A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[Crossref]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[Crossref]

M. Joshi, Chandrashakher K. Singh, “Color image encryption and decryption for
twin images in fractional Fourier domain,” Opt.
Commun. 281, 5713–5720 (2008).

[Crossref]

M. Nazrul Islam and M. S. Alam, “Optical security system employing shifted
phase-encoded joint transform correlation,” Opt.
Commun. 281, 248–254 (2008).

[Crossref]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[Crossref]

R. Tao, Y. Xin, and Y. Yang, “Double image encryption based on random
phase encoding in the fractional Fourier domain,” Opt. Express 15, 16067–16079 (2007).

[Crossref]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[Crossref]

S. Yuan, X. Zhou, D.-H. Li, and D.-F. Zhou, “Simultaneous transmission for an encrypted
image and a double random-phase encryption key,” Appl. Opt. 46, 3747–3753 (2007).

[Crossref]

X. Wang and Y. Chen, “Securing information using digital
optics,” J. Opt. A Pure Appl. Opt. 9, 152–155 (2007).

[Crossref]

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[Crossref]

M. Joshia, Chandrashakherb K. Singh, “Color image encryption and decryption using
fractional Fourier transform,” Opt.
Commun. 279, 34–42 (2007).

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[Crossref]

A. Alfalou and A. Mansour, “All-optical video-image encryption with
enforced security level using independent component
analysis,” J. Opt. A Pure Appl. Opt. 9, 787–796 (2007).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[Crossref]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[Crossref]

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[Crossref]

B. Tavakoli, M. Daneshpanah, B. Javidi, and E. Watson, “Performance of 3D integral imaging with
position uncertainty,” Opt. Express 15, 11889–11902 (2007).

[Crossref]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[Crossref]

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[Crossref]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[Crossref]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[Crossref]

E. Darakis and J. J. Soraghan, “Reconstruction domain compression of
phase-shifting digital holograms,” Appl.
Opt. 46, 351–356 (2007).

[Crossref]

E. Darakis and J. J. Soraghan, “Compression of interference patterns with
application to phase-shifting digital holography,” Appl. Opt. 45, 2437–2443 (2006).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[Crossref]

E. Darakis and J. J. Soraghan, “Compression of phase-shifting digital
holography interference patterns,” Proc.
SPIE 6187, 61870Y (2006).

[Crossref]

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[Crossref]

Feature issue on Task Specific Sensing, Appl. Opt. 45, 2857–3070 (2006).

C. Kohler, X. Schwab, and W. Osten, “Optimally tuned spatial light modulators for
digital holography,” Appl. Opt. 45, 960–967 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[Crossref]

Z. Xin, Y. S. Wei, and X. Jian, “Affine cryptosystem of double-random-phase
encryption based on the fractional Fourier transform,” Appl. Opt. 45, 8434–8439 (2006).

[Crossref]

D. Abookasis, A. Batikoff, H. Famini, and J. Rosen, “Performance comparison of iterative
algorithms for generating digital correlation holograms used in optical security
systems,” Appl. Opt. 45, 4617–4624 (2006).

[Crossref]

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption
based on double random phase keys,” Opt.
Lett. 31, 1044–1046 (2006).

[Crossref]

L. Chen and D. Zhao, “Optical color image encryption by wavelength
multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[Crossref]

I. Yamaguchi, K. Yamamoto, G. A. Mills, and M. Yokota, “Image reconstruction only by phase data in
phase-shifting digital holography,” Appl.
Opt. 45, 975–983 (2006).

[Crossref]

G. A. Mills and I. Yamaguchi, “Effects of quantization in phase-shifting
digital holography,” Appl. Opt. 44, 1216–1225 (2005).

[Crossref]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and
deciphered by a modified joint-transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[Crossref]

H. T. Chang and C. L. Tsan, “Image watermarking by use of digital
holography embedded in the discrete-cosine-transform
domain,” Appl. Opt. 44, 6211–6219 (2005).

[Crossref]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[Crossref]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks
of optical encryption schemes based on double random phase
keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[Crossref]

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[Crossref]

T. W. Ng and K. T. Ang, “Fourier-transform method of data compres
sion and temporal fringe pattern analysis,” Appl.
Opt. 44, 7043–7049 (2005).

[Crossref]

S. L. Wijaya, M. Savvides, and B. V. K. Vijaya Kumar, “Illumination-tolerant face verification of
low-bit-rate JPEG2000 wavelet images with advanced correlation filters for
handheld devices,” Appl. Opt. 44, 655–665 (2005).

[Crossref]

A. Alfalou and A. Alkholidi, “Implementation of an all-optical image
compression architecture based on Fourier transform which will be the core
principle in the realisation of DCT,” Proc.
SPIE 5823, 183–190 (2005).

[Crossref]

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[Crossref]

S. Yeom, A. Stern, and B. Javidi, “Compression of 3D color integral
images,” Opt. Express 12, 1632–1642 (2004).

[Crossref]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[Crossref]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel
domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]

A. Zlotnik, Z. Zalevsky, and E. Marom, “Optical encryption by using a synthesized
mutual intensity function,” Appl. Opt. 43, 3456–3465 (2004).

[Crossref]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[Crossref]

J. C. Dagher, M. W. Marcellin, and M. A. Neifeld, “Efficient storage and transmission of ladar
imagery,” Appl. Opt. 42, 7023–7035 (2003).

[Crossref]

T. J. Naughton, J. B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[Crossref]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random
phase key codes by use of a configuration of a joint transform
correlator,” Appl. Opt. 42, 1508–1514 (2003).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Image encryption techniques based on
fractional Fourier transform,” Proc. SPIE 5202, 76–87 (2003).

[Crossref]

A. R. Alsamman and M. S. Alam, “Face recognition through pose estimation and
fringe-adjusted joint transform correlation,” Opt.
Eng. 42, 560–567 (2003).

[Crossref]

A. Mansour and M. Kawamoto, “ICA papers classified according to their
applications and performances,” IEICE Trans.
Fundamentals E86-A, 620–633 (2003).

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting
in fractional Fourier domains,” Opt.
Lett. 28, 269–271 (2003).

[Crossref]

B. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier
transform,” Optik (Stuttgart) 114, 251–265 (2003).

[Crossref]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[Crossref]

T. J. Naughton, John B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[Crossref]

S. Kishk and B. Javidi, “Information hiding technique with double
phase encoding,” Appl. Opt. 41, 5462–5470 (2002).

[Crossref]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[Crossref]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[Crossref]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital
holograms for secure real-time display,” Opt.
Lett. 27, 321–323 (2002).

[Crossref]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and
multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[Crossref]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[Crossref]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[Crossref]

G. Unnikrishnan and K. Singh, “Optical encryption using quadratic phase
systems,” Opt. Commun. 193, 51–67 (2001).

[Crossref]

Y. Guo, Q. Huang, J. Du, and Y. Zhang, “Decomposition storage of information based
on computer-generated hologram interference and its application in optical image
encryption,” Appl. Opt. 40, 2860–2863 (2001).

[Crossref]

B. Javidi and N. Takanori, “Securing information by use of digital
holography,” Opt. Lett. 25, 28–30 (2000).

[Crossref]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information
with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption. by double-random phase
encoding in the fractional Fourier domain,” Opt.
Lett. 25, 887–889 (2000).

