure Appl. Opt., vol. 6, pp. 259-268, 2004.
[3]
S. Vyas, R.K. Singh, and P. Senthilkumaran, "Fractional vortex lens", Opt. Laser Technol., vol. 42, pp. 878-882, 2010.
[4]
A.M. Amaral, E.L. Falcao-Filho, and C.B. De Araujo, "Shaping optical beams with topological charge", Opt. Lett., vol. 38, pp. 1579-1581, 2013.
[5]
L. Preda, "Generation of optical vortices by fractional derivative", Opt. Lasers Eng., vol. 54, pp. 42-48, 2014.
[6]
B. Javidi, “Optical and Digital Techniques for Information Security”, Springer-Verlag, 2005.,
[7]
O. Matoba, T. Nomura, E. Perez-Cabre, M.S. Millan, and B. Javidi, "Optical techniques for information security", Proc. IEEE, vol. 97, pp. 1128-1148, 2009.
[8]
"A. Alfalou and C. Brosseau, “Optical image compression and encryption methods”,", Adv. Opt. Photon..vol. 1, pp. 589-536, 2009,
[9]
M.S. Millan, and E. Perez-Cabre, “Optical data encryption”In Optical and Digital Image Processing: Fundamentals and Applications..G. Cristobal, P. Schelkens and H. Thienpont, eds (Wiley), pp.
739-767, 2011,
[10]
B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M.S. Millán, N.K. Nishchal, R. Torroba, J.F. Barrera, W. He, and X. Peng, "Roadmap on optical security", J. Opt., vol. 18, pp. 1-39, 2016.
[11]
A.K. Yadav, S. Vashisth, H. Singh, and K. Singh, Optical cryptography and watermarking using some Fractional canonical transforms, and structured masks.In Advances in Optical Science and Engineering., Springer: New Delhi, pp. 25-36. 2015
[12]
P. Kumar, J. Joseph, and K. Singh, “Double random phase encoding
based optical encryption systems using some linear canonical transforms: Weaknesses and countermeasures”Eds. John J. Healy, M.
A. Kutay, H. M. Ozaktas, J. T. Sheridan, Springer series in Optical
Sciences, vol. 198, pp. 367-396, 2016,
[13]
G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain", Opt. Lett., vol. 25, pp. 887-889, 2000.
[14]
M. Dahiya, S. Sukhija, and H. Singh, "Image encryption using quad masks in fractional fourier domain and case study", In IEEE International Advance Computing Conference (IACC), pp. 1048-1053 2014,
[15]
O. Matoba, and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain", Opt. Lett., vol. 24, pp. 762-764, 1999.
[16]
G. Situ, and J. Zhang, "Double random-phase encoding in the Fresnel domain", Opt. Lett., vol. 49, pp. 1584-1586, 2004.
[17]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Optical image encryption using devil’s vortex toroidal lens in the fresnel transform domain", Int. J. Opt., vol. 2015, pp. 1-13, 2015.
[18]
H. Singh, "Devil’s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncated in gyrator wavelet transform", Opt. Lasers Eng., vol. 81, pp. 125-139, 2016.
[19]
N.R. Zhou, Y. Wang, and L. Gong, "Novel optical image encryption scheme based on fractional Mellin transform", Opt. Commun., vol. 284, pp. 3234-3242, 2011.
[20]
S. Vashisth, H. Singh, A.K. Yadav, and K. Singh, "“Devil’s vortex
phase structure as frequency plane mask for image encryption using the fractional Mellin transform”, ", Int. J. Opt..2014, pp. 1-9,
2014,
[21]
H. Singh, "“Cryptosystem for securing image encryption using
structured phase masks in Fresnel wavelet transform domain”", 3D
Res.vol. 7, p. 34, 2016,
[22]
J.A. Rodrigo, T. Alieva, and M.L. Calvo, "Gyrator transform: Properties and applications", Opt. Express, vol. 15, pp. 2190-2203, 2007.
[23]
J.A. Rodrigo, T. Alieva, and M.L. Calvo, "Applications of gyrator transform for image processing", Opt. Commun., vol. 278, pp. 279-284, 2007.
[24]
S.C. Pei, and J.J. Ding, “Properties, digital implementation, applications, and self-image phenomena of the gyrator transform”, In
17th European Signal Processing Conferenece (EURASIP, 2009),
Glasgow, Scotland, pp. 441-445, 2009.
[25]
M.R. Abuturab, "Securing color image using discrete cosine transform in gyrator transform domain structured-phase encoding", Opt. Lasers Eng., vol. 50, pp. 1383-1390, 2012.
[26]
M.R. Abuturab, "Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain", Opt. Laser Technol., vol. 45, pp. 525-532, 2013.
[27]
Q. Wang, Q. Guo, and L. Lei, "Double image encryption based on phase-amplitude mixed encoding and multistage phase encoding in gyrator transform domains", Opt. Laser Technol., vol. 48, pp. 267-279, 2013.
