A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[CrossRef]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[CrossRef]

M. Joshi, Chandrashakher K. Singh, “Color image encryption and decryption for
twin images in fractional Fourier domain,” Opt.
Commun. 281, 5713–5720 (2008).

[CrossRef]

M. Nazrul Islam and M. S. Alam, “Optical security system employing shifted
phase-encoded joint transform correlation,” Opt.
Commun. 281, 248–254 (2008).

[CrossRef]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[CrossRef]

R. Tao, Y. Xin, and Y. Yang, “Double image encryption based on random
phase encoding in the fractional Fourier domain,” Opt. Express 15, 16067–16079 (2007).

[CrossRef]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[CrossRef]

S. Yuan, X. Zhou, D.-H. Li, and D.-F. Zhou, “Simultaneous transmission for an encrypted
image and a double random-phase encryption key,” Appl. Opt. 46, 3747–3753 (2007).

[CrossRef]

X. Wang and Y. Chen, “Securing information using digital
optics,” J. Opt. A Pure Appl. Opt. 9, 152–155 (2007).

[CrossRef]

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[CrossRef]

M. Joshia, Chandrashakherb K. Singh, “Color image encryption and decryption using
fractional Fourier transform,” Opt.
Commun. 279, 34–42 (2007).

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[CrossRef]

A. Alfalou and A. Mansour, “All-optical video-image encryption with
enforced security level using independent component
analysis,” J. Opt. A Pure Appl. Opt. 9, 787–796 (2007).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[CrossRef]

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[CrossRef]

B. Tavakoli, M. Daneshpanah, B. Javidi, and E. Watson, “Performance of 3D integral imaging with
position uncertainty,” Opt. Express 15, 11889–11902 (2007).

[CrossRef]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[CrossRef]

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[CrossRef]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[CrossRef]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[CrossRef]

E. Darakis and J. J. Soraghan, “Reconstruction domain compression of
phase-shifting digital holograms,” Appl.
Opt. 46, 351–356 (2007).

[CrossRef]

E. Darakis and J. J. Soraghan, “Compression of interference patterns with
application to phase-shifting digital holography,” Appl. Opt. 45, 2437–2443 (2006).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[CrossRef]

E. Darakis and J. J. Soraghan, “Compression of phase-shifting digital
holography interference patterns,” Proc.
SPIE 6187, 61870Y (2006).

[CrossRef]

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[CrossRef]

Feature issue on Task Specific Sensing, Appl. Opt. 45, 2857–3070 (2006).

C. Kohler, X. Schwab, and W. Osten, “Optimally tuned spatial light modulators for
digital holography,” Appl. Opt. 45, 960–967 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[CrossRef]

Z. Xin, Y. S. Wei, and X. Jian, “Affine cryptosystem of double-random-phase
encryption based on the fractional Fourier transform,” Appl. Opt. 45, 8434–8439 (2006).

[CrossRef]

D. Abookasis, A. Batikoff, H. Famini, and J. Rosen, “Performance comparison of iterative
algorithms for generating digital correlation holograms used in optical security
systems,” Appl. Opt. 45, 4617–4624 (2006).

[CrossRef]

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption
based on double random phase keys,” Opt.
Lett. 31, 1044–1046 (2006).

[CrossRef]

L. Chen and D. Zhao, “Optical color image encryption by wavelength
multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[CrossRef]

I. Yamaguchi, K. Yamamoto, G. A. Mills, and M. Yokota, “Image reconstruction only by phase data in
phase-shifting digital holography,” Appl.
Opt. 45, 975–983 (2006).

[CrossRef]

G. A. Mills and I. Yamaguchi, “Effects of quantization in phase-shifting
digital holography,” Appl. Opt. 44, 1216–1225 (2005).

[CrossRef]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and
deciphered by a modified joint-transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]

H. T. Chang and C. L. Tsan, “Image watermarking by use of digital
holography embedded in the discrete-cosine-transform
domain,” Appl. Opt. 44, 6211–6219 (2005).

[CrossRef]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks
of optical encryption schemes based on double random phase
keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[CrossRef]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[CrossRef]

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[CrossRef]

T. W. Ng and K. T. Ang, “Fourier-transform method of data compres
sion and temporal fringe pattern analysis,” Appl.
Opt. 44, 7043–7049 (2005).

[CrossRef]

S. L. Wijaya, M. Savvides, and B. V. K. Vijaya Kumar, “Illumination-tolerant face verification of
low-bit-rate JPEG2000 wavelet images with advanced correlation filters for
handheld devices,” Appl. Opt. 44, 655–665 (2005).

[CrossRef]

A. Alfalou and A. Alkholidi, “Implementation of an all-optical image
compression architecture based on Fourier transform which will be the core
principle in the realisation of DCT,” Proc.
SPIE 5823, 183–190 (2005).

[CrossRef]

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[CrossRef]

S. Yeom, A. Stern, and B. Javidi, “Compression of 3D color integral
images,” Opt. Express 12, 1632–1642 (2004).

[CrossRef]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel
domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

A. Zlotnik, Z. Zalevsky, and E. Marom, “Optical encryption by using a synthesized
mutual intensity function,” Appl. Opt. 43, 3456–3465 (2004).

[CrossRef]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[CrossRef]

J. C. Dagher, M. W. Marcellin, and M. A. Neifeld, “Efficient storage and transmission of ladar
imagery,” Appl. Opt. 42, 7023–7035 (2003).

[CrossRef]

T. J. Naughton, J. B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random
phase key codes by use of a configuration of a joint transform
correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

B. M. Hennelly and J. T. Sheridan, “Image encryption techniques based on
fractional Fourier transform,” Proc. SPIE 5202, 76–87 (2003).

[CrossRef]

A. R. Alsamman and M. S. Alam, “Face recognition through pose estimation and
fringe-adjusted joint transform correlation,” Opt.
Eng. 42, 560–567 (2003).

[CrossRef]

A. Mansour and M. Kawamoto, “ICA papers classified according to their
applications and performances,” IEICE Trans.
Fundamentals E86-A, 620–633 (2003).