[Crossref]

J. M. Kilpatrick, A. J. Moore, J. S. Barton, J. D. C. Jones, M. Reeves, and C. Buckberry, “Measurement of complex surface deformation
by high-speed dynamic phase-stepped digital speckle pattern
interferometry,” Opt. Lett. 25, 1068–1070 (2000).

[Crossref]

T. E. Carlsson and A. Wei, “Phase evaluation of speckle patterns during
continuous deformation by use of phase-shifting speckle
interferometry,” Appl. Opt. 39, 2628–2637 (2000).

[Crossref]

B. Javidi and E. Tajahuerce, “Three-dimensional object recognition by use
of digital holography,” Opt. Lett. 25, 610–612 (2000).

[Crossref]

T. Nomura and B. Javidi, “Optical encryption using a joint transform
correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[Crossref]

A. Hyvarinen and E. Oja, “Independent component analysis: algorithms
and applications,” Neural Networks 13, 411–430 (2000).

[Crossref]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on
multifractional Fourier transforms,” Opt.
Lett. 25, 1159–1161 (2000).

[Crossref]

A. Bilgin, G. Zweig, and M. W. Marcellin, “Three-dimensional image compression with
integer wavelet transforms,” Appl. Opt. 39, 1799–1814 (2000).

[Crossref]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems
based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[Crossref]

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

R. Shahnaz, J. F. Walkup, and T. F. Krile, “Image compression in signal-dependent
noise,” Appl. Opt. 38, 5560–5567 (1999).

[Crossref]

F. Domingo and C. Saloma, “Image compression by vector quantization
with noniterative derivation of a codebook: applications to video and confocal
images,” Appl. Opt. 38, 3735–3744 (1999).

[Crossref]

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical memory system using
three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[Crossref]

N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image
processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical storage with angular
multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[Crossref]

J. L. de Bougrenet de la Tocnaye, E. Quémener, and Y. Pétillot, “Composite versus multichannel binary
phase-only filtering,” Appl. Opt. 36, 6646–6653 (1997).

[Crossref]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[Crossref]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[Crossref]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[Crossref]

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[Crossref]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption
using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[Crossref]

P. Refrégiér and B. Javidi, “Optical image encryption based on input
plane and Fourier plane random encoding,” Opt.
Lett. 20, 767–769 (1995).

[Crossref]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[Crossref]

D. Coppersmith, “The Data Encryption Standard (DES) and its
strength against attacks,” IBM J. Res.
Dev. 38, 243–250 (1994).

P. Comon, “Independent component analysis, a new
concept?,” Signal Process. 36, 287–314 (1994).

[Crossref]

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[Crossref]

B. Landreth and G. Modde, “Gray scale response from optically addressed
spatial light modulators incorporating surface-stabilized ferroelectric liquid
crystals,” Appl. Opt. 31, 3937–3944 (1992).

[Crossref]

B. V. K. V. Kumar, “Tutorial survey of composite filter designs
for optical correlators,” Appl. Opt. 31, 4773–4801 (1992).

[Crossref]

J. L. Horner, “Metrics for assessing pattern-recognition
performance,” Appl. Opt. 31, 165–166 (1992).

[Crossref]

J. D. He and E. L. Dereniak, “Error-free image compression algorithm using
classifying-sequencing techniques,” Appl.
Opt. 31, 2554–2559 (1992).

[Crossref]

C. Jutten and J. Herault, “Blind separation of sources, Part 1: an
adaptive algorithm based on neuromimetic architecture,” Signal Process. 24, 1–10 (1991).

[Crossref]

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

A. V. Oppenheim and J. S. Lim, “The importance of phase in
signals,” Proc. IEEE 69, 529–541 (1981).

[Crossref]

J. Ziv and A. Lempel, “A universal algorithm for sequential data
compression,” IEEE Trans. Inf. Theory IT-23, 337–343 (1977).

A. B. VanderLugt, “Signal detection by complex spatial
filtering,” IEEE Trans. Inf. Theory IT-10, 139–145 (1964).

[Crossref]

D. A. Huffman, “A method for the construction of minimum
redundancy codes,” Proc. IRE 40, 1098–1101 (1952).

D. Gabor, “A new microscopic
principle,” Nature 161, 777–778 (1948).

[Crossref]

D. Abookasis, A. Batikoff, H. Famini, and J. Rosen, “Performance comparison of iterative
algorithms for generating digital correlation holograms used in optical security
systems,” Appl. Opt. 45, 4617–4624 (2006).

[Crossref]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and
deciphered by a modified joint-transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[Crossref]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures
and public-key cryptosystems,” Commun.
ACM 20, 120–126 (1978).

[Crossref]

M. Nazrul Islam and M. S. Alam, “Optical security system employing shifted
phase-encoded joint transform correlation,” Opt.
Commun. 281, 248–254 (2008).

[Crossref]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[Crossref]

A. R. Alsamman and M. S. Alam, “Face recognition through pose estimation and
fringe-adjusted joint transform correlation,” Opt.
Eng. 42, 560–567 (2003).

[Crossref]

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[Crossref]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[Crossref]

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[Crossref]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[Crossref]

A. Alfalou and A. Mansour, “All-optical video-image encryption with
enforced security level using independent component
analysis,” J. Opt. A Pure Appl. Opt. 9, 787–796 (2007).

[Crossref]

A. Alfalou and A. Alkholidi, “Implementation of an all-optical image
compression architecture based on Fourier transform which will be the core
principle in the realisation of DCT,” Proc.
SPIE 5823, 183–190 (2005).

[Crossref]

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[Crossref]

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[Crossref]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[Crossref]

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

A. Alfalou and A. Mansour, “New Image Encryption Method Based on
ICA,” in Proceedings of the 10th IAPR Conference
on Machine Vision Applications, J. Tajima, ed. (International Association for Pattern Recognition, 2007), pp. 16–18.

A. Mansour and A. Alfalou, “Performance indices of BSS for real-world
applications,” in Proceedings of the 14th European
Signal Processing Conference (EUSIPCO 2006), Proceedings on CD (EURASIP, 2006).

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

A. Boumezzough, A. Alfalou, and C. Collet, “Optical image compression based on filtering
of the redundant information in Fourier domain with a segmented amplitude mask
(SAM),” in Proceedings of Complex Systems,
Intelligence and Modern Technological Applications, M. Rouff and M. Cotsaftis, eds (Society of Environmental Engineers, 2004), pp. 566–570.

A. Cottour, A. Alfalou, and H. Hamam, “Optical video image compression: a
multiplexing method based on the spectral fusion of
information,” in 3rd International Conference on
Information and Communication Technologies: from Theory to Applications, 2008.
ICTTA 2008 (IEEE, 2008), pp. 1–6.

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[Crossref]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[Crossref]

A. Alfalou and A. Alkholidi, “Implementation of an all-optical image
compression architecture based on Fourier transform which will be the core
principle in the realisation of DCT,” Proc.
SPIE 5823, 183–190 (2005).

[Crossref]

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

A. R. Alsamman and M. S. Alam, “Face recognition through pose estimation and
fringe-adjusted joint transform correlation,” Opt.
Eng. 42, 560–567 (2003).