[28]
M.R. Abuturab, "An asymmetric color image cryptosystem based on Schur decomposition in gyrator domain", Opt. Lasers Eng., vol. 58, pp. 39-47, 2014.
[29]
W. Qu, Q. Guo, and L. Lei, "Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg-Saxton algorithm in gyrator domain", Opt. Commun., vol. 320, pp. 12-21, 2014.
[30]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Fully-phase image encryption using double random-structured phase masks in gyrator domain", Appl. Opt., vol. 53, pp. 6472-6481, 2014.
[31]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane", Opt. Lasers Eng., vol. 67, pp. 145-156, 2015.
[32]
J.M. Vilardy, M.S. Millan, and E. Perez-Cabre, "Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain", Opt. Lasers Eng., vol. 89, pp. 88-94, 2016.
[33]
H. Chen, C. Tanougast, Z. Liu, and L. Sieler, "Asymmetric optical cryptosystem for color images based on equal modulus decomposition in gyrator domains", Opt. Lasers Eng., vol. 93, pp. 1-8, 2017.
[34]
L. Sui, M. Xu, and A. Tian, "Optical noise-free image encryption based on quick response code and high dimension chaotic system in gyrator transform domain", Opt. Lasers Eng., vol. 92, pp. 106-114, 2017.
[35]
M.R. Abuturab, "Multiple information encryption by user-image-based gyrator transform hologram", Opt. Lasers Eng., vol. 92, pp. 76-84, 2017.
[36]
Z. Shao, Y. Shang, X. Fu, H. Yuan, and H. Shu, "Double image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain", Multimedia Tools Appl., 2017.
[37]
R. Perez, J. M. Vilardy and C. J. Jimenez, “Nonlinear image encryption system using the Gyrator transform and truncation operations”, In Journal of Physics: Conference Series, vol. 792, p.
012046, 2017,
[38]
W. Qin, and X. Peng, "Asymmetric cryptosystem based on phase-truncated fourier transform", Opt. Lett., vol. 35, pp. 118-120, 2010.
[39]
W. Qin, X. Peng, X. Meng, and B. Gao, "“Universal and special keys
based on phase-truncated fourier transform”", Opt. Eng..vol. 50, p.
080501, 2011.,
[40]
X. Wang, and D. Zhao, "Double-image self-encoding and hiding based on phase-truncated fourier transform and phase retrieval", Opt. Commun., vol. 284, pp. 4441-4445, 2011.
[41]
X. Wang, and D. Zhao, "Double images encrypted method with resistance against the specific attack based on an asymmetric algorithm", Opt. Express, vol. 20, pp. 11994-12003, 2012.
[42]
S.K. Rajput, and N.K. Nishchal, "Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask", Appl. Opt., vol. 51, pp. 5377-5786, 2012.
[43]
W. Liu, Z. Liu, J. Wu, and S. Liu, "Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding", Opt. Commun., vol. 301-302, pp. 56-60, 2013.
[44]
Q. Wang, Q. Guo, and J. Zhou, "Color image hiding based on phase-truncation and phase retrieval technique in fractional fourier domain", Optik, vol. 124, pp. 1224-1229, 2013.
[45]
S. Vashisth, A.K. Yadav, H. Singh, and K. Singh, "“Watermarking image encryption using deterministic
phase mask and singular value decomposition in fractional Mellin
transform domain”", IET Image Process vol. 12, no. 11, pp. 1994-
2001, 2018,
[46]
H. Singh, "Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain", IET Image Process., vol. 12, no. 11, pp. 1994-2001, 2018.
[47]
H. Singh, "Hybrid structured phase mask in frequency plane for optical double image encryption in gyrator transform domain", J. Mod. Opt., vol. 65, no. 18, pp. 2065-2078, 2018.
[48]
M. Khurana, and H. Singh, “Asymmetric optical image triple masking encryption based on gyrator and fresnel transforms to remove
silhouette problem”, 3D Res., vol. 9, no. 38, 2018.
[49]
S. Aloka, "Nonlinear optical cryptosystem resistant to standard and hybrid attacks", Opt. Lasers Eng., vol. 81, pp. 79-86, 2016.
[50]
A.K. Yadav, S. Vashisth, H. Singh, and K. Singh, "A phase-image watermarking scheme in gyrator domain using devil’s vortex Fresnel lens as a phase mask", Opt. Commun., vol. 344, pp. 172-180, 2015.
[51]
"“Optical cryptosystem of color images using random
phase masks in the fractional wavelet transform domain” In", In: Conference Proceedings of AIP.vol. 1728, p. 020063-1/4, 2016,
[52]
P. Singh, A.K. Yadav, and K. Singh, "Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition", Opt. Lasers Eng., vol. 91, pp. 187-195, 2017.
[53]
H. Singh, "Optical cryptosystem of color images based on fractional-, wavelet transform domains using random phase masks", Indian J. Sci. Technol., vol. 9, no. 1, pp. 1-15, 2016. [S. Vashisth, H. Singh, A. K. Yadav and K. Singh, “Image encryption using fractional Mellin transform, structured phase].