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting
in fractional Fourier domains,” Opt.
Lett. 28, 269–271 (2003).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier
transform,” Optik (Stuttgart) 114, 251–265 (2003).

[CrossRef]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[CrossRef]

T. J. Naughton, John B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[CrossRef]

S. Kishk and B. Javidi, “Information hiding technique with double
phase encoding,” Appl. Opt. 41, 5462–5470 (2002).

[CrossRef]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[CrossRef]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[CrossRef]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital
holograms for secure real-time display,” Opt.
Lett. 27, 321–323 (2002).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and
multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[CrossRef]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[CrossRef]

G. Unnikrishnan and K. Singh, “Optical encryption using quadratic phase
systems,” Opt. Commun. 193, 51–67 (2001).

[CrossRef]

Y. Guo, Q. Huang, J. Du, and Y. Zhang, “Decomposition storage of information based
on computer-generated hologram interference and its application in optical image
encryption,” Appl. Opt. 40, 2860–2863 (2001).

[CrossRef]

B. Javidi and N. Takanori, “Securing information by use of digital
holography,” Opt. Lett. 25, 28–30 (2000).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information
with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption. by double-random phase
encoding in the fractional Fourier domain,” Opt.
Lett. 25, 887–889 (2000).

[CrossRef]

J. M. Kilpatrick, A. J. Moore, J. S. Barton, J. D. C. Jones, M. Reeves, and C. Buckberry, “Measurement of complex surface deformation
by high-speed dynamic phase-stepped digital speckle pattern
interferometry,” Opt. Lett. 25, 1068–1070 (2000).

[CrossRef]

T. E. Carlsson and A. Wei, “Phase evaluation of speckle patterns during
continuous deformation by use of phase-shifting speckle
interferometry,” Appl. Opt. 39, 2628–2637 (2000).

[CrossRef]

B. Javidi and E. Tajahuerce, “Three-dimensional object recognition by use
of digital holography,” Opt. Lett. 25, 610–612 (2000).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform
correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

A. Hyvarinen and E. Oja, “Independent component analysis: algorithms
and applications,” Neural Networks 13, 411–430 (2000).

[CrossRef]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on
multifractional Fourier transforms,” Opt.
Lett. 25, 1159–1161 (2000).

[CrossRef]

A. Bilgin, G. Zweig, and M. W. Marcellin, “Three-dimensional image compression with
integer wavelet transforms,” Appl. Opt. 39, 1799–1814 (2000).

[CrossRef]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems
based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[CrossRef]

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

R. Shahnaz, J. F. Walkup, and T. F. Krile, “Image compression in signal-dependent
noise,” Appl. Opt. 38, 5560–5567 (1999).

[CrossRef]

F. Domingo and C. Saloma, “Image compression by vector quantization
with noniterative derivation of a codebook: applications to video and confocal
images,” Appl. Opt. 38, 3735–3744 (1999).

[CrossRef]

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using
three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image
processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with angular
multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[CrossRef]

J. L. de Bougrenet de la Tocnaye, E. Quémener, and Y. Pétillot, “Composite versus multichannel binary
phase-only filtering,” Appl. Opt. 36, 6646–6653 (1997).

[CrossRef]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[CrossRef]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[CrossRef]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[CrossRef]

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[CrossRef]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption
using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[CrossRef]

P. Refrégiér and B. Javidi, “Optical image encryption based on input
plane and Fourier plane random encoding,” Opt.
Lett. 20, 767–769 (1995).

[CrossRef]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[CrossRef]

D. Coppersmith, “The Data Encryption Standard (DES) and its
strength against attacks,” IBM J. Res.
Dev. 38, 243–250 (1994).

P. Comon, “Independent component analysis, a new
concept?,” Signal Process. 36, 287–314 (1994).

[CrossRef]

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[CrossRef]

B. Landreth and G. Modde, “Gray scale response from optically addressed
spatial light modulators incorporating surface-stabilized ferroelectric liquid
crystals,” Appl. Opt. 31, 3937–3944 (1992).

[CrossRef]

B. V. K. V. Kumar, “Tutorial survey of composite filter designs
for optical correlators,” Appl. Opt. 31, 4773–4801 (1992).

[CrossRef]

J. L. Horner, “Metrics for assessing pattern-recognition
performance,” Appl. Opt. 31, 165–166 (1992).

[CrossRef]

J. D. He and E. L. Dereniak, “Error-free image compression algorithm using
classifying-sequencing techniques,” Appl.
Opt. 31, 2554–2559 (1992).

[CrossRef]

C. Jutten and J. Herault, “Blind separation of sources, Part 1: an
adaptive algorithm based on neuromimetic architecture,” Signal Process. 24, 1–10 (1991).

[CrossRef]

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

A. V. Oppenheim and J. S. Lim, “The importance of phase in
signals,” Proc. IEEE 69, 529–541 (1981).

[CrossRef]

J. Ziv and A. Lempel, “A universal algorithm for sequential data
compression,” IEEE Trans. Inf. Theory IT-23, 337–343 (1977).

A. B. VanderLugt, “Signal detection by complex spatial
filtering,” IEEE Trans. Inf. Theory IT-10, 139–145 (1964).

[CrossRef]

D. A. Huffman, “A method for the construction of minimum
redundancy codes,” Proc. IRE 40, 1098–1101 (1952).

D. Gabor, “A new microscopic
principle,” Nature 161, 777–778 (1948).

[CrossRef]

D. Abookasis, A. Batikoff, H. Famini, and J. Rosen, “Performance comparison of iterative
algorithms for generating digital correlation holograms used in optical security
systems,” Appl. Opt. 45, 4617–4624 (2006).

[CrossRef]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and
deciphered by a modified joint-transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures
and public-key cryptosystems,” Commun.
ACM 20, 120–126 (1978).

[CrossRef]

M. Nazrul Islam and M. S. Alam, “Optical security system employing shifted
phase-encoded joint transform correlation,” Opt.
Commun. 281, 248–254 (2008).

[CrossRef]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[CrossRef]

A. R. Alsamman and M. S. Alam, “Face recognition through pose estimation and
fringe-adjusted joint transform correlation,” Opt.
Eng. 42, 560–567 (2003).