[Crossref]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[Crossref]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[Crossref]

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[Crossref]

S. G. Batsell, J. F. Walkup, and T. F. Krile, Design Issues in Optical Processing (Cambridge Univ. Press, 1995).

B.-E. Benkelfat, E. H. Horache, and Q. Zou, “Multiplex signal processing in optical
pattern recognition,” in Proceeding of Optics and
Optoelectronics, Theory, Devices and Applications, O. P. Nijhanram, A. K. Gupta, A. K. Musla, Kehar Singh, eds. (Narosa, 1999), pp. 84–87.

V. Bhaskaran and K. Konstantinides, Image and Video Compression Standards, 2nd ed. (Kluwer Academic, 1997).

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

A. Boumezzough, A. Alfalou, and C. Collet, “Optical image compression based on filtering
of the redundant information in Fourier domain with a segmented amplitude mask
(SAM),” in Proceedings of Complex Systems,
Intelligence and Modern Technological Applications, M. Rouff and M. Cotsaftis, eds (Society of Environmental Engineers, 2004), pp. 566–570.

M. Burrows and D. J. Wheeler, “A block-sorting lossless data compression
algorithm,” SRC Research Report (Digital Systems Research Center, May 10, 1994).

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[Crossref]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[Crossref]

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[Crossref]

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

X. Wang and Y. Chen, “Securing information using digital
optics,” J. Opt. A Pure Appl. Opt. 9, 152–155 (2007).

[Crossref]

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

A. Boumezzough, A. Alfalou, and C. Collet, “Optical image compression based on filtering
of the redundant information in Fourier domain with a segmented amplitude mask
(SAM),” in Proceedings of Complex Systems,
Intelligence and Modern Technological Applications, M. Rouff and M. Cotsaftis, eds (Society of Environmental Engineers, 2004), pp. 566–570.

P. Comon, “Independent component analysis, a new
concept?,” Signal Process. 36, 287–314 (1994).

[Crossref]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[Crossref]

D. Coppersmith, “The Data Encryption Standard (DES) and its
strength against attacks,” IBM J. Res.
Dev. 38, 243–250 (1994).

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[Crossref]

A. Cottour, A. Alfalou, and H. Hamam, “Optical video image compression: a
multiplexing method based on the spectral fusion of
information,” in 3rd International Conference on
Information and Communication Technologies: from Theory to Applications, 2008.
ICTTA 2008 (IEEE, 2008), pp. 1–6.

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[Crossref]

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[Crossref]

E. Darakis and J. J. Soraghan, “Reconstruction domain compression of
phase-shifting digital holograms,” Appl.
Opt. 46, 351–356 (2007).

[Crossref]

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[Crossref]

E. Darakis and J. J. Soraghan, “Compression of interference patterns with
application to phase-shifting digital holography,” Appl. Opt. 45, 2437–2443 (2006).

[Crossref]

E. Darakis and J. J. Soraghan, “Compression of phase-shifting digital
holography interference patterns,” Proc.
SPIE 6187, 61870Y (2006).

[Crossref]

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[Crossref]

J. L. de Bougrenet de la Tocnaye, E. Quémener, and Y. Pétillot, “Composite versus multichannel binary
phase-only filtering,” Appl. Opt. 36, 6646–6653 (1997).

[Crossref]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[Crossref]

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[Crossref]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[Crossref]

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[Crossref]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[Crossref]

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[Crossref]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[Crossref]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[Crossref]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[Crossref]

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[Crossref]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[Crossref]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[Crossref]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[Crossref]

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

D. Gabor, “A new microscopic
principle,” Nature 161, 777–778 (1948).

[Crossref]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[Crossref]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[Crossref]

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[Crossref]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[Crossref]

H. Guitter, La Compression des Images Numériques (Hermes, 1995).

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[Crossref]

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[Crossref]

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[Crossref]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[Crossref]

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[Crossref]

A. Cottour, A. Alfalou, and H. Hamam, “Optical video image compression: a
multiplexing method based on the spectral fusion of
information,” in 3rd International Conference on
Information and Communication Technologies: from Theory to Applications, 2008.
ICTTA 2008 (IEEE, 2008), pp. 1–6.

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[Crossref]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[Crossref]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

B. M. Hennelly and J. T. Sheridan, “Image encryption techniques based on
fractional Fourier transform,” Proc. SPIE 5202, 76–87 (2003).

[Crossref]

C. Jutten and J. Herault, “Blind separation of sources, Part 1: an
adaptive algorithm based on neuromimetic architecture,” Signal Process. 24, 1–10 (1991).

[Crossref]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[Crossref]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[Crossref]

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

B.-E. Benkelfat, E. H. Horache, and Q. Zou, “Multiplex signal processing in optical
pattern recognition,” in Proceeding of Optics and
Optoelectronics, Theory, Devices and Applications, O. P. Nijhanram, A. K. Gupta, A. K. Musla, Kehar Singh, eds. (Narosa, 1999), pp. 84–87.

E. H. Horache, “Optical multiplex correlation based in
spatial coherent modulation for wide spectral sources: applications for pattern
recognition,” Ph.D. thesis (University of Marne-La-Vallée, 2001).

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

D. A. Huffman, “A method for the construction of minimum
redundancy codes,” Proc. IRE 40, 1098–1101 (1952).

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[Crossref]

A. Hyvarinen and E. Oja, “Independent component analysis: algorithms
and applications,” Neural Networks 13, 411–430 (2000).

[Crossref]

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[Crossref]

B. Tavakoli, M. Daneshpanah, B. Javidi, and E. Watson, “Performance of 3D integral imaging with
position uncertainty,” Opt. Express 15, 11889–11902 (2007).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[Crossref]

S. Yeom, A. Stern, and B. Javidi, “Compression of 3D color integral
images,” Opt. Express 12, 1632–1642 (2004).

[Crossref]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random
phase key codes by use of a configuration of a joint transform
correlator,” Appl. Opt. 42, 1508–1514 (2003).

[Crossref]

T. J. Naughton, John B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[Crossref]

T. J. Naughton, J. B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[Crossref]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital
holograms for secure real-time display,” Opt.
Lett. 27, 321–323 (2002).

[Crossref]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[Crossref]

S. Kishk and B. Javidi, “Information hiding technique with double
phase encoding,” Appl. Opt. 41, 5462–5470 (2002).

[Crossref]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[Crossref]

B. Javidi and E. Tajahuerce, “Three-dimensional object recognition by use
of digital holography,” Opt. Lett. 25, 610–612 (2000).

[Crossref]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information
with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[Crossref]

T. Nomura and B. Javidi, “Optical encryption using a joint transform
correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[Crossref]

B. Javidi and N. Takanori, “Securing information by use of digital
holography,” Opt. Lett. 25, 28–30 (2000).

[Crossref]

N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image
processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical memory system using
three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical storage with angular
multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[Crossref]

F. Goudail, F. Bollaro, B. Javidi, and P. Réfrégier, “Influence of a perturbation in a double
phase-encoding system,” J. Opt. Soc. Am.
A 15, 2629–2638 (1998).

[Crossref]

P. Refrégiér and B. Javidi, “Optical image encryption based on input
plane and Fourier plane random encoding,” Opt.
Lett. 20, 767–769 (1995).

