Abstract
This work reports an optical double-image crosstalk free encryption scheme that employs equal modulus decomposition and random masks. For the encryption, two plaintexts by a random amplitude mask and a random phase mask have been encrypted into a single ciphertext mask and two private key masks. Owing to the two random masks introduced, the functional relation between the plaintext pair and the ciphertext indirectly cause the paucity of constraints employed for the specific attack. Unlike the traditional phase-truncation-based techniques, this scheme is immune to the information leakage and different types of attacks. Furthermore, the three different diffraction distances and the illuminating wavelength also function as four additional keys to significantly reinforce the security. Simulation results demonstrate the feasibility and validity of the proposal.
Subject terms: Electrical and electronic engineering, Information technology
Introduction
Recently, optical techniques1–11 in image encryption have been intensely studied, owing to their inherent superiority with respect to multiple parameters and parallel processing. The pioneering work of optical image encryption is on double-random phase encoding (DRPE)12, which is done on the Fourier transform domain. Several works that followed have reported the expansion of initial DRPE work into different transform domains13–17, comprising the domains such as fractional Fourier transform (FrFT), Fresnel transform (FrT), and fractional random transform. During the period, other optical encryption works18–30 that employ compressive sensing, optical interference, iterative phase retrieval, digital holography, photon counting, and polarized light, have also emerged to improve the image security in succession.
However, owing to intrinsic linearity, DRPE-based structures cannot withstand several types of attacks31–34. Various nonlinear encryption methods have been proposed to overcome these weaknesses, and the best illustrative work is on phase-truncated Fourier transform by Qin and Peng35. Subsequently, there are several works based on phase truncation (PT) in FrT and FrFT domains36–39. Wang et al.40 showed that there is an information leakage in the work35 if one of two private keys are utilized, and hence, proposed a solution. They also pointed out the works36–39 being susceptible to information-leakage issue. Chen et al.41 developed a multi-image encryption scheme through feature fusion, compressed sensing, and PT. Yi and Tan42 presented a binary-tree multiple image encryption scheme. Su et al.43 proposed an optical encryption strategy for multiple color images through a complete trinary tree structure. Besides, the specific attack (SA)44, which employs an amplitude-phase-retrieval method, indicates that it can break the traditional PT-based technique35. Unfortunately, these techniques41–43 cannot be also an alternative to SA44. Additionally, the work45 has utilized the coherent superposition and equal modulus decomposition (EMD) to fully address the silhouette problem. However, there is the same modulus (i.e. same amplitude information) of two masks in EMD. The complex-valued masks cannot directly display in optical system. Chen et al.46 presented an optical image cryptosystem via two-beam coherent superposition and unequal amplitude decomposition for security improvement. However, unequal amplitude decomposition requires an additional random phase distribution than EMD. Thus, constantly improving the security of encryption scheme based on PT, despite the progress in the field, is still inevitable.
This study presents a double-image crosstalk free encryption scheme. The scheme, which works by utilizing the equal modulus decomposition and random masks, generates a single ciphertext mask and two private key masks. The random masks have been introduced to bring the indirect mathematical relation between the plaintext pair and the ciphertext, where an illegal user has insufficient constraints utilized for SA. Compared with certain PT-based works35–39, the proposal eliminates information leakage. When compared with other existing PT-based work41–43, the proposal is still effective against SA. The additional keys, which comprise the three different diffraction distances and the illuminating wavelength, can strengthen the security. Simulation results and performance analysis demonstrate the reliability and validity of the proposal.
Principle of the method
The diagram of the proposed double-image cryptosystem is depicted as Fig. 1. The random amplitude mask (RAM) and a random phase mask (RPM) have been described with respect to the encryption (Fig. 1a) and decryption (Fig. 1b). The encryption keys have been generated from the random masks RAM and RPM by applying EMD in the Fresnel domain. Figure 2 shows the optical relationship between RAM, , and . In this setup, a collimated plane wave with the wavelength λ, perpendicularly illuminates RAM and the image which is subsequently Fresnel transformed with the diffraction distance d1. The first spatial light modulator (SLM1) were employed for amplitude modulation. SLM2 and SLM3 were utilized for phase modulation.
Figure 1.
Schematic diagram for the proposed (a) encryption and (b) decryption.