[CrossRef]

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[CrossRef]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[CrossRef]

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[CrossRef]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[CrossRef]

A. Alfalou and A. Mansour, “All-optical video-image encryption with
enforced security level using independent component
analysis,” J. Opt. A Pure Appl. Opt. 9, 787–796 (2007).

[CrossRef]

A. Alfalou and A. Alkholidi, “Implementation of an all-optical image
compression architecture based on Fourier transform which will be the core
principle in the realisation of DCT,” Proc.
SPIE 5823, 183–190 (2005).

[CrossRef]

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[CrossRef]

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[CrossRef]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[CrossRef]

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

A. Alfalou and A. Mansour, “New Image Encryption Method Based on
ICA,” in Proceedings of the 10th IAPR Conference
on Machine Vision Applications, J. Tajima, ed. (International Association for Pattern Recognition, 2007), pp. 16–18.

A. Mansour and A. Alfalou, “Performance indices of BSS for real-world
applications,” in Proceedings of the 14th European
Signal Processing Conference (EUSIPCO 2006), Proceedings on CD (EURASIP, 2006).

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

A. Boumezzough, A. Alfalou, and C. Collet, “Optical image compression based on filtering
of the redundant information in Fourier domain with a segmented amplitude mask
(SAM),” in Proceedings of Complex Systems,
Intelligence and Modern Technological Applications, M. Rouff and M. Cotsaftis, eds (Society of Environmental Engineers, 2004), pp. 566–570.

A. Cottour, A. Alfalou, and H. Hamam, “Optical video image compression: a
multiplexing method based on the spectral fusion of
information,” in 3rd International Conference on
Information and Communication Technologies: from Theory to Applications, 2008.
ICTTA 2008 (IEEE, 2008), pp. 1–6.

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[CrossRef]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[CrossRef]

A. Alfalou and A. Alkholidi, “Implementation of an all-optical image
compression architecture based on Fourier transform which will be the core
principle in the realisation of DCT,” Proc.
SPIE 5823, 183–190 (2005).

[CrossRef]

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

A. R. Alsamman and M. S. Alam, “Face recognition through pose estimation and
fringe-adjusted joint transform correlation,” Opt.
Eng. 42, 560–567 (2003).

[CrossRef]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[CrossRef]

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[CrossRef]

S. G. Batsell, J. F. Walkup, and T. F. Krile, Design Issues in Optical Processing (Cambridge Univ. Press, 1995).

B.-E. Benkelfat, E. H. Horache, and Q. Zou, “Multiplex signal processing in optical
pattern recognition,” in Proceeding of Optics and
Optoelectronics, Theory, Devices and Applications, O. P. Nijhanram, A. K. Gupta, A. K. Musla, Kehar Singh, eds. (Narosa, 1999), pp. 84–87.

V. Bhaskaran and K. Konstantinides, Image and Video Compression Standards, 2nd ed. (Kluwer Academic, 1997).

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

A. Boumezzough, A. Alfalou, and C. Collet, “Optical image compression based on filtering
of the redundant information in Fourier domain with a segmented amplitude mask
(SAM),” in Proceedings of Complex Systems,
Intelligence and Modern Technological Applications, M. Rouff and M. Cotsaftis, eds (Society of Environmental Engineers, 2004), pp. 566–570.

M. Burrows and D. J. Wheeler, “A block-sorting lossless data compression
algorithm,” SRC Research Report (Digital Systems Research Center, May 10, 1994).

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[CrossRef]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[CrossRef]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[CrossRef]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[CrossRef]

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[CrossRef]

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

X. Wang and Y. Chen, “Securing information using digital
optics,” J. Opt. A Pure Appl. Opt. 9, 152–155 (2007).

[CrossRef]

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

A. Boumezzough, A. Alfalou, and C. Collet, “Optical image compression based on filtering
of the redundant information in Fourier domain with a segmented amplitude mask
(SAM),” in Proceedings of Complex Systems,
Intelligence and Modern Technological Applications, M. Rouff and M. Cotsaftis, eds (Society of Environmental Engineers, 2004), pp. 566–570.

P. Comon, “Independent component analysis, a new
concept?,” Signal Process. 36, 287–314 (1994).

[CrossRef]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[CrossRef]

D. Coppersmith, “The Data Encryption Standard (DES) and its
strength against attacks,” IBM J. Res.
Dev. 38, 243–250 (1994).

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[CrossRef]

A. Cottour, A. Alfalou, and H. Hamam, “Optical video image compression: a
multiplexing method based on the spectral fusion of
information,” in 3rd International Conference on
Information and Communication Technologies: from Theory to Applications, 2008.
ICTTA 2008 (IEEE, 2008), pp. 1–6.

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[CrossRef]

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[CrossRef]

E. Darakis and J. J. Soraghan, “Reconstruction domain compression of
phase-shifting digital holograms,” Appl.
Opt. 46, 351–356 (2007).

[CrossRef]

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[CrossRef]

E. Darakis and J. J. Soraghan, “Compression of interference patterns with
application to phase-shifting digital holography,” Appl. Opt. 45, 2437–2443 (2006).

[CrossRef]

E. Darakis and J. J. Soraghan, “Compression of phase-shifting digital
holography interference patterns,” Proc.
SPIE 6187, 61870Y (2006).

[CrossRef]

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[CrossRef]

J. L. de Bougrenet de la Tocnaye, E. Quémener, and Y. Pétillot, “Composite versus multichannel binary
phase-only filtering,” Appl. Opt. 36, 6646–6653 (1997).

[CrossRef]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[CrossRef]

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[CrossRef]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[CrossRef]

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[CrossRef]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[CrossRef]

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[CrossRef]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[CrossRef]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[CrossRef]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[CrossRef]

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[CrossRef]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[CrossRef]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[CrossRef]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[CrossRef]

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

D. Gabor, “A new microscopic
principle,” Nature 161, 777–778 (1948).

[CrossRef]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[CrossRef]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[CrossRef]

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[CrossRef]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[CrossRef]

H. Guitter, La Compression des Images Numériques (Hermes, 1995).

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[CrossRef]

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[CrossRef]

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[CrossRef]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[CrossRef]

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[CrossRef]

A. Cottour, A. Alfalou, and H. Hamam, “Optical video image compression: a
multiplexing method based on the spectral fusion of
information,” in 3rd International Conference on
Information and Communication Technologies: from Theory to Applications, 2008.
ICTTA 2008 (IEEE, 2008), pp. 1–6.

