[1] B. Javidi, "Optical and digital techniques for information security," Advanced Science and Technologies for Security Applications, Springer, New York, Volume 1, 2005.
[2] Y. Sheng, X. Yan-hui, and L. Ming-tang, Y.Shuia and S. Xin-juani, "An improved method to enhance the security of double random-phase encoding in the Fresnel domain," Optics & Laser Technology, Volume 44, pp. 51-56, 2012.
[3] W. He, X. Peng, and X. Meng, "A hybrid strategy for cryptanalysis of optical encryption based on double-random phase-amplitude encoding," Optics & Laser Technology, Volume 44, pp. 1203-1206, 2012.
[4] J. Sang, H. Xiang, N. Sang, and L. Fu, "Increasing the data hiding capacity and improving the security of a double-random phase encoding technique based information hiding scheme," Optics Communications, Volume 282, pp. 2713-2721, 2009.
[5] J. Sang, H. Xiang, L. Fu, and N. Sang, "Security analysis and improvement on a double-random phase encoding technique based information hiding method," Optics Communications, Volume 282, pp. 2307-2317, 2009.
[6] P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Optics Letters, Volume 20, pp. 767-769, 1995.
[7] G. Unnikrishnan, J. Joseph and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Optics Letters, Volume 25, pp. 887-889, 2000.
[8] G. Situ and J. Zhang, "A cascaded iterative Fourier transform algorithm for optical security application," Optik-International Journal for Light and Electron Optics, Volume 114, pp. 473-477, 2003.
[9] F. Mosso, M. Tebaldi, R. Torroba, and N. Bolognini, "Double random phase encoding method using a key code generated by affine transformation," Optik-International Journal for Light and Electron Optics, Volume 122, pp. 529-534, 2011.
[10] N. Singh and A. Sinhai, "digital image water- marking using gyrator transform and chaotic maps," Optik-International Journal for Light and Electron Optics, Volume 121, pp. 1427-1437, 2010.
[11] N. Singh and A. Sinhai, "optical image encryption using fractional Fourier transform and chaos," Optics and Lasers in Engineering, Volume 46, pp. 117-123, 2008.
[12] Z. Xin, L. Dong, Y. Sheng, L. Da-hai, and H. Jian-Ping, "A method for hiding information utilizing double random phase encoding technique," Optic and Laser Technology, Volume 39, pp. 1360-1363, 2007.
[13] X. Zhou and J. G. Chen, \Information hiding based on double-random phase encoding technology," Journal of Modern Optics, Volume 53, Number 12, pp. 1777-1783, 2006.
[14] H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, and X. X. Shen, "Image watermarking based on iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform domain," Optics Communications, Volume 278, pp. 257-263, 2007.
[15] Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-feng, "Information hiding based on double random-phase encoding and public-key cryptography," Optics Express, Volume 17, Number 5, pp. 3270-3284, 2009.
[16] W. Xing-yuan, L. Fan-ping and W. Shu-guo, "Fractal image compression based on spatial correlation and hybrid genetic algorithm," Journal of Visual Communication and Image Representation, Volume 20, pp. 505-510, 2009.
[17] M. Braverman, "Hyperbolic Julia Sets are Poly-Time Computable," Electronic Notes in Theoretical Computer Science, Volume 120, pp. 17-30, 2005.
[18] R. Valerij, "symmetry of the modified mandel-brot set," pi in the sky (9), pp. 20-21, 2005.
[19] http://www.eclectasy.com/Fractal-Explorer/
[20] Y Wang, K-W. Wong X. Liao, and G. Chen, "A chaos-based image encryption algorithm with variable control parameters," Chaos, Soliton and Fractals, Volume 41, Number 4, pp. 1773-1783, 2009.
[21] M. Taheri and S. Mozaffari, "A hybrid approach for double random phase encoding technique reinforcement," 20th Iranian Conference on Electrical Engineering, 2012.
[22] M. Taheri and S. Mozaffari, "Increasing security of double random phase encoding technique using chaos theory and hash function," 9th international isc conference on information security and cryptology, September 2012.
[23] J-B. Lee, H-H. Ko, and H-S. Koo, "Digital Image Encryption Method Using Interleaving and Random Shuffling," Proceedings of the 6th WSEAS international conference on Multimedia systems & signal processing, pp. 76-81, April 2006.