[Crossref]

B. Javidi, “Nonlinear joint power spectrum based optical
correlation,” Appl. Opt. 28, 2358–2367 (1989).

[Crossref]

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[Crossref]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[Crossref]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[Crossref]

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[Crossref]

R. M. Turner, K. M. Johnson, and S. Serati, High Speed Compact Optical Correlator Design and
Implementation (Cambridge Univ. Press, 1995).

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption. by double-random phase
encoding in the fractional Fourier domain,” Opt.
Lett. 25, 887–889 (2000).

[Crossref]

M. Joshi, Chandrashakher K. Singh, “Color image encryption and decryption for
twin images in fractional Fourier domain,” Opt.
Commun. 281, 5713–5720 (2008).

[Crossref]

M. Joshia, Chandrashakherb K. Singh, “Color image encryption and decryption using
fractional Fourier transform,” Opt.
Commun. 279, 34–42 (2007).

C. Jutten and J. Herault, “Blind separation of sources, Part 1: an
adaptive algorithm based on neuromimetic architecture,” Signal Process. 24, 1–10 (1991).

[Crossref]

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

A. Mansour and M. Kawamoto, “ICA papers classified according to their
applications and performances,” IEICE Trans.
Fundamentals E86-A, 620–633 (2003).

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[Crossref]

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[Crossref]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[Crossref]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[Crossref]

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[Crossref]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[Crossref]

V. Bhaskaran and K. Konstantinides, Image and Video Compression Standards, 2nd ed. (Kluwer Academic, 1997).

J. Ziv and A. Lempel, “A universal algorithm for sequential data
compression,” IEEE Trans. Inf. Theory IT-23, 337–343 (1977).

A. V. Oppenheim and J. S. Lim, “The importance of phase in
signals,” Proc. IEEE 69, 529–541 (1981).

[Crossref]

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[Crossref]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[Crossref]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[Crossref]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[Crossref]

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and
multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[Crossref]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on
multifractional Fourier transforms,” Opt.
Lett. 25, 1159–1161 (2000).

[Crossref]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[Crossref]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[Crossref]

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[Crossref]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[Crossref]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[Crossref]

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

A. Alfalou and A. Mansour, “All-optical video-image encryption with
enforced security level using independent component
analysis,” J. Opt. A Pure Appl. Opt. 9, 787–796 (2007).

[Crossref]

A. Mansour and M. Kawamoto, “ICA papers classified according to their
applications and performances,” IEICE Trans.
Fundamentals E86-A, 620–633 (2003).

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

A. Mansour and A. Alfalou, “Performance indices of BSS for real-world
applications,” in Proceedings of the 14th European
Signal Processing Conference (EUSIPCO 2006), Proceedings on CD (EURASIP, 2006).

A. Alfalou and A. Mansour, “New Image Encryption Method Based on
ICA,” in Proceedings of the 10th IAPR Conference
on Machine Vision Applications, J. Tajima, ed. (International Association for Pattern Recognition, 2007), pp. 16–18.

J. C. Dagher, M. W. Marcellin, and M. A. Neifeld, “Efficient storage and transmission of ladar
imagery,” Appl. Opt. 42, 7023–7035 (2003).

[Crossref]

A. Bilgin, G. Zweig, and M. W. Marcellin, “Three-dimensional image compression with
integer wavelet transforms,” Appl. Opt. 39, 1799–1814 (2000).

[Crossref]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital
holograms for secure real-time display,” Opt.
Lett. 27, 321–323 (2002).

[Crossref]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical storage with angular
multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical memory system using
three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[Crossref]

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[Crossref]

L. P. Yaroslavskii and N. S. Merzlyakov, Methods of Digital Holography (Izdatel’stvo Nauka, 1977), in Russian.

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[Crossref]

W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard (Van Nostrand Reinhold, 1993).

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[Crossref]

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[Crossref]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[Crossref]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[Crossref]

T. J. Naughton, John B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[Crossref]

T. J. Naughton, J. B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[Crossref]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[Crossref]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[Crossref]

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

M. Nazrul Islam and M. S. Alam, “Optical security system employing shifted
phase-encoded joint transform correlation,” Opt.
Commun. 281, 248–254 (2008).

[Crossref]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[Crossref]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption
using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[Crossref]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[Crossref]

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

A. Hyvarinen and E. Oja, “Independent component analysis: algorithms
and applications,” Neural Networks 13, 411–430 (2000).

[Crossref]

A. V. Oppenheim and J. S. Lim, “The importance of phase in
signals,” Proc. IEEE 69, 529–541 (1981).

[Crossref]

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[Crossref]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[Crossref]

W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard (Van Nostrand Reinhold, 1993).

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[Crossref]

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[Crossref]

J. H. Reif and A. Yoshida, “Optical techniques for image
compression,” in Data Compression Conference,
1992. DCC '92 (IEEE, 1992), pp. 32–40.

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures
and public-key cryptosystems,” Commun.
ACM 20, 120–126 (1978).

[Crossref]

D. Abookasis, A. Batikoff, H. Famini, and J. Rosen, “Performance comparison of iterative
algorithms for generating digital correlation holograms used in optical security
systems,” Appl. Opt. 45, 4617–4624 (2006).

[Crossref]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and
deciphered by a modified joint-transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[Crossref]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems
based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[Crossref]

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[Crossref]

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[Crossref]

R. M. Turner, K. M. Johnson, and S. Serati, High Speed Compact Optical Correlator Design and
Implementation (Cambridge Univ. Press, 1995).

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[Crossref]

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures
and public-key cryptosystems,” Commun.
ACM 20, 120–126 (1978).

[Crossref]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[Crossref]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[Crossref]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption
using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[Crossref]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[Crossref]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[Crossref]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting
in fractional Fourier domains,” Opt.
Lett. 28, 269–271 (2003).

[Crossref]

B. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier
transform,” Optik (Stuttgart) 114, 251–265 (2003).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Image encryption techniques based on
fractional Fourier transform,” Proc. SPIE 5202, 76–87 (2003).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[Crossref]

M. Joshi, Chandrashakher K. Singh, “Color image encryption and decryption for
twin images in fractional Fourier domain,” Opt.
Commun. 281, 5713–5720 (2008).

[Crossref]

M. Joshia, Chandrashakherb K. Singh, “Color image encryption and decryption using
fractional Fourier transform,” Opt.
Commun. 279, 34–42 (2007).

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[Crossref]

G. Unnikrishnan and K. Singh, “Optical encryption using quadratic phase
systems,” Opt. Commun. 193, 51–67 (2001).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption. by double-random phase
encoding in the fractional Fourier domain,” Opt.
Lett. 25, 887–889 (2000).

[Crossref]

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[Crossref]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[Crossref]

E. Darakis and J. J. Soraghan, “Reconstruction domain compression of
phase-shifting digital holograms,” Appl.
Opt. 46, 351–356 (2007).

[Crossref]

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[Crossref]

E. Darakis and J. J. Soraghan, “Compression of phase-shifting digital
holography interference patterns,” Proc.
SPIE 6187, 61870Y (2006).

[Crossref]

E. Darakis and J. J. Soraghan, “Compression of interference patterns with
application to phase-shifting digital holography,” Appl. Opt. 45, 2437–2443 (2006).