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[CrossRef]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[CrossRef]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[CrossRef]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[CrossRef]

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

B. M. Hennelly and J. T. Sheridan, “Image encryption techniques based on
fractional Fourier transform,” Proc. SPIE 5202, 76–87 (2003).

[CrossRef]

C. Jutten and J. Herault, “Blind separation of sources, Part 1: an
adaptive algorithm based on neuromimetic architecture,” Signal Process. 24, 1–10 (1991).

[CrossRef]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[CrossRef]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[CrossRef]

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

B.-E. Benkelfat, E. H. Horache, and Q. Zou, “Multiplex signal processing in optical
pattern recognition,” in Proceeding of Optics and
Optoelectronics, Theory, Devices and Applications, O. P. Nijhanram, A. K. Gupta, A. K. Musla, Kehar Singh, eds. (Narosa, 1999), pp. 84–87.

E. H. Horache, “Optical multiplex correlation based in
spatial coherent modulation for wide spectral sources: applications for pattern
recognition,” Ph.D. thesis (University of Marne-La-Vallée, 2001).

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

D. A. Huffman, “A method for the construction of minimum
redundancy codes,” Proc. IRE 40, 1098–1101 (1952).

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[CrossRef]

A. Hyvarinen and E. Oja, “Independent component analysis: algorithms
and applications,” Neural Networks 13, 411–430 (2000).

[CrossRef]

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[CrossRef]

B. Tavakoli, M. Daneshpanah, B. Javidi, and E. Watson, “Performance of 3D integral imaging with
position uncertainty,” Opt. Express 15, 11889–11902 (2007).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[CrossRef]

S. Yeom, A. Stern, and B. Javidi, “Compression of 3D color integral
images,” Opt. Express 12, 1632–1642 (2004).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random
phase key codes by use of a configuration of a joint transform
correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

T. J. Naughton, John B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[CrossRef]

T. J. Naughton, J. B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[CrossRef]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital
holograms for secure real-time display,” Opt.
Lett. 27, 321–323 (2002).

[CrossRef]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[CrossRef]

S. Kishk and B. Javidi, “Information hiding technique with double
phase encoding,” Appl. Opt. 41, 5462–5470 (2002).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[CrossRef]

B. Javidi and E. Tajahuerce, “Three-dimensional object recognition by use
of digital holography,” Opt. Lett. 25, 610–612 (2000).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information
with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform
correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

B. Javidi and N. Takanori, “Securing information by use of digital
holography,” Opt. Lett. 25, 28–30 (2000).

[CrossRef]

N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image
processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using
three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with angular
multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[CrossRef]

F. Goudail, F. Bollaro, B. Javidi, and P. Réfrégier, “Influence of a perturbation in a double
phase-encoding system,” J. Opt. Soc. Am.
A 15, 2629–2638 (1998).

[CrossRef]

P. Refrégiér and B. Javidi, “Optical image encryption based on input
plane and Fourier plane random encoding,” Opt.
Lett. 20, 767–769 (1995).

[CrossRef]

B. Javidi, “Nonlinear joint power spectrum based optical
correlation,” Appl. Opt. 28, 2358–2367 (1989).

[CrossRef]

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[CrossRef]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[CrossRef]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[CrossRef]

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[CrossRef]

R. M. Turner, K. M. Johnson, and S. Serati, High Speed Compact Optical Correlator Design and
Implementation (Cambridge Univ. Press, 1995).

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption. by double-random phase
encoding in the fractional Fourier domain,” Opt.
Lett. 25, 887–889 (2000).

[CrossRef]

M. Joshi, Chandrashakher K. Singh, “Color image encryption and decryption for
twin images in fractional Fourier domain,” Opt.
Commun. 281, 5713–5720 (2008).

[CrossRef]

M. Joshia, Chandrashakherb K. Singh, “Color image encryption and decryption using
fractional Fourier transform,” Opt.
Commun. 279, 34–42 (2007).

C. Jutten and J. Herault, “Blind separation of sources, Part 1: an
adaptive algorithm based on neuromimetic architecture,” Signal Process. 24, 1–10 (1991).

[CrossRef]

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

A. Mansour and M. Kawamoto, “ICA papers classified according to their
applications and performances,” IEICE Trans.
Fundamentals E86-A, 620–633 (2003).

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[CrossRef]

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[CrossRef]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[CrossRef]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[CrossRef]

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[CrossRef]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[CrossRef]

V. Bhaskaran and K. Konstantinides, Image and Video Compression Standards, 2nd ed. (Kluwer Academic, 1997).

J. Ziv and A. Lempel, “A universal algorithm for sequential data
compression,” IEEE Trans. Inf. Theory IT-23, 337–343 (1977).

A. V. Oppenheim and J. S. Lim, “The importance of phase in
signals,” Proc. IEEE 69, 529–541 (1981).

[CrossRef]

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[CrossRef]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[CrossRef]

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[CrossRef]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[CrossRef]

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and
multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on
multifractional Fourier transforms,” Opt.
Lett. 25, 1159–1161 (2000).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[CrossRef]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[CrossRef]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[CrossRef]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[CrossRef]

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

A. Alfalou and A. Mansour, “All-optical video-image encryption with
enforced security level using independent component
analysis,” J. Opt. A Pure Appl. Opt. 9, 787–796 (2007).

[CrossRef]

A. Mansour and M. Kawamoto, “ICA papers classified according to their
applications and performances,” IEICE Trans.
Fundamentals E86-A, 620–633 (2003).

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

A. Mansour and A. Alfalou, “Performance indices of BSS for real-world
applications,” in Proceedings of the 14th European
Signal Processing Conference (EUSIPCO 2006), Proceedings on CD (EURASIP, 2006).

