H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[Crossref]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[Crossref]
[PubMed]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28–30 (2000).

[Crossref]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035(2000).

[Crossref]

M. Born and E. Wolf, Principles of Optics, 7th ed. (Cambridge University, 1999).

B. Javidi, “Security information with optical technology,” Phys. Today 50(3), 27–32 (1997).

[Crossref]

J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996).

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

M. Born and E. Wolf, Principles of Optics, 7th ed. (Cambridge University, 1999).

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[Crossref]

H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004).

[Crossref]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[Crossref]

J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996).

S. Kishk and B. Javidi, “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28, 167–169(2003).

[Crossref]
[PubMed]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital holograms for secure real-time display,” Opt. Lett. 27, 321–323 (2002).

[Crossref]

S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470(2002).

[Crossref]
[PubMed]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035(2000).

[Crossref]

B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28–30 (2000).

[Crossref]

B. Javidi, “Security information with optical technology,” Phys. Today 50(3), 27–32 (1997).

[Crossref]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]
[PubMed]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[Crossref]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[Crossref]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[Crossref]
[PubMed]

Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 8, 569–577 (2006).

[Crossref]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[Crossref]
[PubMed]

Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 8, 569–577 (2006).

[Crossref]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]
[PubMed]

M. Born and E. Wolf, Principles of Optics, 7th ed. (Cambridge University, 1999).

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[Crossref]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[Crossref]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[Crossref]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[Crossref]
[PubMed]

Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 8, 569–577 (2006).

[Crossref]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]
[PubMed]

Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 8, 569–577 (2006).

[Crossref]

H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007).

[Crossref]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035(2000).

[Crossref]

Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007).

[Crossref]
[PubMed]

C. L. Mela and C. Iemmi, “Optical encryption using phase-shifting interferometry in a joint transform correlator,” Opt. Lett. 31, 2562–2564 (2006).

[Crossref]
[PubMed]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital holograms for secure real-time display,” Opt. Lett. 27, 321–323 (2002).

[Crossref]

S. Kishk and B. Javidi, “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28, 167–169(2003).

[Crossref]
[PubMed]

P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

[Crossref]
[PubMed]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).

[Crossref]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]
[PubMed]

B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28–30 (2000).

[Crossref]

H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004).

[Crossref]

B. Javidi, “Security information with optical technology,” Phys. Today 50(3), 27–32 (1997).

[Crossref]

J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996).

M. Born and E. Wolf, Principles of Optics, 7th ed. (Cambridge University, 1999).