N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing,” Opt. Laser Technol. 82, 121–133 (2016).

[Crossref]

X. Li, C. Li, and I.-K. Lee, “Chaotic image encryption using pseudo-random masks and pixel mapping,” Signal Process. 125, 48–63 (2016).

[Crossref]

I. Muniraj, B. Kim, and B. G. Lee, “Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging,” Appl. Opt. 53(27), G25–G32 (2014).

[Crossref]
[PubMed]

Y. Chen, X. Wang, J. Zhang, S. Yu, Q. Zhang, and B. Guo, “Resolution improvement of integral imaging based on time multiplexing sub-pixel coding method on common display panel,” Opt. Express 22(15), 17897–17907 (2014).

[Crossref]
[PubMed]

R. Horisaki, X. Xiao, J. Tanida, and B. Javidi, “Feasibility study for compressive multi-dimensional integral imaging,” Opt. Express 21(4), 4263–4279 (2013).

[Crossref]
[PubMed]

H. Yoo, “Axially moving a lenslet array for high-resolution 3D images in computational integral imaging,” Opt. Express 21(7), 8873–8878 (2013).

[Crossref]
[PubMed]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38(17), 3198–3201 (2013).

[Crossref]
[PubMed]

X. Li and S. Kim, “Optical 3D watermark based digital image watermarking for telemedicine,” Opt. Lasers Eng. 51(12), 1310–1320 (2013).

[Crossref]

J. Li, M. D. Levine, X. An, X. Xu, and H. He, “Visual saliency based on scale-space analysis in the frequency domain,” IEEE Trans. Pattern Anal. Mach. Intell. 35(4), 996–1010 (2013).

[Crossref]
[PubMed]

A. Aggoun, “Compression of 3D integral images using 3D wavelet transform,” J. Disp. Technol. 7(11), 586–592 (2011).

[Crossref]

B. Lee, H. Kang, and E. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Research 1(2), 6–10 (2010).

[Crossref]

D. Hwang, D. Shin, and E. Kim, “A novel three-dimensional digital watermarking scheme basing on integral imaging,” Opt. Commun. 277(1), 40–49 (2007).

[Crossref]

Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32(15), 2088–2090 (2007).

[Crossref]
[PubMed]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007).

[Crossref]
[PubMed]

S. H. Hong, J. S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12(3), 483–491 (2004).

[Crossref]
[PubMed]

S. Yeom, A. Stern, and B. Javidi, “Compression of 3D color integral images,” Opt. Express 12(8), 1632–1642 (2004).

[Crossref]
[PubMed]

S. Liu, Y. Li, and B. Zhu, “Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,” Opt. Commun. 187(3), 57–63 (2001).

[Crossref]

M. Hsieh, D. Tseng, and Y. Huang, “Hiding digital watermarks using multiresolution wavelet transform,” IEEE Trans. Ind. Electron. 48(5), 875–882 (2001).

[Crossref]

L. Itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for rapid scene analysis,” IEEE Trans. Pattern Anal. Mach. Intell. 20(11), 1254–1259 (1998).

[Crossref]

A. Aggoun, “Compression of 3D integral images using 3D wavelet transform,” J. Disp. Technol. 7(11), 586–592 (2011).

[Crossref]

J. Li, M. D. Levine, X. An, X. Xu, and H. He, “Visual saliency based on scale-space analysis in the frequency domain,” IEEE Trans. Pattern Anal. Mach. Intell. 35(4), 996–1010 (2013).

[Crossref]
[PubMed]

N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing,” Opt. Laser Technol. 82, 121–133 (2016).

[Crossref]

H. Wu, J. Zhou, and X. Gong, “A novel image watermarking algorithm based on two-dimensional cellular automata transform,” in Proceedings of Conference of Information Technology and Artificial Intelligence (IEEE, 2011), pp. 206–210.

[Crossref]

J. Li, M. D. Levine, X. An, X. Xu, and H. He, “Visual saliency based on scale-space analysis in the frequency domain,” IEEE Trans. Pattern Anal. Mach. Intell. 35(4), 996–1010 (2013).

[Crossref]
[PubMed]

B. Javidi, R. Ponce-Díaz, and S. H. Hong, “Three-dimensional recognition of occluded objects by using computational integral imaging,” Opt. Lett. 31(8), 1106–1108 (2006).

[Crossref]
[PubMed]

S. H. Hong, J. S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12(3), 483–491 (2004).

[Crossref]
[PubMed]

M. Hsieh, D. Tseng, and Y. Huang, “Hiding digital watermarks using multiresolution wavelet transform,” IEEE Trans. Ind. Electron. 48(5), 875–882 (2001).

[Crossref]

M. Hsieh, D. Tseng, and Y. Huang, “Hiding digital watermarks using multiresolution wavelet transform,” IEEE Trans. Ind. Electron. 48(5), 875–882 (2001).

[Crossref]

D. Hwang, D. Shin, and E. Kim, “A novel three-dimensional digital watermarking scheme basing on integral imaging,” Opt. Commun. 277(1), 40–49 (2007).

