X. Li, S. Cho, and S. Kim, “Combined use of BP neural network and computational integral imaging reconstruction for optical multiple-image security,” Opt. Commun. 315, 147–158 (2014).

[Crossref]

X. Li, S. Cho, and S. Kim, “High security and robust optical image encryption approach based on computer-generated integral imaging pickup and iterative back-projection techniques,” Opt. Lasers Eng. 55, 162–182 (2014).

[Crossref]

Y. Oh, D. H. Shin, B. G. Lee, S. I. Jeong, and H. J. Choi, “Resolution-enhanced integral imaging in focal mode with a time-multiplexed electrical mask array,” Opt. Express 22(15), 17620–17629 (2014).

[Crossref]
[PubMed]

X. Li, S. Cho, and S. Kim, “Computational integral imaging-based 3D digital watermarking scheme using cellular automata transform and maximum length cellular automata,” Multidim. Syst. Sign. P. 25(3), 405–424 (2014).

[Crossref]

E. Yavuz and Z. Telatar, “Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,”,” Digit. Signal Process. 23(4), 1335–1336 (2013).

[Crossref]

G. Bhatnagar, Q. M. Wu, and P. K. Atrey, “Secure randomized image watermarking based on singular value decomposition,” ACM T. Multim. Comput. 10, 41–421 (2013).

H. Yoo, “Axially moving a lenslet array for high-resolution 3D images in computational integral imaging,” Opt. Express 21(7), 8873–8878 (2013).

[Crossref]
[PubMed]

S. Liansheng, X. Meiting, and T. Ailing, “Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain,” Opt. Lett. 38(11), 1996–1998 (2013).

[Crossref]
[PubMed]

X. Xiao, B. Javidi, B. M. Martinez-Corral, and A. Stern, “Advances in three-dimensional integral imaging: sensing, display, and applications,” Appl. Opt. 52(4), 546–560 (2013).

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

C. C. Lai, “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,” Digit. Signal Process. 21(4), 522–527 (2011).

[Crossref]

L. Cui and W. Li, “Adaptive multiwavelet-based watermarking through JPW masking,” IEEE Trans. Image Process. 20(4), 1047–1060 (2011).

[Crossref]
[PubMed]

B. Surekha, G. Swamy, and K. S. Rao, “A multiple watermarking technique for images based on visual cryptography,” Comput. Appl. Eng. Educ. 1, 77–81 (2010).

B. Lee, H. H. Kang, and E. S. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Res. 1, 6–10 (2010).

C. Li, S. Li, G. Chen, and W. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image Vis. Comput. 27(8), 1035–1039 (2009).

[Crossref]

D. C. Hwang, D. H. Shin, S. C. Kim, and E. S. Kim, “Depth extraction of three-dimensional objects in space by the computational integral imaging reconstruction technique,” Appl. Opt. 47(19), D128–D135 (2008).

[Crossref]
[PubMed]

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, “Hierarchical watermarking of semiregular meshes based on wavelet transform,” IEEE T. Inf. Foren. Sec. 3(4), 620–634 (2008).

[Crossref]

D. H. Shin and H. Yoo, “Scale-variant magnification for computational integral imaging and its application to 3D object correlator,” Opt. Express 16(12), 8855–8867 (2008).

[Crossref]
[PubMed]

B. Javidi, R. Ponce-Díaz, and S. H. Hong, “Three-dimensional recognition of occluded objects by using computational integral imaging,” Opt. Lett. 31(8), 1106–1108 (2006).

[Crossref]
[PubMed]

A. Stern and B. Javidi, “Three-dimensional image sensing, visualization, and processing using integral imaging,” Proc. IEEE 94(3), 591–607 (2006).

[Crossref]

X. W. Wang and H. Zhao, “A novel synchronization invariant audio watermarking scheme based on DWT and DCT,” IEEE T. Signal Process. 54(12), 4835–4840 (2006).

P. Bao and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE T. Circ. Syst. Vid. 15(1), 96–102 (2005).

[Crossref]

D. H. Shin, E. S. Kim, and B. Lee, “Computational reconstruction of three-dimensional objects in integral imaging using lenslet array,” Jpn. J. Appl. Phys. 44(11), 8016–8018 (2005).

