[1] Refregier P, Javidi B. Optical image encryption using input 排plane and Fourier plane random encoding [J]. Optics Letters, 1995, 20(7): 767−769. doi:  10.1364/OL.20.000767
[2] François Goudail, Bollaro F, Javidi B, et al. Influence of a perturbation in a double phase-encoding system [J]. J Opt Soc Am A, 1998, 15(10): 2629−2638. doi:  10.1364/JOSAA.15.002629
[3] Hennelly B, Sheridan J T. Optical image encryption by random shifting in fractional Fourier domains [J]. Optics Letters, 2003, 28(4): 269−271. doi:  10.1364/OL.28.000269
[4] Unnikrishnan G, Joseph J, Singh K. Optical encryption by double-random phase encoding in the fractional Fourier domain [J]. Optics Letters, 2000, 25(12): 887−889. doi:  10.1364/OL.25.000887
[5] Hennelly B M, Sheridan J T. Random phase and jigsaw encryption in the Fresnel domain [J]. Optical Engineering, 2004, 43(10): 2239−2249. doi:  10.1117/1.1790502
[6] Situ G, Pedrini G, Osten W. Strategy for cryptanalysis of optical encryption in the Fresnel domain [J]. Applied Optics, 2010, 49(3): 457−462. doi:  10.1364/AO.49.000457
[7] Xu L, Ahmad M A, Guo Q, et al. Double image encryption by using iterative random binary encoding in gyrator domains [J]. Optics Express, 2010, 18(11): 12033−12043. doi:  10.1364/OE.18.012033
[8] Singh H, Yadav A K, Vashisth S, et al. Fully phase image encryption using double random-structured phase masks in gyrator domain [J]. Appl Opt, 2014, 53(28): 6472−6481. doi:  10.1364/AO.53.006472
[9] Zhou N, Li H, Di W, et al. Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform [J]. Optics Communications, 2015, 343: 10−21. doi:  10.1016/j.optcom.2014.12.084
[10] Zhou N, Wang Y, Gong L. Novel optical image encryption scheme based on fractional Mellin transform [J]. Optics Communications, 2011, 284(13): 3234−3242. doi:  10.1016/j.optcom.2011.02.065
[11] Zafari M, Kheradmand R, Ahmadikandjani S. Optical encryption with selective computational ghost imaging [J]. Journal of Optics, 2014, 16(10): 105405. doi:  10.1088/2040-8978/16/10/105405
[12] Clemente P, Durán V, Torrescompany V, et al. Optical encryption based on computational ghost imaging [J]. Optics Letters, 2010, 35(14): 2391−2393. doi:  10.1364/OL.35.002391
[13] Hua Lili, Xu Ning, Yang Geng. An encryption scheme based on phase-shifting digital holography and amplitude-phase disturbance [J]. Chinese Physics B, 2014, 23(6): 206−211.
[14] Javidi B, Nomura T. Securing information by use of digital holography [J]. Optics Letters, 2000, 25(1): 28−30. doi:  10.1364/OL.25.000028
[15] Zang J, Xie Z, Zhang Y. Optical image encryption with spatially incoherent illumination [J]. Optics Letters, 2013, 38(8): 1289−12891. doi:  10.1364/OL.38.001289
[16] Wang Q, Xiong D, Alfalou A, et al. Optical image encryption method based on incoherent imaging and polarized light encoding [J]. Optics Communications, 2018, 415: 56−63. doi:  10.1016/j.optcom.2018.01.018
[17] Yuan S, Yao J, Liu X, et al. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging [J]. Optics Communications, 2016, 365: 180−185. doi:  10.1016/j.optcom.2015.12.013
[18] Cheremkhin P A, Evtikhiev N N, Rodin V G, et al. Method of attack on schemes of optical encryption with spatially incoherent illumination[C]//Electro-Optical and Infrared Systems: Technology and Applications, 2017.
[19] Carnicer A, Montes-Usategui M, Arcos S, et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J]. Optics Letters, 2005, 30(13): 1644−1646. doi:  10.1364/OL.30.001644
[20] Peng X, Wei H, Zhang P. Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain [J]. Optics Letters, 2006, 31(22): 3261−3263. doi:  10.1364/OL.31.003261
[21] Peng X, Zhang P, Wei H, et al. Known-plaintext attack on optical encryption based on double random phase keys [J]. Optics Letters, 2006, 31(8): 1044−1046. doi:  10.1364/OL.31.001044
[22] Liao M, He W, Lu D, et al. Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium [J]. Scientific Reports, 2017(7): 41789. doi:  10.1038/srep41789
[23] Zhang C, Liao M, He W, et al. Ciphertext-only attack on a joint transform correlator encryption system [J]. Optics Express, 2013, 21(23): 28523−28530. doi:  10.1364/OE.21.028523
[24] Liu X, Wu J, He W, et al. Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding [J]. Optics Express, 2015, 23(15): 18955−18968. doi:  10.1364/OE.23.018955
[25] Qin W, Peng X. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Optics Letters, 2010, 35(2): 118−120. doi:  10.1364/OL.35.000118
[26] Dai C, Zhao D, Wang X, et al. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform [J]. Applied Optics, 2014, 53(2): 208−213. doi:  10.1364/AO.53.000208
[27] Wang Y, Quan C, Tay C J. Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform [J]. Applied Optics, 2015, 54(22): 6874−6881. doi:  10.1364/AO.54.006874
[28] 侯俊峰, 黄素娟, 司徒国海. 非线性光学图像加密[J]. 光学学报, 2015, 35(8): 0807001.

Hou Junfeng, Huang Sujuan, Situ Guohai. Nonlinear optical image encryption [J]. Acta Optica Sinica, 2015, 35(8): 0807001. (in Chinese)
[29] 陈翼翔, 汪小刚. 一种基于迭代振幅-相位恢复算法和非线性双随机相位编码的图像加密方法[J]. 光学学报, 2014, 34(8): 119−124.

Chen Yixiang, Wang Xiaogang. Image encryption based on iterative amplitude-phase rretrieval and nonlinear double random phase encoding [J]. Acta Optica Sinica, 2014, 34(8): 119−124. (in Chinese)
[30] Wang Y, Quan C, Tay C J. Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask [J]. Optics Communications, 2015, 344: 147−155. doi:  10.1016/j.optcom.2015.01.045
[31] Yadav P L, Singh H. Enhancement of security using structured phase masked in optical image encryption on Fresnel transform domain[C]//2nd International Conference On Condensed Matter And Applied Physics (ICC 2017), 2018.
[32] 姚丽莉, 袁操今, 强俊杰, 等. 基于gyrator变换和矢量分解的非对称图像加密方法[J]. 物理学报, 2016, 65(21): 214203. doi:  10.7498/aps.65.210201

Yao Lili , Yuan Caojin, Qiang Junjie, et al. Asymmetric image encryption method based on gyrator transform and vector operation [J]. Acta Physica Sinica, 2016, 65(21): 214203. (in Chinese) doi:  10.7498/aps.65.210201
[33] Khurana M, Singh H. An asymmetric image encryption based on phase truncated hybrid Transform [J]. 3D Research, 2017, 8(3): 28. doi:  10.1007/s13319-017-0137-8
[34] Rajput S K, Nishchal N K. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform [J]. Applied Optics, 2013, 52(4): 871. doi:  10.1364/AO.52.000871