Figure 2.
Optical relationship between RAM and S1, S2. M reflective mirrors.
In the proposed double-image encryption process, and are the random functions, whose values fall in the interval [0, 1]. The following encryption steps have been depicted.
First, the RAM denoted as was Fresnel transformed given by Eq. (1).
| 1 |
where is the FrT operator, and d1 and λ are the diffraction distance and the wavelength, respectively. The amplitude part and the phase part of S are represented as and , respectively, and “” and “” are the modulus and argument operators, respectively.
Subsequently, the complex-valued function S was separated into two masks, viz, S1 and S2, with equal moduli, as illustrated in Fig. 3. Owing to the random phase distribution RPM (denoted as, ) introduced, and the geometrical relationship, and can be deduced as
| 2 |
| 3 |
| 4 |
Figure 3.

Principle of EMD.
The phase parts of and serve as the encryption keys.
Next, a new complex-value function was constructed by the two original images, viz., ( and ), and RAM, as follows
| 5 |
where are the constants.
Then, by employing the encryption keys obtained in the above-mentioned step, the function was encrypted based on PT in the Fresnel domain. Thus, the ciphertext can be expressed as
| 6 |
where d2 and d3 are the diffraction distances. Meanwhile, two decryption keys, viz., and , generated are given by
| 7 |
| 8 |
where “” is the complex conjugate operator, the phase reservation operator.
For the decryption, the retrieved function by the authorized users can be derived as,
| 9 |
After obtaining the , two retrieved images, and , are mathematically represented as,
| 10 |
| 11 |
Figure 4 illustrates the optical schematic apparatus for decryption. A light beam carrying the information of ciphertext E was modulated by SLM1. SLM1 and SLM2 are being employed for phase modulation. CCD captures the intensity part of . The phase part of is digitally acquired. Then two decrypted images, viz., and , are digitally acquired with the function .
Figure 4.

Optical schematic system for decryption.
Numerical results and performance analysis
To demonstrate the validity and the advantages of the proposal, numerical simulations have been implemented. In those simulations, the illumination wavelength λ is 633 nm, and the three axial distances, viz., d1, d2, and d3, are 60, 50, and 70 mm, respectively, and the parameters k1, k2, and k3 are set as 0.6, 0.5, and 1.5, respectively. Furthermore, the correlation coefficient (CC) was utilized to objectively assess the similarity between the plaintext (k = 1, 2) and its corresponding decrypted image as
| 12 |
For convenience of the analysis, the CC values were directly labelled in the recovered images.
Figure 5a, b show two original images having 512 × 512 pixels, which are employed as the two plaintexts. The two random masks, RAM and RPM, are shown in Fig. 5c, d. By employing RAM, RPM, and EMD, the encryption keys (Fig. 5e, f) are acquired. The ciphertext and decrypted keys, after conducting the proposed encryption process, are displayed in Fig. 5g–i, respectively. Finally, the decrypted images acquired by using all the correct keys are shown in Fig. 5j, k. These results signify that each decrypted image and its corresponding plaintext are completely equal, or the influence of crosstalk noise is non-existent. Thus, the proposal is feasible and effective, and can retrieve the high-quality images without the crosstalk noise.
Figure 5.
(a, b) The two plaintexts, (c) RAM, (d) RPM, (e, f) the two encryption keys, (g) the ciphertext E, (h) DK1, (i) DK2, (j, k) the two decrypted images.
To evaluate the information-leakage-free of the proposal, Fig. 6a–f show the decrypted images with releasing of E, DK1, and DK2. Figure 7a–f illustrate the decrypted images when two of these masks are utilized. According to Figs. 6 and 7, each of all the decrypted images has the noise-like distribution, where no useful information of the two plaintexts appears. We illustrated that the information-leakage issue has been thoroughly settled in the proposal.
Figure 6.
Decrypted images with (a, b) E, (c, d) DK1, and (e, f) DK2.
Figure 7.
Decrypted images with (a, b) E and DK1, (c, d) E and DK2, and (e, f) DK1 and DK2.