A. Alfalou and A. Mansour, “New Image Encryption Method Based on
ICA,” in Proceedings of the 10th IAPR Conference
on Machine Vision Applications, J. Tajima, ed. (International Association for Pattern Recognition, 2007), pp. 16–18.

J. C. Dagher, M. W. Marcellin, and M. A. Neifeld, “Efficient storage and transmission of ladar
imagery,” Appl. Opt. 42, 7023–7035 (2003).

[CrossRef]

A. Bilgin, G. Zweig, and M. W. Marcellin, “Three-dimensional image compression with
integer wavelet transforms,” Appl. Opt. 39, 1799–1814 (2000).

[CrossRef]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital
holograms for secure real-time display,” Opt.
Lett. 27, 321–323 (2002).

[CrossRef]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with angular
multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using
three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[CrossRef]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[CrossRef]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[CrossRef]

L. P. Yaroslavskii and N. S. Merzlyakov, Methods of Digital Holography (Izdatel’stvo Nauka, 1977), in Russian.

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[CrossRef]

W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard (Van Nostrand Reinhold, 1993).

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[CrossRef]

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[CrossRef]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[CrossRef]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[CrossRef]

T. J. Naughton, John B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[CrossRef]

T. J. Naughton, J. B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[CrossRef]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[CrossRef]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[CrossRef]

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

M. Nazrul Islam and M. S. Alam, “Optical security system employing shifted
phase-encoded joint transform correlation,” Opt.
Commun. 281, 248–254 (2008).

[CrossRef]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[CrossRef]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption
using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[CrossRef]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[CrossRef]

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

A. Hyvarinen and E. Oja, “Independent component analysis: algorithms
and applications,” Neural Networks 13, 411–430 (2000).

[CrossRef]

A. V. Oppenheim and J. S. Lim, “The importance of phase in
signals,” Proc. IEEE 69, 529–541 (1981).

[CrossRef]

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[CrossRef]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[CrossRef]

W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard (Van Nostrand Reinhold, 1993).

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[CrossRef]

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[CrossRef]

J. H. Reif and A. Yoshida, “Optical techniques for image
compression,” in Data Compression Conference,
1992. DCC '92 (IEEE, 1992), pp. 32–40.

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures
and public-key cryptosystems,” Commun.
ACM 20, 120–126 (1978).

[CrossRef]

D. Abookasis, A. Batikoff, H. Famini, and J. Rosen, “Performance comparison of iterative
algorithms for generating digital correlation holograms used in optical security
systems,” Appl. Opt. 45, 4617–4624 (2006).

[CrossRef]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and
deciphered by a modified joint-transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems
based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[CrossRef]

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[CrossRef]

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[CrossRef]

R. M. Turner, K. M. Johnson, and S. Serati, High Speed Compact Optical Correlator Design and
Implementation (Cambridge Univ. Press, 1995).

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[CrossRef]

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures
and public-key cryptosystems,” Commun.
ACM 20, 120–126 (1978).

[CrossRef]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[CrossRef]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[CrossRef]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption
using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[CrossRef]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[CrossRef]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting
in fractional Fourier domains,” Opt.
Lett. 28, 269–271 (2003).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier
transform,” Optik (Stuttgart) 114, 251–265 (2003).

[CrossRef]

B. M. Hennelly and J. T. Sheridan, “Image encryption techniques based on
fractional Fourier transform,” Proc. SPIE 5202, 76–87 (2003).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[CrossRef]

M. Joshi, Chandrashakher K. Singh, “Color image encryption and decryption for
twin images in fractional Fourier domain,” Opt.
Commun. 281, 5713–5720 (2008).

[CrossRef]

M. Joshia, Chandrashakherb K. Singh, “Color image encryption and decryption using
fractional Fourier transform,” Opt.
Commun. 279, 34–42 (2007).

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[CrossRef]

G. Unnikrishnan and K. Singh, “Optical encryption using quadratic phase
systems,” Opt. Commun. 193, 51–67 (2001).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption. by double-random phase
encoding in the fractional Fourier domain,” Opt.
Lett. 25, 887–889 (2000).

[CrossRef]

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[CrossRef]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[CrossRef]

E. Darakis and J. J. Soraghan, “Reconstruction domain compression of
phase-shifting digital holograms,” Appl.
Opt. 46, 351–356 (2007).

[CrossRef]

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[CrossRef]

E. Darakis and J. J. Soraghan, “Compression of phase-shifting digital
holography interference patterns,” Proc.
SPIE 6187, 61870Y (2006).

[CrossRef]

E. Darakis and J. J. Soraghan, “Compression of interference patterns with
application to phase-shifting digital holography,” Appl. Opt. 45, 2437–2443 (2006).

[CrossRef]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[CrossRef]

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[CrossRef]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[CrossRef]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[CrossRef]

B. Javidi and E. Tajahuerce, “Three-dimensional object recognition by use
of digital holography,” Opt. Lett. 25, 610–612 (2000).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information
with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

R. M. Turner, K. M. Johnson, and S. Serati, High Speed Compact Optical Correlator Design and
Implementation (Cambridge Univ. Press, 1995).

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[CrossRef]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[CrossRef]

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

A. B. VanderLugt, “Signal detection by complex spatial
filtering,” IEEE Trans. Inf. Theory IT-10, 139–145 (1964).

[CrossRef]

X. Wang and Y. Chen, “Securing information using digital
optics,” J. Opt. A Pure Appl. Opt. 9, 152–155 (2007).

[CrossRef]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[CrossRef]

T. A. Welch, “A technique for high performance data
compression,” Computer 17, 8–19 (1984).

M. Burrows and D. J. Wheeler, “A block-sorting lossless data compression
algorithm,” SRC Research Report (Digital Systems Research Center, May 10, 1994).

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[CrossRef]

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[CrossRef]

I. Yamaguchi, K. Yamamoto, G. A. Mills, and M. Yokota, “Image reconstruction only by phase data in
phase-shifting digital holography,” Appl.
Opt. 45, 975–983 (2006).

