Fig. 9From: Optical image encryption using gamma distribution phase masks in the gyrator domainRobustness test of the proposed method against Gaussian noise attack. a, b, c, d Gaussian-noised encrypted amplitude images with different parameters; e, f, g, h Gaussian-noised encrypted phase images with different parameters; i, j, k, l retrieved images with all the correct keys from encrypted amplitude and phase images from (a, e), (b, f), (c, g) and (d, h)Back to article page