“…Encrypted images, digital holograms, and full phase images have been used in the watermarking scheme to enhance the security of contents [4,[38][39][40][41][42][43]. Various watermarking schemes with different architectures have been reported in the literature, such as digital watermarking using GT, FRT, computational ghost imaging, joint FrT correlator, DCT, among others [44][45][46][47][48][49][50].…”