[Crossref]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[Crossref]

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[Crossref]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[Crossref]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[Crossref]

B. Javidi and E. Tajahuerce, “Three-dimensional object recognition by use
of digital holography,” Opt. Lett. 25, 610–612 (2000).

[Crossref]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information
with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[Crossref]

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

R. M. Turner, K. M. Johnson, and S. Serati, High Speed Compact Optical Correlator Design and
Implementation (Cambridge Univ. Press, 1995).

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[Crossref]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[Crossref]

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

A. B. VanderLugt, “Signal detection by complex spatial
filtering,” IEEE Trans. Inf. Theory IT-10, 139–145 (1964).

[Crossref]

X. Wang and Y. Chen, “Securing information using digital
optics,” J. Opt. A Pure Appl. Opt. 9, 152–155 (2007).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

T. A. Welch, “A technique for high performance data
compression,” Computer 17, 8–19 (1984).

M. Burrows and D. J. Wheeler, “A block-sorting lossless data compression
algorithm,” SRC Research Report (Digital Systems Research Center, May 10, 1994).

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[Crossref]

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[Crossref]

I. Yamaguchi, K. Yamamoto, G. A. Mills, and M. Yokota, “Image reconstruction only by phase data in
phase-shifting digital holography,” Appl.
Opt. 45, 975–983 (2006).

[Crossref]

G. A. Mills and I. Yamaguchi, “Effects of quantization in phase-shifting
digital holography,” Appl. Opt. 44, 1216–1225 (2005).

[Crossref]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[Crossref]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[Crossref]

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[Crossref]

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[Crossref]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[Crossref]

L. P. Yaroslavskii and N. S. Merzlyakov, Methods of Digital Holography (Izdatel’stvo Nauka, 1977), in Russian.

J. H. Reif and A. Yoshida, “Optical techniques for image
compression,” in Data Compression Conference,
1992. DCC '92 (IEEE, 1992), pp. 32–40.

R. K. Young, Wavelet Theory and Its Applications (Kluwer Academic, 1993).

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and
multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[Crossref]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on
multifractional Fourier transforms,” Opt.
Lett. 25, 1159–1161 (2000).

[Crossref]

J. Ziv and A. Lempel, “A universal algorithm for sequential data
compression,” IEEE Trans. Inf. Theory IT-23, 337–343 (1977).

B.-E. Benkelfat, E. H. Horache, and Q. Zou, “Multiplex signal processing in optical
pattern recognition,” in Proceeding of Optics and
Optoelectronics, Theory, Devices and Applications, O. P. Nijhanram, A. K. Gupta, A. K. Musla, Kehar Singh, eds. (Narosa, 1999), pp. 84–87.

B. Javidi, S. F. Odeh, and Y. F. Chen, “Rotation and scale sensitivities of the
binary phase-only filter.” Appl. Opt. 65, 233–238 (1988).

Feature issue on Task Specific Sensing, Appl. Opt. 45, 2857–3070 (2006).

D. J. McKnight, K. M. Johnson, and R. A. Serati, “256×256 liquid-crystal-on-silicon spatial light
modulator,” Appl. Opt. 39, 2775–2783 (1994).

[Crossref]

D. W. Robinson, “Automatic fringe analysis with a computer
image processing system,” Appl. Opt. 22, 2169–2176 (1983).

[Crossref]

J. L. Horner and P. D. Gianino, “Phase-only matched
filtering,” Appl. Opt. 23, 812–816 (1984).

[Crossref]

K. Creath, “Phase shifting speckle
interferometry,” Appl. Opt. 24, 3053–3058 (1985).

[Crossref]

B. Javidi, “Nonlinear joint power spectrum based optical
correlation,” Appl. Opt. 28, 2358–2367 (1989).

[Crossref]

B. V. K. Vijaya Kumar and L. Hassebrook, “Performance measures for correlation
filters,” Appl. Opt. 29, 2997–3006 (1990).

[Crossref]

J. D. He and E. L. Dereniak, “Error-free image compression algorithm using
classifying-sequencing techniques,” Appl.
Opt. 31, 2554–2559 (1992).

[Crossref]

B. Landreth and G. Modde, “Gray scale response from optically addressed
spatial light modulators incorporating surface-stabilized ferroelectric liquid
crystals,” Appl. Opt. 31, 3937–3944 (1992).

[Crossref]

B. V. K. V. Kumar, “Tutorial survey of composite filter designs
for optical correlators,” Appl. Opt. 31, 4773–4801 (1992).

[Crossref]

J. M. Huntley and H. Saldner, “Temporal phase unwrapping algorithm for
automated interferogram analysis,” Appl.
Opt. 32, 3047–3052 (1993).

[Crossref]

J. L. de Bougrenet de la Tocnaye, E. Quémener, and Y. Pétillot, “Composite versus multichannel binary
phase-only filtering,” Appl. Opt. 36, 6646–6653 (1997).

[Crossref]

F. Domingo and C. Saloma, “Image compression by vector quantization
with noniterative derivation of a codebook: applications to video and confocal
images,” Appl. Opt. 38, 3735–3744 (1999).

[Crossref]

R. Shahnaz, J. F. Walkup, and T. F. Krile, “Image compression in signal-dependent
noise,” Appl. Opt. 38, 5560–5567 (1999).

[Crossref]

A. Bilgin, G. Zweig, and M. W. Marcellin, “Three-dimensional image compression with
integer wavelet transforms,” Appl. Opt. 39, 1799–1814 (2000).

[Crossref]

G. Keryer, J. L. de Bougrenet de la Tocnaye, and A. Alfalou, “Performance comparison of ferroelectric
liquid-crystal-technology-based coherent optical multichannel
correlators,” Appl. Opt. 36, 3043–3055 (1997).

[Crossref]

A. Alfalou, G. Keryer, and J. L. de Bougrenet de la Tocnaye, “Optical implementation of segmented
composite filtering,” Appl. Opt. 38, 6129–6136 (1999).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical storage with angular
multiplexing,” Appl. Opt. 38, 7288–7293 (1999).

[Crossref]

Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems
based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).

[Crossref]

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information
with digital holography,” Appl. Opt. 39, 6595–6601 (2000).

[Crossref]

T. E. Carlsson and A. Wei, “Phase evaluation of speckle patterns during
continuous deformation by use of phase-shifting speckle
interferometry,” Appl. Opt. 39, 2628–2637 (2000).

[Crossref]

Y. Guo, Q. Huang, J. Du, and Y. Zhang, “Decomposition storage of information based
on computer-generated hologram interference and its application in optical image
encryption,” Appl. Opt. 40, 2860–2863 (2001).

[Crossref]

Y. Frauel, E. Tajahuerce, M. A. Castro, and B. Javidi, “Distortion-tolerant three-dimensional object
recognition with digital holography,” Appl.
Opt. 40, 3887–3893 (2001).

[Crossref]

T. J. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4131 (2002).

[Crossref]

S. Kishk and B. Javidi, “Information hiding technique with double
phase encoding,” Appl. Opt. 41, 5462–5470 (2002).

[Crossref]

O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and J. Bahram, “Real-time three-dimensional object
reconstruction by use of a phase-encoded digital
hologram,” Appl. Opt. 41, 6187–6192 (2002).