[CrossRef]

G. A. Mills and I. Yamaguchi, “Effects of quantization in phase-shifting
digital holography,” Appl. Opt. 44, 1216–1225 (2005).

[CrossRef]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[CrossRef]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[CrossRef]

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[CrossRef]

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[CrossRef]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[CrossRef]

L. P. Yaroslavskii and N. S. Merzlyakov, Methods of Digital Holography (Izdatel’stvo Nauka, 1977), in Russian.

J. H. Reif and A. Yoshida, “Optical techniques for image
compression,” in Data Compression Conference,
1992. DCC '92 (IEEE, 1992), pp. 32–40.

R. K. Young, Wavelet Theory and Its Applications (Kluwer Academic, 1993).

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and
multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on
multifractional Fourier transforms,” Opt.
Lett. 25, 1159–1161 (2000).

[CrossRef]

J. Ziv and A. Lempel, “A universal algorithm for sequential data
compression,” IEEE Trans. Inf. Theory IT-23, 337–343 (1977).

B.-E. Benkelfat, E. H. Horache, and Q. Zou, “Multiplex signal processing in optical
pattern recognition,” in Proceeding of Optics and
Optoelectronics, Theory, Devices and Applications, O. P. Nijhanram, A. K. Gupta, A. K. Musla, Kehar Singh, eds. (Narosa, 1999), pp. 84–87.

J. L. Horner and P. D. Gianino, “Phase-only matched
filtering,” Appl. Opt. 23, 812–816 (1984).

[CrossRef]

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

B. V. K. Vijaya Kumar and L. Hassebrook, “Performance measures for correlation
filters,” Appl. Opt. 29, 2997–3006 (1990).

[CrossRef]

J. L. Horner, “Metrics for assessing pattern-recognition
performance,” Appl. Opt. 31, 165–166 (1992).

[CrossRef]

J. L. de Bougrenet de la Tocnaye, E. Quémener, and Y. Pétillot, “Composite versus multichannel binary
phase-only filtering,” Appl. Opt. 36, 6646–6653 (1997).

[CrossRef]

B. V. K. V. Kumar, “Tutorial survey of composite filter designs
for optical correlators,” Appl. Opt. 31, 4773–4801 (1992).

[CrossRef]

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[CrossRef]

Feature issue on Task Specific Sensing, Appl. Opt. 45, 2857–3070 (2006).

C. Kohler, X. Schwab, and W. Osten, “Optimally tuned spatial light modulators for
digital holography,” Appl. Opt. 45, 960–967 (2006).

[CrossRef]

B. Landreth and G. Modde, “Gray scale response from optically addressed
spatial light modulators incorporating surface-stabilized ferroelectric liquid
crystals,” Appl. Opt. 31, 3937–3944 (1992).

[CrossRef]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[CrossRef]

E. Darakis and J. J. Soraghan, “Reconstruction domain compression of
phase-shifting digital holograms,” Appl.
Opt. 46, 351–356 (2007).

[CrossRef]

E. Darakis and J. J. Soraghan, “Compression of interference patterns with
application to phase-shifting digital holography,” Appl. Opt. 45, 2437–2443 (2006).

[CrossRef]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[CrossRef]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[CrossRef]

B. Javidi, “Nonlinear joint power spectrum based optical
correlation,” Appl. Opt. 28, 2358–2367 (1989).

[CrossRef]

S. L. Wijaya, M. Savvides, and B. V. K. Vijaya Kumar, “Illumination-tolerant face verification of
low-bit-rate JPEG2000 wavelet images with advanced correlation filters for
handheld devices,” Appl. Opt. 44, 655–665 (2005).

[CrossRef]

T. J. Naughton, John B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[CrossRef]

D. W. Robinson, “Automatic fringe analysis with a computer
image processing system,” Appl. Opt. 22, 2169–2176 (1983).

[CrossRef]

K. Creath, “Phase shifting speckle
interferometry,” Appl. Opt. 24, 3053–3058 (1985).

[CrossRef]

T. W. Ng and K. T. Ang, “Fourier-transform method of data compres
sion and temporal fringe pattern analysis,” Appl.
Opt. 44, 7043–7049 (2005).

[CrossRef]

J. M. Huntley and H. Saldner, “Temporal phase unwrapping algorithm for
automated interferogram analysis,” Appl.
Opt. 32, 3047–3052 (1993).

[CrossRef]

T. E. Carlsson and A. Wei, “Phase evaluation of speckle patterns during
continuous deformation by use of phase-shifting speckle
interferometry,” Appl. Opt. 39, 2628–2637 (2000).

[CrossRef]

S. Kishk and B. Javidi, “Information hiding technique with double
phase encoding,” Appl. Opt. 41, 5462–5470 (2002).

[CrossRef]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information
with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical storage with angular
multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[CrossRef]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[CrossRef]

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[CrossRef]

D. Abookasis, A. Batikoff, H. Famini, and J. Rosen, “Performance comparison of iterative
algorithms for generating digital correlation holograms used in optical security
systems,” Appl. Opt. 45, 4617–4624 (2006).

[CrossRef]

Y. Guo, Q. Huang, J. Du, and Y. Zhang, “Decomposition storage of information based
on computer-generated hologram interference and its application in optical image
encryption,” Appl. Opt. 40, 2860–2863 (2001).

[CrossRef]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random
phase key codes by use of a configuration of a joint transform
correlator,” Appl. Opt. 42, 1508–1514 (2003).

[CrossRef]

Z. Xin, Y. S. Wei, and X. Jian, “Affine cryptosystem of double-random-phase
encryption based on the fractional Fourier transform,” Appl. Opt. 45, 8434–8439 (2006).

[CrossRef]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[CrossRef]

C. S. Weaver and J. W. Goodman, “A technique for optically convolving two
functions,” Appl. Opt. 5, 1248–1249 (1966).

[CrossRef]

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[CrossRef]

I. Yamaguchi, K. Yamamoto, G. A. Mills, and M. Yokota, “Image reconstruction only by phase data in
phase-shifting digital holography,” Appl.
Opt. 45, 975–983 (2006).

