H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[CrossRef]
[PubMed]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035(2000).

[CrossRef]

B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28–30 (2000).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

B. Javidi, “Security information with optical technology,” Phys. Today 50(3), 27–32 (1997).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

M. Born and E. Wolf, Principles of Optics, 7th ed. (Cambridge University, 1999).

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[CrossRef]

H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004).

[CrossRef]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[CrossRef]

J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996).

S. Kishk and B. Javidi, “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28, 167–169(2003).

[CrossRef]
[PubMed]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital holograms for secure real-time display,” Opt. Lett. 27, 321–323 (2002).

[CrossRef]

S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470(2002).

[CrossRef]
[PubMed]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035(2000).

[CrossRef]

B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28–30 (2000).

[CrossRef]

B. Javidi, “Security information with optical technology,” Phys. Today 50(3), 27–32 (1997).

[CrossRef]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]
[PubMed]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[CrossRef]
[PubMed]

Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 8, 569–577 (2006).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[CrossRef]
[PubMed]

Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 8, 569–577 (2006).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]
[PubMed]

M. Born and E. Wolf, Principles of Optics, 7th ed. (Cambridge University, 1999).

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[CrossRef]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[CrossRef]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[CrossRef]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[CrossRef]
[PubMed]

Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 8, 569–577 (2006).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]
[PubMed]

Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 8, 569–577 (2006).

[CrossRef]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035(2000).

[CrossRef]

C. L. Mela and C. Iemmi, “Optical encryption using phase-shifting interferometry in a joint transform correlator,” Opt. Lett. 31, 2562–2564 (2006).

[CrossRef]
[PubMed]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[CrossRef]
[PubMed]

S. Kishk and B. Javidi, “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28, 167–169(2003).

[CrossRef]
[PubMed]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]
[PubMed]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital holograms for secure real-time display,” Opt. Lett. 27, 321–323 (2002).

[CrossRef]

B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28–30 (2000).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[CrossRef]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[CrossRef]
[PubMed]

H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004).

[CrossRef]

B. Javidi, “Security information with optical technology,” Phys. Today 50(3), 27–32 (1997).

[CrossRef]

J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996).

M. Born and E. Wolf, Principles of Optics, 7th ed. (Cambridge University, 1999).