[Crossref]

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random
phase key codes by use of a configuration of a joint transform
correlator,” Appl. Opt. 42, 1508–1514 (2003).

[Crossref]

T. J. Naughton, John B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[Crossref]

T. J. Naughton, J. B. McDonald, and B. Javidi, “Efficient compression of Fresnel fields for
Internet transmission of three-dimensional images,” Appl. Opt. 42, 4758–4764 (2003).

[Crossref]

J. C. Dagher, M. W. Marcellin, and M. A. Neifeld, “Efficient storage and transmission of ladar
imagery,” Appl. Opt. 42, 7023–7035 (2003).

[Crossref]

L. Cai, M. He, Q. Liu, and X. Yang, “Digital image encryption and watermarking by
phase-shifting interferometry,” Appl.
Opt. 43, 3078–3084 (2004).

[Crossref]

A. Zlotnik, Z. Zalevsky, and E. Marom, “Optical encryption by using a synthesized
mutual intensity function,” Appl. Opt. 43, 3456–3465 (2004).

[Crossref]

S. L. Wijaya, M. Savvides, and B. V. K. Vijaya Kumar, “Illumination-tolerant face verification of
low-bit-rate JPEG2000 wavelet images with advanced correlation filters for
handheld devices,” Appl. Opt. 44, 655–665 (2005).

[Crossref]

G. A. Mills and I. Yamaguchi, “Effects of quantization in phase-shifting
digital holography,” Appl. Opt. 44, 1216–1225 (2005).

[Crossref]

M. He, L. Cai, Q. Liu, and X. Yang, “Phase-only encryption and watermarking based
on phase-shifting interferometry,” Appl.
Opt. 44, 2600–2606 (2005).

[Crossref]

D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and
deciphered by a modified joint-transform correlator,” Appl. Opt. 44, 3019–3023 (2005).

[Crossref]

H. T. Chang and C. L. Tsan, “Image watermarking by use of digital
holography embedded in the discrete-cosine-transform
domain,” Appl. Opt. 44, 6211–6219 (2005).

[Crossref]

T. W. Ng and K. T. Ang, “Fourier-transform method of data compres
sion and temporal fringe pattern analysis,” Appl.
Opt. 44, 7043–7049 (2005).

[Crossref]

C. Kohler, X. Schwab, and W. Osten, “Optimally tuned spatial light modulators for
digital holography,” Appl. Opt. 45, 960–967 (2006).

[Crossref]

I. Yamaguchi, K. Yamamoto, G. A. Mills, and M. Yokota, “Image reconstruction only by phase data in
phase-shifting digital holography,” Appl.
Opt. 45, 975–983 (2006).

[Crossref]

E. Darakis and J. J. Soraghan, “Compression of interference patterns with
application to phase-shifting digital holography,” Appl. Opt. 45, 2437–2443 (2006).

[Crossref]

Z. Xin, Y. S. Wei, and X. Jian, “Affine cryptosystem of double-random-phase
encryption based on the fractional Fourier transform,” Appl. Opt. 45, 8434–8439 (2006).

[Crossref]

E. Darakis and J. J. Soraghan, “Reconstruction domain compression of
phase-shifting digital holograms,” Appl.
Opt. 46, 351–356 (2007).

[Crossref]

S. Yuan, X. Zhou, D.-H. Li, and D.-F. Zhou, “Simultaneous transmission for an encrypted
image and a double random-phase encryption key,” Appl. Opt. 46, 3747–3753 (2007).

[Crossref]

E. Darakis, T. J. Naughton, and J. J. Soraghan, “Compression defects in different
reconstructions from phase-shifting digital holographic
data,” Appl. Opt. 46, 4579–4586 (2007).

[Crossref]

D. Abookasis, A. Batikoff, H. Famini, and J. Rosen, “Performance comparison of iterative
algorithms for generating digital correlation holograms used in optical security
systems,” Appl. Opt. 45, 4617–4624 (2006).

[Crossref]

U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of
two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006).

[Crossref]

D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase
encryption technique,” Appl. Opt. 46, 6641–6647 (2007).

[Crossref]

J. L. Horner, “Metrics for assessing pattern-recognition
performance,” Appl. Opt. 31, 165–166 (1992).

[Crossref]

C. S. Weaver and J. W. Goodman, “A technique for optically convolving two
functions,” Appl. Opt. 5, 1248–1249 (1966).

[Crossref]

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures
and public-key cryptosystems,” Commun.
ACM 20, 120–126 (1978).

[Crossref]

C. Slinger, C. Cameron, and M. Stanley, “Computer-generated holography as a generic
display technology,” Computer 38, 46–53 (2005).

T. A. Welch, “A technique for high performance data
compression,” Computer 17, 8–19 (1984).

A. Alkholidi, A. Cottour, A. Alfalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based
on the JPEG2000 standards,” Eur. Phys. J. Appl.
Phys. 44, 261–272 (2008).

[Crossref]

D. Coppersmith, “The Data Encryption Standard (DES) and its
strength against attacks,” IBM J. Res.
Dev. 38, 243–250 (1994).

J. Ziv and A. Lempel, “A universal algorithm for sequential data
compression,” IEEE Trans. Inf. Theory IT-23, 337–343 (1977).

A. B. VanderLugt, “Signal detection by complex spatial
filtering,” IEEE Trans. Inf. Theory IT-10, 139–145 (1964).

[Crossref]

A. Mansour, A. Kardec Barros, and N. Ohnishi, “Blind separation of sources: methods,
assumptions and applications,” IEICE Trans.
Fundamentals E83-A, 1498–512 (2000).

A. Mansour and M. Kawamoto, “ICA papers classified according to their
applications and performances,” IEICE Trans.
Fundamentals E86-A, 620–633 (2003).

A. Loussert, A. Alfalou, R. El Sawda, and A. Alkholidi, “Enhanced system for image’s
compression and encryption by addition of biometric
characteristics,” Int. J. Software Eng. Its
Appl. 2, 111–118 (2008).

M. Kessels, M. El Bouz-Alfalou, R. Pagan, and K. Heggarty, “Versatile stepper based maskless
microlithography using a liquid crystal display for direct-write of binary and
multi-level microstructures,” J. Micro/Nanolith.
MEMS MOEMS 6 (2007).

[Crossref]

A. Alfalou, M. Elbouz, and H. Hamam, “Segmented phase-only filter binarized with a
new error diffusion approach,” J. Opt. A Pure
Appl. Opt. 7, 183–191 (2005).

[Crossref]

A. Alfalou and A. Mansour, “All-optical video-image encryption with
enforced security level using independent component
analysis,” J. Opt. A Pure Appl. Opt. 9, 787–796 (2007).

[Crossref]

S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on
segmentation of the Fourier plane: new approaches and critical
analysis,” J. Opt. A Pure Appl. Opt. 9, 73–80 (2007).

[Crossref]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a
multi-wavelength approach and a joint transform
correlator,” J. Opt. A Pure Appl. Opt. 10, 104031–104035 (2008).

[Crossref]

X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, “Cross-talk-free double-image encryption and
watermarking with amplitude-phase separate modulations,” J. Opt. A Pure Appl. Opt. 7, 624–631 (2005).