[CrossRef]

G. A. Mills and I. Yamaguchi, “Effects of quantization in phase-shifting
digital holography,” Appl. Opt. 44, 1216–1225 (2005).

[CrossRef]

J. D. He and E. L. Dereniak, “Error-free image compression algorithm using
classifying-sequencing techniques,” Appl.
Opt. 31, 2554–2559 (1992).

[CrossRef]

R. Shahnaz, J. F. Walkup, and T. F. Krile, “Image compression in signal-dependent
noise,” Appl. Opt. 38, 5560–5567 (1999).

[CrossRef]

F. Domingo and C. Saloma, “Image compression by vector quantization
with noniterative derivation of a codebook: applications to video and confocal
images,” Appl. Opt. 38, 3735–3744 (1999).

[CrossRef]

A. Bilgin, G. Zweig, and M. W. Marcellin, “Three-dimensional image compression with
integer wavelet transforms,” Appl. Opt. 39, 1799–1814 (2000).

[CrossRef]

J. C. Dagher, M. W. Marcellin, and M. A. Neifeld, “Efficient storage and transmission of ladar
imagery,” Appl. Opt. 42, 7023–7035 (2003).

[CrossRef]

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[CrossRef]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems
based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[CrossRef]

A. Zlotnik, Z. Zalevsky, and E. Marom, “Optical encryption by using a synthesized
mutual intensity function,” Appl. Opt. 43, 3456–3465 (2004).

[CrossRef]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and
deciphered by a modified joint-transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[CrossRef]

H. T. Chang and C. L. Tsan, “Image watermarking by use of digital
holography embedded in the discrete-cosine-transform
domain,” Appl. Opt. 44, 6211–6219 (2005).

[CrossRef]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[CrossRef]

S. Yuan, X. Zhou, D.-H. Li, and D.-F. Zhou, “Simultaneous transmission for an encrypted
image and a double random-phase encryption key,” Appl. Opt. 46, 3747–3753 (2007).

[CrossRef]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[CrossRef]

T. J. Naughton, J. B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[CrossRef]

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures
and public-key cryptosystems,” Commun.
ACM 20, 120–126 (1978).

[CrossRef]

T. A. Welch, “A technique for high performance data
compression,” Computer 17, 8–19 (1984).

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[CrossRef]

D. Coppersmith, “The Data Encryption Standard (DES) and its
strength against attacks,” IBM J. Res.
Dev. 38, 243–250 (1994).

J. Ziv and A. Lempel, “A universal algorithm for sequential data
compression,” IEEE Trans. Inf. Theory IT-23, 337–343 (1977).

A. B. VanderLugt, “Signal detection by complex spatial
filtering,” IEEE Trans. Inf. Theory IT-10, 139–145 (1964).

[CrossRef]

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

A. Mansour and M. Kawamoto, “ICA papers classified according to their
applications and performances,” IEICE Trans.
Fundamentals E86-A, 620–633 (2003).

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[CrossRef]

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[CrossRef]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[CrossRef]

A. Alfalou and A. Mansour, “All-optical video-image encryption with
enforced security level using independent component
analysis,” J. Opt. A Pure Appl. Opt. 9, 787–796 (2007).

[CrossRef]

X. Wang and Y. Chen, “Securing information using digital
optics,” J. Opt. A Pure Appl. Opt. 9, 152–155 (2007).

[CrossRef]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[CrossRef]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[CrossRef]

F. Goudail, F. Bollaro, B. Javidi, and P. Réfrégier, “Influence of a perturbation in a double
phase-encoding system,” J. Opt. Soc. Am.
A 15, 2629–2638 (1998).

[CrossRef]

N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image
processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).

[CrossRef]

D. Gabor, “A new microscopic
principle,” Nature 161, 777–778 (1948).

[CrossRef]

A. Hyvarinen and E. Oja, “Independent component analysis: algorithms
and applications,” Neural Networks 13, 411–430 (2000).

[CrossRef]

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

M. Joshia, Chandrashakherb K. Singh, “Color image encryption and decryption using
fractional Fourier transform,” Opt.
Commun. 279, 34–42 (2007).

G. Unnikrishnan and K. Singh, “Optical encryption using quadratic phase
systems,” Opt. Commun. 193, 51–67 (2001).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[CrossRef]

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[CrossRef]

M. Joshi, Chandrashakher K. Singh, “Color image encryption and decryption for
twin images in fractional Fourier domain,” Opt.
Commun. 281, 5713–5720 (2008).

[CrossRef]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[CrossRef]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[CrossRef]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[CrossRef]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[CrossRef]

M. Nazrul Islam and M. S. Alam, “Optical security system employing shifted
phase-encoded joint transform correlation,” Opt.
Commun. 281, 248–254 (2008).

[CrossRef]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[CrossRef]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[CrossRef]

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[CrossRef]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[CrossRef]

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[CrossRef]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[CrossRef]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption
using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[CrossRef]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[CrossRef]

A. R. Alsamman and M. S. Alam, “Face recognition through pose estimation and
fringe-adjusted joint transform correlation,” Opt.
Eng. 42, 560–567 (2003).

[CrossRef]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[CrossRef]

T. Nomura and B. Javidi, “Optical encryption using a joint transform
correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[CrossRef]

L. Chen and D. Zhao, “Optical color image encryption by wavelength
multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[CrossRef]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[CrossRef]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[CrossRef]

R. Tao, Y. Xin, and Y. Yang, “Double image encryption based on random
phase encoding in the fractional Fourier domain,” Opt. Express 15, 16067–16079 (2007).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[CrossRef]

B. Tavakoli, M. Daneshpanah, B. Javidi, and E. Watson, “Performance of 3D integral imaging with
position uncertainty,” Opt. Express 15, 11889–11902 (2007).

[CrossRef]

S. Yeom, A. Stern, and B. Javidi, “Compression of 3D color integral
images,” Opt. Express 12, 1632–1642 (2004).

[CrossRef]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption. by double-random phase
encoding in the fractional Fourier domain,” Opt.
Lett. 25, 887–889 (2000).

[CrossRef]

P. Refrégiér and B. Javidi, “Optical image encryption based on input
plane and Fourier plane random encoding,” Opt.
Lett. 20, 767–769 (1995).