[Crossref]

L. Itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for rapid scene analysis,” IEEE Trans. Pattern Anal. Mach. Intell. 20(11), 1254–1259 (1998).

[Crossref]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38(17), 3198–3201 (2013).

[Crossref]
[PubMed]

R. Horisaki, X. Xiao, J. Tanida, and B. Javidi, “Feasibility study for compressive multi-dimensional integral imaging,” Opt. Express 21(4), 4263–4279 (2013).

[Crossref]
[PubMed]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007).

[Crossref]
[PubMed]

B. Javidi, R. Ponce-Díaz, and S. H. Hong, “Three-dimensional recognition of occluded objects by using computational integral imaging,” Opt. Lett. 31(8), 1106–1108 (2006).

[Crossref]
[PubMed]

S. Yeom, A. Stern, and B. Javidi, “Compression of 3D color integral images,” Opt. Express 12(8), 1632–1642 (2004).

[Crossref]
[PubMed]

S. H. Hong, J. S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12(3), 483–491 (2004).

[Crossref]
[PubMed]

A. Stern and B. Javidi, “3-D computational synthetic aperture integral imaging (COMPSAII),” Opt. Express 11(19), 2446–2451 (2003).

[Crossref]
[PubMed]

B. Lee, H. Kang, and E. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Research 1(2), 6–10 (2010).

[Crossref]

B. Lee, H. Kang, and E. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Research 1(2), 6–10 (2010).

[Crossref]

D. Hwang, D. Shin, and E. Kim, “A novel three-dimensional digital watermarking scheme basing on integral imaging,” Opt. Commun. 277(1), 40–49 (2007).

[Crossref]

X. Li and S. Kim, “Optical 3D watermark based digital image watermarking for telemedicine,” Opt. Lasers Eng. 51(12), 1310–1320 (2013).

[Crossref]

L. Itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for rapid scene analysis,” IEEE Trans. Pattern Anal. Mach. Intell. 20(11), 1254–1259 (1998).

[Crossref]

B. Lee, H. Kang, and E. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Research 1(2), 6–10 (2010).

[Crossref]

X. Li, C. Li, and I.-K. Lee, “Chaotic image encryption using pseudo-random masks and pixel mapping,” Signal Process. 125, 48–63 (2016).

[Crossref]

J. Li, M. D. Levine, X. An, X. Xu, and H. He, “Visual saliency based on scale-space analysis in the frequency domain,” IEEE Trans. Pattern Anal. Mach. Intell. 35(4), 996–1010 (2013).

[Crossref]
[PubMed]

X. Li, C. Li, and I.-K. Lee, “Chaotic image encryption using pseudo-random masks and pixel mapping,” Signal Process. 125, 48–63 (2016).

[Crossref]

J. Li, M. D. Levine, X. An, X. Xu, and H. He, “Visual saliency based on scale-space analysis in the frequency domain,” IEEE Trans. Pattern Anal. Mach. Intell. 35(4), 996–1010 (2013).

[Crossref]
[PubMed]

X. Li, C. Li, and I.-K. Lee, “Chaotic image encryption using pseudo-random masks and pixel mapping,” Signal Process. 125, 48–63 (2016).

[Crossref]

X. Li and S. Kim, “Optical 3D watermark based digital image watermarking for telemedicine,” Opt. Lasers Eng. 51(12), 1310–1320 (2013).

[Crossref]

S. Liu, Y. Li, and B. Zhu, “Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,” Opt. Commun. 187(3), 57–63 (2001).

[Crossref]

L. Itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for rapid scene analysis,” IEEE Trans. Pattern Anal. Mach. Intell. 20(11), 1254–1259 (1998).

[Crossref]

N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing,” Opt. Laser Technol. 82, 121–133 (2016).

[Crossref]

D. Hwang, D. Shin, and E. Kim, “A novel three-dimensional digital watermarking scheme basing on integral imaging,” Opt. Commun. 277(1), 40–49 (2007).

[Crossref]

M. Hsieh, D. Tseng, and Y. Huang, “Hiding digital watermarks using multiresolution wavelet transform,” IEEE Trans. Ind. Electron. 48(5), 875–882 (2001).

[Crossref]

H. Wu, J. Zhou, and X. Gong, “A novel image watermarking algorithm based on two-dimensional cellular automata transform,” in Proceedings of Conference of Information Technology and Artificial Intelligence (IEEE, 2011), pp. 206–210.

[Crossref]

J. Li, M. D. Levine, X. An, X. Xu, and H. He, “Visual saliency based on scale-space analysis in the frequency domain,” IEEE Trans. Pattern Anal. Mach. Intell. 35(4), 996–1010 (2013).

[Crossref]
[PubMed]

Y. Chen, X. Wang, J. Zhang, S. Yu, Q. Zhang, and B. Guo, “Resolution improvement of integral imaging based on time multiplexing sub-pixel coding method on common display panel,” Opt. Express 22(15), 17897–17907 (2014).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30(11), 1306–1308 (2005).