We have further validated the sensitivity of the proposal for the additional keys, i.e., the three diffraction distances d1, d2, and d3, and the illuminating wavelength λ. Figures 8, 9, 10 and 11 illustrate the sensitive results of those keys, where the deviation ranges of those keys are [− 50 50]. These results invariably reveal that the CC values are one, only when the deviation is equal to zero. And for other values of the deviation, the CC values are below or equal to 0.0863. Moreover, when the deviations are − 1 and 1, all the decrypted images have no useful content of the two plaintexts. Therefore, the proposal has four sensitive additional keys, which can further reinforce the security of the proposal.
Figure 8.

Relation curves of the CC value versus Δd1, where the decrypted images using Δd1 of (a, b) − 1, and (c, d) 1.
Figure 9.

Relation curves of the CC value versus Δd2, where the decrypted images using Δd2 of (a, b) − 1, and (c, d) 1.
Figure 10.

Relation curves of the CC value versus Δd3, in which decrypted images using Δd3 of (a, b) − 1, and (c, d) 1.
Figure 11.

Relation curves of the CC value versus Δλ, in which decrypted images using Δλ of (a, b) − 1, and (c, d) 1.
To further demonstrate the robustness of the proposal against noise and occlusion attacks, Fig. 12 illustrates the decrypted results when the ciphertext is contaminated by the zero-mean white additive Gaussian noise with and . Figure 13 represents the decrypted results acquired from the ciphertexts with 3% and 5% occlusion. According to Figs. 12 and 13, the quality of the decrypted images steadily worsens with the increase of the noise or occlusion strength. Although the content of those images becomes blurred for noise or 5% occlusion, the main-structure information can be still distinguished. Hence, it is verified for these results that the proposal has the resistance to noise and occlusion attacks.
Figure 12.
Decrypted images with Gaussian noise with (a, b) , (c, d) .
Figure 13.

(a) Ciphertext with 3% occlusion, (b, c) decrypted images of (a, d) ciphertext with 5% occlusion, (e, f) decrypted images of (d).
Furthermore, we have proved the validity of the proposal against known-plaintext attack (KPA). The decryption keys of our scheme varies with the different plaintext pair. In the KPA simulation, Fig. 5a, b, g serve as a known plaintext pair and their corresponding ciphertext. Using the proposal, RAM (Fig. 5c) and RPM (Fig. 5d) encrypt the plaintext pair in Fig. 5a, b, and the private keys in Fig. 5h, i are generated. Figure 14a, b demonstrate the other plaintext pair. Figure 14c illustrates the ciphertext of Fig. 14a, b, which were produced by the proposal, RAM′ and RPM′. RAM and RPM are different from RAM′ and RPM′, respectively. When all the correct parameters, viz., RAM (Fig. 5c), RPM (Fig. 5d), and the private keys (Fig. 5h, i) are used, the two retrieved results of Fig. 14c are shown in Fig. 14d, e. For better explaining the security of this scheme, we have retrieved Fig. 14c in the other two cases in which we suppose that the attacker has known one out of RAM′ and RPM′. Figure 14f, g demonstrate the results of Fig. 14c with RPM′, , , and for the other abovementioned conditions. Figure 14h, i illustrate the results of Fig. 14c using RAM′, , , and the other conditions mentioned above. The information of Fig. 14a, b cannot be deciphered from Fig. 14d–i. Hence, the proposal is immune to KPA.
Figure 14.

(a, b) the other plaintext pair, (c) ciphertext of (a, b) with RPM' and RAM', retrieved images of (c) using (d, e) RAM, RPM, DK1, DK2, (f, g) RAM, RPM', , , and (h, i) RAM', RPM, , .
Finally, we have also demonstrated that the proposal can resist SA44. SA is a single iteration process, which stem from the modified amplitude-phase retrieval algorithm. The results of SA with two unknown masks, viz., RAM and RPM, are illustrated in Fig. 15a–c. Moreover, the results of SA, when the knowledge of one of RAM and RPM is lacking, are illustrated in Fig. 15d–i. Figure 16 shows the results of SA using Qin and Peng’s scheme35. It is shown in Fig. 15a, d, g, that the six curves are unstable and non-convergent. According to Fig. 15b, c, e, f, h, i, no information can be deciphered of the two plaintexts (Fig. 15a, b). Therefore, we have shown that the proposal can effectively resist SA.