[Crossref]

X. Wang and Y. Chen, “Securing information using digital
optics,” J. Opt. A Pure Appl. Opt. 9, 152–155 (2007).

[Crossref]

N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image
processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).

[Crossref]

F. Goudail, F. Bollaro, B. Javidi, and P. Réfrégier, “Influence of a perturbation in a double
phase-encoding system,” J. Opt. Soc. Am.
A 15, 2629–2638 (1998).

[Crossref]

D. Gabor, “A new microscopic
principle,” Nature 161, 777–778 (1948).

[Crossref]

A. Hyvarinen and E. Oja, “Independent component analysis: algorithms
and applications,” Neural Networks 13, 411–430 (2000).

[Crossref]

W. Xiaogang, Z. Daomu, and C. Linfei, “Image encryption based on extended
fractional Fourier transform and digital holography
technique,” Opt. Commun. 260, 449–453 (2006).

[Crossref]

M. Joshi, Chandrashakher K. Singh, “Color image encryption and decryption for
twin images in fractional Fourier domain,” Opt.
Commun. 281, 5713–5720 (2008).

[Crossref]

M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking
by random phase matching,” Opt. Commun. 247, 29–37 (2005).

[Crossref]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[Crossref]

N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional
Fourier transform in digital holography,” Opt.
Commun. 235, 253–259 (2004).

[Crossref]

Z. Liu and S. Liu, “Double image encryption based on iterative
fractional Fourier transform,” Opt.
Commun. 275, 324–329 (2007).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an
aperture-modulated optical system,” Opt.
Commun. 261, 29–33 (2006).

[Crossref]

R. Arizaga, R. Henao, and R. Torroba, “Fully digital encryption
technique,” Opt. Commun. 221, 43–47 (2003).

G. Unnikrishnan and K. Singh, “Optical encryption using quadratic phase
systems,” Opt. Commun. 193, 51–67 (2001).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

L. Ding, Y. Yan, Q. Xue, and G. Jin, “Wavelet packet compression for volume
holographic image recognition,” Opt.
Commun. 216, 105–113 (2003).

[Crossref]

Y. Petillot, L. Guibert, and J. L. de Bougrenet de la Tocnaye, “Fingerprint recognition using a partially
rotation invariant composite filter in a FLC JTC,” Opt. Commun. 126, 213–219 (1996).

[Crossref]

M. Madec, W. Uhring, J. B Fasquel, P. Joffre, and Y. Hervé, “Compatibility of temporal multiplexed
spatial light modulator with optical image processing,” Opt. Commun. 275, 27–37 (2007).

[Crossref]

M. Ragulskis, A. Aleksa, and L. Saunoriene, “Improved algorithm for image encryption
based on stochastic geometric moiré and its
application,” Opt. Commun. 273, 370–378 (2007).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using
polarized light,” Opt. Commun. 260, 109–112 (2006).

[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiple-encoding retrieval for optical
security,” Opt. Commun. 276, 231–236 (2007).

[Crossref]

M. Nazrul Islam and M. S. Alam, “Optical security system employing shifted
phase-encoded joint transform correlation,” Opt.
Commun. 281, 248–254 (2008).

[Crossref]

M. R. Haider, M. Nazrul Islam, M. S. Alam, and J. F. Khan, “Shifted phase-encoded fringe-adjusted joint
transform correlation for multiple target detection,” Opt. Commun. 248, 69–88 (2005).

[Crossref]

M. Joshia, Chandrashakherb K. Singh, “Color image encryption and decryption using
fractional Fourier transform,” Opt.
Commun. 279, 34–42 (2007).

A. R. Alsamman and M. S. Alam, “Face recognition through pose estimation and
fringe-adjusted joint transform correlation,” Opt.
Eng. 42, 560–567 (2003).

[Crossref]

M. Madec, J. B. Fasquel, W. Uhring, P. Joffre, and Y. Herve, “Optical implementation of the filtered
backprojection algorithm,” Opt. Eng. 46, 1–16 (2007).

[Crossref]

L. Guibert, G. Keryer, A. Servel, M. Attia, H. Mackenzie, P. Pellat-Finet, and J. L. de Bougrenet de la Tocnaye, “On-board optical joint transform correlator
for real-time road sign recognition,” Opt.
Eng. 34, 101–109 (1995).

[Crossref]

L. G. Neto and Y. Sheng, “Optical implementation of image encryption
using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).

[Crossref]

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint
transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001).

[Crossref]

T. Nomura and B. Javidi, “Optical encryption using a joint transform
correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of digital holograms of
three-dimensional objects using wavelets,” Opt.
Express 14, 2625–2630 (2006).

[Crossref]

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the
Fourier plane encryption algorithm,” Opt.
Express 14, 3181–3186 (2006).

[Crossref]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase
encryption against various attacks,” Opt.
Express 15, 10253–10265 (2007).

[Crossref]

B. Tavakoli, M. Daneshpanah, B. Javidi, and E. Watson, “Performance of 3D integral imaging with
position uncertainty,” Opt. Express 15, 11889–11902 (2007).

[Crossref]

S. Yeom, A. Stern, and B. Javidi, “Compression of 3D color integral
images,” Opt. Express 12, 1632–1642 (2004).

[Crossref]

R. Tao, Y. Xin, and Y. Yang, “Double image encryption based on random
phase encoding in the fractional Fourier domain,” Opt. Express 15, 16067–16079 (2007).

[Crossref]

L. Chen and D. Zhao, “Optical color image encryption by wavelength
multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006).

[Crossref]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel
domain,” Opt. Lett. 29, 1584–1586 (2004).

[Crossref]

B. Javidi and N. Takanori, “Securing information by use of digital
holography,” Opt. Lett. 25, 28–30 (2000).

[Crossref]

B. Javidi and E. Tajahuerce, “Three-dimensional object recognition by use
of digital holography,” Opt. Lett. 25, 610–612 (2000).

[Crossref]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption. by double-random phase
encoding in the fractional Fourier domain,” Opt.
Lett. 25, 887–889 (2000).

[Crossref]

B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting
in fractional Fourier domains,” Opt.
Lett. 28, 269–271 (2003).

[Crossref]

S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and
multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001).

[Crossref]

O. Matoba and B. Javidi, “Optical retrieval of encrypted digital
holograms for secure real-time display,” Opt.
Lett. 27, 321–323 (2002).

[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption
based on double random phase keys,” Opt.
Lett. 31, 1044–1046 (2006).

[Crossref]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks
of optical encryption schemes based on double random phase
keys,” Opt. Lett. 30, 1644–1646 (2005).

[Crossref]

P. Refrégiér and B. Javidi, “Optical image encryption based on input
plane and Fourier plane random encoding,” Opt.
Lett. 20, 767–769 (1995).

[Crossref]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[Crossref]

I. Yamaguchi and T. Zhang, “Phase-shifting digital
holography,” Opt. Lett. 22, 1268–1270 (1997).

[Crossref]

O. Matoba and B. Javidi, “Encrypted optical memory system using
three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).