[Crossref]
[PubMed]

H. Wu, J. Zhou, and X. Gong, “A novel image watermarking algorithm based on two-dimensional cellular automata transform,” in Proceedings of Conference of Information Technology and Artificial Intelligence (IEEE, 2011), pp. 206–210.

[Crossref]

N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing,” Opt. Laser Technol. 82, 121–133 (2016).

[Crossref]

N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing,” Opt. Laser Technol. 82, 121–133 (2016).

[Crossref]

S. Liu, Y. Li, and B. Zhu, “Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,” Opt. Commun. 187(3), 57–63 (2001).

[Crossref]

B. Lee, H. Kang, and E. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Research 1(2), 6–10 (2010).

[Crossref]

M. Hsieh, D. Tseng, and Y. Huang, “Hiding digital watermarks using multiresolution wavelet transform,” IEEE Trans. Ind. Electron. 48(5), 875–882 (2001).

[Crossref]

J. Li, M. D. Levine, X. An, X. Xu, and H. He, “Visual saliency based on scale-space analysis in the frequency domain,” IEEE Trans. Pattern Anal. Mach. Intell. 35(4), 996–1010 (2013).

[Crossref]
[PubMed]

L. Itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for rapid scene analysis,” IEEE Trans. Pattern Anal. Mach. Intell. 20(11), 1254–1259 (1998).

[Crossref]

A. Aggoun, “Compression of 3D integral images using 3D wavelet transform,” J. Disp. Technol. 7(11), 586–592 (2011).

[Crossref]

D. Hwang, D. Shin, and E. Kim, “A novel three-dimensional digital watermarking scheme basing on integral imaging,” Opt. Commun. 277(1), 40–49 (2007).

[Crossref]

S. Liu, Y. Li, and B. Zhu, “Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,” Opt. Commun. 187(3), 57–63 (2001).

[Crossref]

S. Yeom, A. Stern, and B. Javidi, “Compression of 3D color integral images,” Opt. Express 12(8), 1632–1642 (2004).

[Crossref]
[PubMed]

H. H. Kang, J. H. Lee, and E. S. Kim, “Enhanced compression rate of integral images by using motion-compensated residual images in three-dimensional integral-imaging,” Opt. Express 20(5), 5440–5459 (2012).

[Crossref]
[PubMed]

S. H. Hong, J. S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12(3), 483–491 (2004).

[Crossref]
[PubMed]

H. Yoo, “Axially moving a lenslet array for high-resolution 3D images in computational integral imaging,” Opt. Express 21(7), 8873–8878 (2013).

[Crossref]
[PubMed]

D. H. Shin and H. Yoo, “Scale-variant magnification for computational integral imaging and its application to 3D object correlator,” Opt. Express 16(12), 8855–8867 (2008).

[Crossref]
[PubMed]

A. Stern and B. Javidi, “3-D computational synthetic aperture integral imaging (COMPSAII),” Opt. Express 11(19), 2446–2451 (2003).

[Crossref]
[PubMed]

R. Horisaki, X. Xiao, J. Tanida, and B. Javidi, “Feasibility study for compressive multi-dimensional integral imaging,” Opt. Express 21(4), 4263–4279 (2013).

[Crossref]
[PubMed]

Y. Chen, X. Wang, J. Zhang, S. Yu, Q. Zhang, and B. Guo, “Resolution improvement of integral imaging based on time multiplexing sub-pixel coding method on common display panel,” Opt. Express 22(15), 17897–17907 (2014).

[Crossref]
[PubMed]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007).

[Crossref]
[PubMed]

X. W. Li and I. K. Lee, “Robust copyright protection using multiple ownership watermarks,” Opt. Express 23(3), 3035–3046 (2015).

[Crossref]
[PubMed]

N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing,” Opt. Laser Technol. 82, 121–133 (2016).

[Crossref]

X. Li and S. Kim, “Optical 3D watermark based digital image watermarking for telemedicine,” Opt. Lasers Eng. 51(12), 1310–1320 (2013).

[Crossref]

M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38(17), 3198–3201 (2013).

[Crossref]
[PubMed]

B. Javidi, R. Ponce-Díaz, and S. H. Hong, “Three-dimensional recognition of occluded objects by using computational integral imaging,” Opt. Lett. 31(8), 1106–1108 (2006).

[Crossref]
[PubMed]

Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32(15), 2088–2090 (2007).

[Crossref]
[PubMed]

G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30(11), 1306–1308 (2005).

[Crossref]
[PubMed]

X. Li, C. Li, and I.-K. Lee, “Chaotic image encryption using pseudo-random masks and pixel mapping,” Signal Process. 125, 48–63 (2016).

[Crossref]

H. Wu, J. Zhou, and X. Gong, “A novel image watermarking algorithm based on two-dimensional cellular automata transform,” in Proceedings of Conference of Information Technology and Artificial Intelligence (IEEE, 2011), pp. 206–210.

[Crossref]

C. Li and Y. Hu, “Salient traffic sign detection based on multiscale hypercomplex Fourier transform,” in proceedings of IEEE International Congress on Image and Signal (IEEE 2011), pp.1963–1966.

[Crossref]