Figure 15.
Results of SA using our proposal: the CC value versus number of iterations with (a) two unknown masks (RAM and RPM), (d) unknown RPM, and (g) unknown RAM, respectively; the recovered images after 200 iterations with (b, c) two unknown masks (RAM and RPM), (e, f) unknown RPM, and (h, i) unknown RAM, respectviely.
Figure 16.
Results of SA using Qin and Peng’s scheme: (a) the CC value versus number of iterations, and (b, c) recovered images after 200 iterations.
Concluding remarks
An optical phase-truncation-based double-image encryption was developed using the equal modulus decomposition and random masks. The proposal utilizes RAM and RPM to generate a single ciphertext and two private keys. This scheme is novel, and acquires the decrypted images immune to the crosstalk noise. Particularly, the random masks cause insufficient constraints to be utilized for SA. Our proposal, when compared with the reported techniques via PT, has no problem of information leakage, and can efficiently resist different types of attacks. Furthermore, the four parameters serve as additional keys for enhancing the security. Numerical simulation results validate the advantages of the proposal.
Acknowledgements
This study is supported by Science and Technology Planning Project of Daqing City of China (zd-2023-60), China Scholarship Council (202208230113), Basic Cultivation Project of Heilongjiang Bayi Agricultural University (ZRCPY202315), and Education Department Foundation of Heilongjiang Province of China (12541584).
Author contributions
G.L. conceived idea, performed programming and numerical analysis, and wrote manuscript. C.Q. reviewed the manuscript.
Data availability
Data are available from the corresponding author upon reasonable request.
Competing interests
The authors declare no competing interests.
Footnotes
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Alfalou A, Brosseau C. Optical image compression and encryption methods. Adv. Opt. Photonics. 2009;1(3):589–636. doi: 10.1364/AOP.1.000589. [DOI] [Google Scholar]
- 2.Chen W, Javidi B, Chen XD. Advances in optical security systems. Adv. Opt. Photonics. 2014;6(2):120–155. doi: 10.1364/AOP.6.000120. [DOI] [Google Scholar]
- 3.Javidi B, et al. Roadmap on optical security. J. Opt. 2016;18(8):083001. doi: 10.1088/2040-8978/18/8/083001. [DOI] [Google Scholar]
- 4.Shikder A, Nishchal NK. Image encryption using binary polarization states of light beam. Sci. Rep. 2023;13:14028. doi: 10.1038/s41598-023-41251-w. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 5.Abuturab MR. Multiple color image cryptosystem based on coupled-logistic-map-biometric keys, QR decomposition with column pivoting and optical Fresnel transform. Opt. Laser Technol. 2023;161:109109. doi: 10.1016/j.optlastec.2023.109109. [DOI] [Google Scholar]
- 6.Wang XG, Chen W, Chen XD. Optical encryption and authentication based on phase retrieval and sparsity constraints. IEEE Photonics J. 2015;7(2):7800310. doi: 10.1109/JPHOT.2015.2412936. [DOI] [Google Scholar]
- 7.Sui LS, Zhang LW, Wang Q, Tian AL, Anand A. Multiple-image authentication based on the single-pixel correlated imaging and multiple-level wavelet transform. Opt. Lasers Eng. 2020;130:106102. doi: 10.1016/j.optlaseng.2020.106102. [DOI] [Google Scholar]
- 8.Wei HY, Wang XG. Optical multiple-image authentication and encryption based on phase retrieval and interference with sparsity constraints. Opt. Laser Technol. 2021;142:107257. doi: 10.1016/j.optlastec.2021.107257. [DOI] [Google Scholar]
- 9.Sui LS, Zhao XY, Huang CT, Tian AL, Anand A. An optical multiple-image authentication based on transport of intensity equation. Opt. Lasers Eng. 2019;116:116–124. doi: 10.1016/j.optlaseng.2019.01.006. [DOI] [Google Scholar]
