“…In order to enhance the ability to resist some common attacks, DRPE has been applied in various domains, including Gyrator domain [ [5] , [6] , [7] ], Fresnel domain [ 8 , 9 ], fractional Fourier domain [ [10] , [11] , [12] ], and so on. Furthermore, various methods based on different kinds of optical theories and technologies, such as fractional Mellin transform [ 13 ], interference [ 14 , 15 ], transport of intensity equation [ 16 ], hologram [ 17 , 18 ], data container [ 19 ], iterative algorithm [ 20 , 21 ], photon-counting [ 22 ], monocular depth rendering [ 23 ], holography [ 24 ], image denoising [ 25 ], single-pixel imaging [ 26 ], and binary tree-sliced pattern [ 27 ], have been reported in recent years. Because a lot of optical parameters are used as secret keys, these methods has high security.…”