S. Kishk and B. Javidi “Watermarking of a 3D Object Using Digital Holography,” Opt. Let. 28, 167–169 (2003).
[Crossref]
R. Ohbuchi, A. ukaiyama, and S. Takahashi “A frequency-domain approach to watermarking 3D shapes,” Computer Graphics Forum 21, 373–382 Sp. Iss. SI(2002).
[Crossref]
S. Kishk and B. Javidi, “Information Hiding Technique using Double Phase Encoding,” Appl. Opt. 41, 5470–5482 (2002).
[Crossref]
T. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for threedimensional object reconstruction and recognition,” Appl. Opt. 11, 4124–4132 (2002).
[Crossref]
Chuan-Fu Wu and Wen-Shyong Hsieh, “Digital watermarking using zerotree of DCT,” Consumer Electronics, IEEE Transactions on, 46, 87–94 (2000).
[Crossref]
G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A state of the Art overview,” IEEE Signal Processing Magazine 17, 20–46 (2000).
[Crossref]
Po-Chyi Su, C.-C. Jay Kuo, and Houng-jyh Wang, “Wavelet-Based Digital Image Watermarking,” Opt. Express, 3, 491–496 (1998), http://www.opticsexpress.org/abstract.cfm?URI=OPEX-3-12-491
[Crossref]
[PubMed]
F. Goudail, F. Bollaro, B. Javidi, and P. Refregier, “Influence of perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629–2638 (1998).
[Crossref]
R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical secutity,” Opt. Eng. 35, 2464–2460 (1996).
[Crossref]
W. Bender, D. Gruhl, N. Morimoto, and L. Lu, “Techniques for data hiding,” IBM Systems Journal 35, 313–336 (1996).
[Crossref]
P. Refregier and B. Javidi, “Optical image encryption using input plane and Fourier plane random encoding,” Opt. Let. 20, 767–769 (1995).
[Crossref]
W. Bender, D. Gruhl, N. Morimoto, and L. Lu, “Techniques for data hiding,” IBM Systems Journal 35, 313–336 (1996).
[Crossref]
H. J. Caulfield, Handbook of Optical Holography, (Academic press, London, 1979).
R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical secutity,” Opt. Eng. 35, 2464–2460 (1996).
[Crossref]
N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding : Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1,Kluwer Academic2001).
T. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for threedimensional object reconstruction and recognition,” Appl. Opt. 11, 4124–4132 (2002).
[Crossref]
J. W. Goodman, Introduction to Fourier Optics, (McGraw-Hill, New York, NY, 1996).
W. Bender, D. Gruhl, N. Morimoto, and L. Lu, “Techniques for data hiding,” IBM Systems Journal 35, 313–336 (1996).
[Crossref]
C. Hosinger and M. Rabbani, “Data Embedding using Phase Dispersion,” The International Conference on Information Technology: Coding and Computing (ITCC 2000), Las Vegas, Nev. 27–29 March (2000).
Chuan-Fu Wu and Wen-Shyong Hsieh, “Digital watermarking using zerotree of DCT,” Consumer Electronics, IEEE Transactions on, 46, 87–94 (2000).
[Crossref]
N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding : Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1,Kluwer Academic2001).
S. Kishk and B. Javidi “Watermarking of a 3D Object Using Digital Holography,” Opt. Let. 28, 167–169 (2003).
[Crossref]
S. Kishk and B. Javidi, “Information Hiding Technique using Double Phase Encoding,” Appl. Opt. 41, 5470–5482 (2002).
[Crossref]
T. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for threedimensional object reconstruction and recognition,” Appl. Opt. 11, 4124–4132 (2002).
[Crossref]
F. Goudail, F. Bollaro, B. Javidi, and P. Refregier, “Influence of perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629–2638 (1998).
[Crossref]
P. Refregier and B. Javidi, “Optical image encryption using input plane and Fourier plane random encoding,” Opt. Let. 20, 767–769 (1995).
[Crossref]
N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding : Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1,Kluwer Academic2001).
S. Kishk and B. Javidi “Watermarking of a 3D Object Using Digital Holography,” Opt. Let. 28, 167–169 (2003).
[Crossref]
S. Kishk and B. Javidi, “Information Hiding Technique using Double Phase Encoding,” Appl. Opt. 41, 5470–5482 (2002).
[Crossref]
G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A state of the Art overview,” IEEE Signal Processing Magazine 17, 20–46 (2000).
[Crossref]
G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A state of the Art overview,” IEEE Signal Processing Magazine 17, 20–46 (2000).