- 10.Qin Y, Jiang HL, Gong Q. Interference-based multiple-image encryption by phase-only mask multiplexing with high quality retrieved images. Opt. Lasers Eng. 2014;62:95–102. doi: 10.1016/j.optlaseng.2014.05.010. [DOI] [Google Scholar]
- 11.Luan GY, Li AC, Zhang DM, Wang DX. Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain. IEEE Photonics J. 2019;11(1):6900207. doi: 10.1109/JPHOT.2018.2886295. [DOI] [Google Scholar]
- 12.Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995;20(7):767–769. doi: 10.1364/OL.20.000767. [DOI] [PubMed] [Google Scholar]
- 13.Li YB, Zhang F, Li YC, Tao R. Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform. Opt. Lasers Eng. 2015;72:18–25. doi: 10.1016/j.optlaseng.2015.03.027. [DOI] [Google Scholar]
- 14.Sui LS, Duan KK, Liang JL, Hei XH. Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps. Opt. Express. 2014;22(9):10605–10621. doi: 10.1364/OE.22.010605. [DOI] [PubMed] [Google Scholar]
- 15.Chen JX, et al. A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. Opt. Express. 2014;22(6):7349–7361. doi: 10.1364/OE.22.007349. [DOI] [PubMed] [Google Scholar]
- 16.Wang XG, Chen W, Chen XD. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding. Opt. Express. 2014;22(19):22981–22995. doi: 10.1364/OE.22.022981. [DOI] [PubMed] [Google Scholar]
- 17.Xu HF, Xu WH, Wang SH, Wu SF. Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain. Opt. Commun. 2017;402:302–310. doi: 10.1016/j.optcom.2017.05.035. [DOI] [Google Scholar]
- 18.Zhang Y, Wang B. Optical image encryption based on interference. Opt. Lett. 2008;33(21):2443–2445. doi: 10.1364/OL.33.002443. [DOI] [PubMed] [Google Scholar]
- 19.Perez-Cabre E, Cho MJ, Javidi B. Information authentication using photon-counting double-random-phase encrypted images. Opt. Lett. 2011;36(1):22–24. doi: 10.1364/OL.36.000022. [DOI] [PubMed] [Google Scholar]
- 20.Maluenda D, Carnicer A, Martinez-Herrero R, Juvells I, Javidi B. Optical encryption using photon-counting polarimetric imaging. Opt. Express. 2015;23(2):655–666. doi: 10.1364/OE.23.000655. [DOI] [PubMed] [Google Scholar]
- 21.Chen LF, Chang GJ, He BY, Mao HD, Zhao DM. Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt. Lasers Eng. 2017;88:221–232. doi: 10.1016/j.optlaseng.2016.08.013. [DOI] [Google Scholar]
- 22.Li XW, Xiao D, Wang QH. Error-free holographic frames encryption with CA pixel-permutation encoding algorithm. Opt. Lasers Eng. 2018;100:200–207. doi: 10.1016/j.optlaseng.2017.08.018. [DOI] [Google Scholar]
- 23.Carnicer A, Hassanfiroozi A, Latorre-Carmona P, Huang YP, Javidi B. Security authentication using phase-encoded nanoparticle structures and polarized light. Opt. Lett. 2015;40(2):135–138. doi: 10.1364/OL.40.000135. [DOI] [PubMed] [Google Scholar]
- 24.Rawat N, Hwang IC, Shi Y, Lee BG. Optical image encryption via photon-counting imaging and compressive sensing based ptychography. J. Opt. 2015;17(6):065704. doi: 10.1088/2040-8978/17/6/065704. [DOI] [Google Scholar]
- 25.Fatima A, Nishchal NK. Optical image security using Stokes polarimetry of spatially variant polarized beam. Opt. Commun. 2018;417:30–36. doi: 10.1016/j.optcom.2018.02.030. [DOI] [Google Scholar]
- 26.Wang Y, Quan C, Tay CJ. Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm. Opt. Lasers Eng. 2016;78:8–16. doi: 10.1016/j.optlaseng.2015.09.008. [DOI] [Google Scholar]
- 27.Moon I, Yi F, Han M, Lee J. Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms. Appl. Opt. 2016;55(16):4328–4335. doi: 10.1364/AO.55.004328. [DOI] [PubMed] [Google Scholar]
- 28.Chen Y, Liu Q, Wang J, Wang QH. Single-channel optical encryption of color image using chessboard grating and diffraction imaging scheme. Opt. Eng. 2017;56(12):123106. doi: 10.1117/1.OE.56.12.123106. [DOI] [Google Scholar]