[Crossref]

J. R. Fienup, “Reconstruction of an object from the modulus
of its Fourier transform,” Opt. Lett. 3, 27–29 (1978).

[Crossref]

W. E. Smith and H. H. Barrett, “Radon transform and bandwidth
compression,” Opt. Lett. 8, 395–397 (1983).

[Crossref]

J. M. Kilpatrick, A. J. Moore, J. S. Barton, J. D. C. Jones, M. Reeves, and C. Buckberry, “Measurement of complex surface deformation
by high-speed dynamic phase-stepped digital speckle pattern
interferometry,” Opt. Lett. 25, 1068–1070 (2000).

[Crossref]

B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on
multifractional Fourier transforms,” Opt.
Lett. 25, 1159–1161 (2000).

[Crossref]

B. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier
transform,” Optik (Stuttgart) 114, 251–265 (2003).

[Crossref]

A. V. Oppenheim and J. S. Lim, “The importance of phase in
signals,” Proc. IEEE 69, 529–541 (1981).

[Crossref]

D. A. Huffman, “A method for the construction of minimum
redundancy codes,” Proc. IRE 40, 1098–1101 (1952).

E. Darakis and J. J. Soraghan, “Compression of phase-shifting digital
holography interference patterns,” Proc.
SPIE 6187, 61870Y (2006).

[Crossref]

A. E. Shortt, T. J. Naughton, and B. Javidi, “Nonuniform quantization compression
techniques for digital holograms of three-dimensional
objects,” Proc. SPIE 5557, 30–41 (2004).

[Crossref]

B. Culshaw, A. G. Mignani, H. Bartelt, and L. R. Jaroszewicz, “Implementation of high-speed imaging
polarimeter using a liquid crystal ferroelectric
modulator,” Proc. SPIE 6189, 618912 (2006).

[Crossref]

S. Coomber, C. Cameron, J. Hughes, D. Sheerin, C. Slinger, M. A. G. Smith, and M. Stanley, “Optically addressed spatial light modulators
for replaying computer-generated holograms,” Proc.
SPIE 4457, 9–19 (2001).

[Crossref]

A. Alfalou and A. Alkholidi, “Implementation of an all-optical image
compression architecture based on Fourier transform which will be the core
principle in the realisation of DCT,” Proc.
SPIE 5823, 183–190 (2005).

[Crossref]

B. M. Hennelly and J. T. Sheridan, “Image encryption techniques based on
fractional Fourier transform,” Proc. SPIE 5202, 76–87 (2003).

[Crossref]

P. Comon, “Independent component analysis, a new
concept?,” Signal Process. 36, 287–314 (1994).

[Crossref]

C. Jutten and J. Herault, “Blind separation of sources, Part 1: an
adaptive algorithm based on neuromimetic architecture,” Signal Process. 24, 1–10 (1991).

[Crossref]

A. Alkholidi, A. Alfalou, and H. Hamam, “A new approach for optical colored image
compression using the JPEG standards,” Signal
Process. 87, 569–583 (2007).

[Crossref]

V. Bhaskaran and K. Konstantinides, Image and Video Compression Standards, 2nd ed. (Kluwer Academic, 1997).

W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard (Van Nostrand Reinhold, 1993).

A. Boumezzough, A. Alfalou, and C. Collet, “Optical image compression based on filtering
of the redundant information in Fourier domain with a segmented amplitude mask
(SAM),” in Proceedings of Complex Systems,
Intelligence and Modern Technological Applications, M. Rouff and M. Cotsaftis, eds (Society of Environmental Engineers, 2004), pp. 566–570.

R. K. Young, Wavelet Theory and Its Applications (Kluwer Academic, 1993).

L. P. Yaroslavskii and N. S. Merzlyakov, Methods of Digital Holography (Izdatel’stvo Nauka, 1977), in Russian.

M. Burrows and D. J. Wheeler, “A block-sorting lossless data compression
algorithm,” SRC Research Report (Digital Systems Research Center, May 10, 1994).

T. J. Naughton, Y. Frauel, O. Matoba, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for
three-dimensional video,” in Three-Dimensional
Television, Video, and Display Technologies, B. Javidi and F. Okano, eds. (Springer-Verlag, 2002), pp. 273–295.

R. M. Turner, K. M. Johnson, and S. Serati, High Speed Compact Optical Correlator Design and
Implementation (Cambridge Univ. Press, 1995).

S. G. Batsell, J. F. Walkup, and T. F. Krile, Design Issues in Optical Processing (Cambridge Univ. Press, 1995).

H. Xu, A. B. Davey, T. D. Wilkinson, W. A. Crossland, J. Chapman, W. L. Duffy, and S. M. Kelly, “Comparison between pixelated-metal-mirrored
and non-mirrored ferroelectric liquid crystal OASLM
devices,” in Proceedings of the 19th International
Liquid Crystal Conference (2004), pp. 527–536.

H. Guitter, La Compression des Images Numériques (Hermes, 1995).

J. Porter, H. Queener, J. E. Lin, K. Thorn, and A. A. S. Awwal, Adaptive Optics for Vision Science: Principles, Practices,
Design, and Applications (Wiley, 2006).

J. W. Goodman, Introduction to Fourier Optics (McGraw-Hill, 1968).

A. Mansour and A. Alfalou, “Performance indices of BSS for real-world
applications,” in Proceedings of the 14th European
Signal Processing Conference (EUSIPCO 2006), Proceedings on CD (EURASIP, 2006).

A. Alfalou, A. Loussert, A. Alkholidi, and R. El Sawda, “System for image compression and encryption
by spectrum fusion in order to optimize image
transmission,” in Future Generation Communication and
Networking (FGCN 2007) (IEEE Computer Society, 2007), vol. 1, pp. 590–593.

R. El Sawda, A. Alfalou, G. Keryer, and A. Assoum, “Image encryption and decryption by means of
an optical phase mask,” in 2nd Information and
Communication Technologies, 2006. ICTTA '06 (IEEE, 2006), Vol. 1, pp. 1474–1477.

A. Alfalou and A. Mansour, “New Image Encryption Method Based on
ICA,” in Proceedings of the 10th IAPR Conference
on Machine Vision Applications, J. Tajima, ed. (International Association for Pattern Recognition, 2007), pp. 16–18.

M. Madec, E. Hueber, W. Uhring, J. B. Fasquel, and Y. Hervé, “Procedures for SLM image quality
improvement,” in Proceedings of the European
Optical Society Annual Meeting, Proceedings on CD (European Optical Society, 2008).

J. H. Reif and A. Yoshida, “Optical techniques for image
compression,” in Data Compression Conference,
1992. DCC '92 (IEEE, 1992), pp. 32–40.

A. Cottour, A. Alfalou, and H. Hamam, “Optical video image compression: a
multiplexing method based on the spectral fusion of
information,” in 3rd International Conference on
Information and Communication Technologies: from Theory to Applications, 2008.
ICTTA 2008 (IEEE, 2008), pp. 1–6.

E. H. Horache, “Optical multiplex correlation based in
spatial coherent modulation for wide spectral sources: applications for pattern
recognition,” Ph.D. thesis (University of Marne-La-Vallée, 2001).

B.-E. Benkelfat, E. H. Horache, and Q. Zou, “Multiplex signal processing in optical
pattern recognition,” in Proceeding of Optics and
Optoelectronics, Theory, Devices and Applications, O. P. Nijhanram, A. K. Gupta, A. K. Musla, Kehar Singh, eds. (Narosa, 1999), pp. 84–87.