[CrossRef]

J. M. Kilpatrick, A. J. Moore, J. S. Barton, J. D. C. Jones, M. Reeves, and C. Buckberry, “Measurement of complex surface deformation
by high-speed dynamic phase-stepped digital speckle pattern
interferometry,” Opt. Lett. 25, 1068–1070 (2000).

[CrossRef]

W. E. Smith and H. H. Barrett, “Radon transform and bandwidth
compression,” Opt. Lett. 8, 395–397 (1983).

[CrossRef]

B. Javidi and E. Tajahuerce, “Three-dimensional object recognition by use
of digital holography,” Opt. Lett. 25, 610–612 (2000).

[CrossRef]

J. R. Fienup, “Reconstruction of an object from the modulus
of its Fourier transform,” Opt. Lett. 3, 27–29 (1978).

[CrossRef]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks
of optical encryption schemes based on double random phase
keys,” Opt. Lett. 30, 1644–1646 (2005).

[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption
based on double random phase keys,” Opt.
Lett. 31, 1044–1046 (2006).

[CrossRef]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital
holograms for secure real-time display,” Opt.
Lett. 27, 321–323 (2002).

[CrossRef]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on
multifractional Fourier transforms,” Opt.
Lett. 25, 1159–1161 (2000).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting
in fractional Fourier domains,” Opt.
Lett. 28, 269–271 (2003).

[CrossRef]

B. Javidi and N. Takanori, “Securing information by use of digital
holography,” Opt. Lett. 25, 28–30 (2000).

[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel
domain,” Opt. Lett. 29, 1584–1586 (2004).

[CrossRef]

O. Matoba and B. Javidi, “Encrypted optical memory system using
three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[CrossRef]

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and
multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[CrossRef]

B. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier
transform,” Optik (Stuttgart) 114, 251–265 (2003).

[CrossRef]

A. V. Oppenheim and J. S. Lim, “The importance of phase in
signals,” Proc. IEEE 69, 529–541 (1981).

[CrossRef]

D. A. Huffman, “A method for the construction of minimum
redundancy codes,” Proc. IRE 40, 1098–1101 (1952).

A. Alfalou and A. Alkholidi, “Implementation of an all-optical image
compression architecture based on Fourier transform which will be the core
principle in the realisation of DCT,” Proc.
SPIE 5823, 183–190 (2005).

[CrossRef]

E. Darakis and J. J. Soraghan, “Compression of phase-shifting digital
holography interference patterns,” Proc.
SPIE 6187, 61870Y (2006).

[CrossRef]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[CrossRef]

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[CrossRef]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[CrossRef]

B. M. Hennelly and J. T. Sheridan, “Image encryption techniques based on
fractional Fourier transform,” Proc. SPIE 5202, 76–87 (2003).

[CrossRef]

P. Comon, “Independent component analysis, a new
concept?,” Signal Process. 36, 287–314 (1994).

[CrossRef]

C. Jutten and J. Herault, “Blind separation of sources, Part 1: an
adaptive algorithm based on neuromimetic architecture,” Signal Process. 24, 1–10 (1991).

[CrossRef]

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[CrossRef]

R. K. Young, Wavelet Theory and Its Applications (Kluwer Academic, 1993).

V. Bhaskaran and K. Konstantinides, Image and Video Compression Standards, 2nd ed. (Kluwer Academic, 1997).

W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard (Van Nostrand Reinhold, 1993).

A. Boumezzough, A. Alfalou, and C. Collet, “Optical image compression based on filtering
of the redundant information in Fourier domain with a segmented amplitude mask
(SAM),” in Proceedings of Complex Systems,
Intelligence and Modern Technological Applications, M. Rouff and M. Cotsaftis, eds (Society of Environmental Engineers, 2004), pp. 566–570.

A. Cottour, A. Alfalou, and H. Hamam, “Optical video image compression: a
multiplexing method based on the spectral fusion of
information,” in 3rd International Conference on
Information and Communication Technologies: from Theory to Applications, 2008.
ICTTA 2008 (IEEE, 2008), pp. 1–6.

R. M. Turner, K. M. Johnson, and S. Serati, High Speed Compact Optical Correlator Design and
Implementation (Cambridge Univ. Press, 1995).

S. G. Batsell, J. F. Walkup, and T. F. Krile, Design Issues in Optical Processing (Cambridge Univ. Press, 1995).

L. P. Yaroslavskii and N. S. Merzlyakov, Methods of Digital Holography (Izdatel’stvo Nauka, 1977), in Russian.

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

H. Guitter, La Compression des Images Numériques (Hermes, 1995).

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

M. Burrows and D. J. Wheeler, “A block-sorting lossless data compression
algorithm,” SRC Research Report (Digital Systems Research Center, May 10, 1994).

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

J. W. Goodman, Introduction to Fourier Optics (McGraw-Hill, 1968).

A. Mansour and A. Alfalou, “Performance indices of BSS for real-world
applications,” in Proceedings of the 14th European
Signal Processing Conference (EUSIPCO 2006), Proceedings on CD (EURASIP, 2006).

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

A. Alfalou and A. Mansour, “New Image Encryption Method Based on
ICA,” in Proceedings of the 10th IAPR Conference
on Machine Vision Applications, J. Tajima, ed. (International Association for Pattern Recognition, 2007), pp. 16–18.

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

E. H. Horache, “Optical multiplex correlation based in
spatial coherent modulation for wide spectral sources: applications for pattern
recognition,” Ph.D. thesis (University of Marne-La-Vallée, 2001).

B.-E. Benkelfat, E. H. Horache, and Q. Zou, “Multiplex signal processing in optical
pattern recognition,” in Proceeding of Optics and
Optoelectronics, Theory, Devices and Applications, O. P. Nijhanram, A. K. Gupta, A. K. Musla, Kehar Singh, eds. (Narosa, 1999), pp. 84–87.

J. H. Reif and A. Yoshida, “Optical techniques for image
compression,” in Data Compression Conference,
1992. DCC '92 (IEEE, 1992), pp. 32–40.