- 29.Su YG, et al. Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt. Lasers Eng. 2017;88:20–27. doi: 10.1016/j.optlaseng.2016.07.012. [DOI] [Google Scholar]
- 30.Qin Y, Wang ZP, Wang HJ, Gong Q, Zhou NR. Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container. Opt. Lasers Eng. 2018;105:118–124. doi: 10.1016/j.optlaseng.2018.01.014. [DOI] [Google Scholar]
- 31.Gopinathan U, Monaghan DS, Naughton TJ, Sheridan JT. A known-plaintext heuristic attack on the Fourier plane encryption algorithm. Opt. Express. 2006;14(8):3181–3186. doi: 10.1364/OE.14.003181. [DOI] [PubMed] [Google Scholar]
- 32.Peng X, Zhang P, Wei HZ, Yu B. Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 2006;31(8):1044–1046. doi: 10.1364/OL.31.001044. [DOI] [PubMed] [Google Scholar]
- 33.Tashima H, et al. Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack. Opt. Express. 2010;18(13):13772–13781. doi: 10.1364/OE.18.013772. [DOI] [PubMed] [Google Scholar]
- 34.Zhang YS, Xiao D, Wen WY, Liu H. Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding. Opt. Lett. 2013;38(21):4506–4509. doi: 10.1364/OL.38.004506. [DOI] [PubMed] [Google Scholar]
- 35.Qin W, Peng X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 2010;35(2):118–120. doi: 10.1364/OL.35.000118. [DOI] [PubMed] [Google Scholar]
- 36.Chen W, Chen XD. Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain. Opt. Commun. 2011;284(16–17):3913–3917. doi: 10.1016/j.optcom.2011.04.005. [DOI] [Google Scholar]
- 37.Rajput SK, Nishchal NK. Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. Appl. Opt. 2012;51(22):5377–5386. doi: 10.1364/AO.51.005377. [DOI] [PubMed] [Google Scholar]
- 38.Rajput SK, Nishchal NK. Image encryption based on interference that uses fractional Fourier domain asymmetric keys. Appl. Opt. 2012;51(10):1446–1452. doi: 10.1364/AO.51.001446. [DOI] [PubMed] [Google Scholar]
- 39.Mehra I, Rajput SK, Nishchal NK. Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification. Opt. Eng. 2013;52(2):028202. doi: 10.1117/1.OE.52.2.028202. [DOI] [Google Scholar]
- 40.Wang XG, Zhao DM, Chen YX. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask. Appl. Opt. 2014;53(23):5100–5108. doi: 10.1364/AO.53.005100. [DOI] [PubMed] [Google Scholar]
- 41.Chen XD, Liu Q, Wang J, Wang QH. Asymmetric encryption of multi-image based on compressed sensing and feature fusion with high quality image reconstruction. Opt. Laser Technol. 2018;107:302–312. doi: 10.1016/j.optlastec.2018.06.016. [DOI] [Google Scholar]
- 42.Yi JW, Tan GZ. Binary-tree encryption strategy for optical multiple-image encryption. Appl. Opt. 2016;55(20):5280–5291. doi: 10.1364/AO.55.005280. [DOI] [PubMed] [Google Scholar]
- 43.Su YG, et al. Optical encryption scheme for multiple color images using complete trinary tree structure. Opt. Lasers Eng. 2017;98:46–55. doi: 10.1016/j.optlaseng.2017.05.019. [DOI] [Google Scholar]
- 44.Wang XG, Chen YX, Dai CQ, Zhao DM. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl. Opt. 2014;53(2):208–213. doi: 10.1364/AO.53.000208. [DOI] [PubMed] [Google Scholar]
- 45.Cai J, Shen X, Lei M, Lin C, Dou S. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt. Lett. 2015;40(4):475–478. doi: 10.1364/OL.40.000475. [DOI] [PubMed] [Google Scholar]
- 46.Chen LF, Gao X, Chen XD, He BY, Liu JY, Li D. A new optical image cryptosystem based on two-beam coherent superposition and unequal modulus decomposition. Opt. Laser Technol. 2016;78:167–174. doi: 10.1016/j.optlastec.2015.11.009. [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Data are available from the corresponding author upon reasonable request.