[Crossref]
W. Bender, D. Gruhl, N. Morimoto, and L. Lu, “Techniques for data hiding,” IBM Systems Journal 35, 313–336 (1996).
[Crossref]
W. Bender, D. Gruhl, N. Morimoto, and L. Lu, “Techniques for data hiding,” IBM Systems Journal 35, 313–336 (1996).
[Crossref]
T. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for threedimensional object reconstruction and recognition,” Appl. Opt. 11, 4124–4132 (2002).
[Crossref]
R. Ohbuchi, A. ukaiyama, and S. Takahashi “A frequency-domain approach to watermarking 3D shapes,” Computer Graphics Forum 21, 373–382 Sp. Iss. SI(2002).
[Crossref]
C. Hosinger and M. Rabbani, “Data Embedding using Phase Dispersion,” The International Conference on Information Technology: Coding and Computing (ITCC 2000), Las Vegas, Nev. 27–29 March (2000).
J. Schwider, “Advanced Evaluation Techniques in Interferometry,” in Progress in Optics, E. Wolf, ed (North Holland, Amesterdam) XXVIII, 271–359 (1990)
G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A state of the Art overview,” IEEE Signal Processing Magazine 17, 20–46 (2000).
[Crossref]
T. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for threedimensional object reconstruction and recognition,” Appl. Opt. 11, 4124–4132 (2002).
[Crossref]
R. Ohbuchi, A. ukaiyama, and S. Takahashi “A frequency-domain approach to watermarking 3D shapes,” Computer Graphics Forum 21, 373–382 Sp. Iss. SI(2002).
[Crossref]
R. Ohbuchi, A. ukaiyama, and S. Takahashi “A frequency-domain approach to watermarking 3D shapes,” Computer Graphics Forum 21, 373–382 Sp. Iss. SI(2002).
[Crossref]
R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical secutity,” Opt. Eng. 35, 2464–2460 (1996).
[Crossref]
R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical secutity,” Opt. Eng. 35, 2464–2460 (1996).
[Crossref]
Chuan-Fu Wu and Wen-Shyong Hsieh, “Digital watermarking using zerotree of DCT,” Consumer Electronics, IEEE Transactions on, 46, 87–94 (2000).
[Crossref]
S. Kishk and B. Javidi, “Information Hiding Technique using Double Phase Encoding,” Appl. Opt. 41, 5470–5482 (2002).
[Crossref]
Joseph Rosen and Bahram Javidi, “Hiding images in Halftone Pictures,” Appl. Opt. 40, 3346 (2001).
[Crossref]
U. Schnars and W. P. O. Jüptner, “Direct recording of holograms by a CCD target and numerical reconstruction,” Appl. Opt. 33, 179–181 (1994).
[Crossref]
[PubMed]
J. H. Bruninig, D. R. Herriott, J. E. Gallagher, D. P. Rosenfeld, A. D. White, and D. J. Brangaccio, “Digital Wavefront measuring interferometer for Testing Optical Surfaces and Lenses,” Appl. Opt. 13, 2693 (1974).
[Crossref]
T. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for threedimensional object reconstruction and recognition,” Appl. Opt. 11, 4124–4132 (2002).
[Crossref]
R. Ohbuchi, A. ukaiyama, and S. Takahashi “A frequency-domain approach to watermarking 3D shapes,” Computer Graphics Forum 21, 373–382 Sp. Iss. SI(2002).
[Crossref]
Chuan-Fu Wu and Wen-Shyong Hsieh, “Digital watermarking using zerotree of DCT,” Consumer Electronics, IEEE Transactions on, 46, 87–94 (2000).
[Crossref]
W. Bender, D. Gruhl, N. Morimoto, and L. Lu, “Techniques for data hiding,” IBM Systems Journal 35, 313–336 (1996).
[Crossref]
G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A state of the Art overview,” IEEE Signal Processing Magazine 17, 20–46 (2000).
[Crossref]
R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical secutity,” Opt. Eng. 35, 2464–2460 (1996).
[Crossref]
S. Kishk and B. Javidi “Watermarking of a 3D Object Using Digital Holography,” Opt. Let. 28, 167–169 (2003).
[Crossref]
P. Refregier and B. Javidi, “Optical image encryption using input plane and Fourier plane random encoding,” Opt. Let. 20, 767–769 (1995).
[Crossref]
H. J. Caulfield, Handbook of Optical Holography, (Academic press, London, 1979).
J. W. Goodman, Introduction to Fourier Optics, (McGraw-Hill, New York, NY, 1996).
N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding : Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1,Kluwer Academic2001).
C. Hosinger and M. Rabbani, “Data Embedding using Phase Dispersion,” The International Conference on Information Technology: Coding and Computing (ITCC 2000), Las Vegas, Nev. 27–29 March (2000).
J. Schwider, “Advanced Evaluation Techniques in Interferometry,” in Progress in Optics, E. Wolf, ed (North Holland, Amesterdam) XXVIII, 271–359 (1990)