[Crossref]

S. H. Hong, J. S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12(3), 483–491 (2004).

[Crossref]
[PubMed]

D. P. Mukherjee, S. Maitra, and S. T. Acton, “Spatial domain digital watermarking of multimedia objects for buyer authentication,” IEEE Trans. Multimed. 6(1), 1–15 (2004).

[Crossref]

D. P. Mukherjee, S. Maitra, and S. T. Acton, “Spatial domain digital watermarking of multimedia objects for buyer authentication,” IEEE Trans. Multimed. 6(1), 1–15 (2004).

[Crossref]

G. Bhatnagar, Q. M. Wu, and P. K. Atrey, “Secure randomized image watermarking based on singular value decomposition,” ACM T. Multim. Comput. 10, 41–421 (2013).

P. Bao and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE T. Circ. Syst. Vid. 15(1), 96–102 (2005).

[Crossref]

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, “Hierarchical watermarking of semiregular meshes based on wavelet transform,” IEEE T. Inf. Foren. Sec. 3(4), 620–634 (2008).

[Crossref]

G. Bhatnagar, Q. M. Wu, and P. K. Atrey, “Secure randomized image watermarking based on singular value decomposition,” ACM T. Multim. Comput. 10, 41–421 (2013).

C. Li, S. Li, G. Chen, and W. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image Vis. Comput. 27(8), 1035–1039 (2009).

[Crossref]

X. Li, S. Cho, and S. Kim, “Combined use of BP neural network and computational integral imaging reconstruction for optical multiple-image security,” Opt. Commun. 315, 147–158 (2014).

[Crossref]

X. Li, S. Cho, and S. Kim, “High security and robust optical image encryption approach based on computer-generated integral imaging pickup and iterative back-projection techniques,” Opt. Lasers Eng. 55, 162–182 (2014).

[Crossref]

X. Li, S. Cho, and S. Kim, “Computational integral imaging-based 3D digital watermarking scheme using cellular automata transform and maximum length cellular automata,” Multidim. Syst. Sign. P. 25(3), 405–424 (2014).

[Crossref]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

L. Cui and W. Li, “Adaptive multiwavelet-based watermarking through JPW masking,” IEEE Trans. Image Process. 20(4), 1047–1060 (2011).

[Crossref]
[PubMed]

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, “Hierarchical watermarking of semiregular meshes based on wavelet transform,” IEEE T. Inf. Foren. Sec. 3(4), 620–634 (2008).

[Crossref]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

C. Li, S. Li, G. Chen, and W. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image Vis. Comput. 27(8), 1035–1039 (2009).

[Crossref]

B. Javidi, R. Ponce-Díaz, and S. H. Hong, “Three-dimensional recognition of occluded objects by using computational integral imaging,” Opt. Lett. 31(8), 1106–1108 (2006).

[Crossref]
[PubMed]

S. H. Hong, J. S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12(3), 483–491 (2004).

[Crossref]
[PubMed]

X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE T. Circ. Syst. Vid. 13(8), 776–786 (2003).

[Crossref]

X. Xiao, B. Javidi, B. M. Martinez-Corral, and A. Stern, “Advances in three-dimensional integral imaging: sensing, display, and applications,” Appl. Opt. 52(4), 546–560 (2013).

A. Stern and B. Javidi, “Three-dimensional image sensing, visualization, and processing using integral imaging,” Proc. IEEE 94(3), 591–607 (2006).

[Crossref]

B. Javidi, R. Ponce-Díaz, and S. H. Hong, “Three-dimensional recognition of occluded objects by using computational integral imaging,” Opt. Lett. 31(8), 1106–1108 (2006).

[Crossref]
[PubMed]

S. H. Hong, J. S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12(3), 483–491 (2004).

[Crossref]
[PubMed]

A. Stern and B. Javidi, “3-D computational synthetic aperture integral imaging (COMPSAII),” Opt. Express 11(19), 2446–2451 (2003).

[Crossref]
[PubMed]

Y. Frauel and B. Javidi, “Digital three-dimensional image correlation by use of computer-reconstructed integral imaging,” Appl. Opt. 41(26), 5488–5496 (2002).

[Crossref]
[PubMed]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

B. Lee, H. H. Kang, and E. S. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Res. 1, 6–10 (2010).

X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE T. Circ. Syst. Vid. 13(8), 776–786 (2003).

[Crossref]

B. Lee, H. H. Kang, and E. S. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Res. 1, 6–10 (2010).

D. C. Hwang, D. H. Shin, S. C. Kim, and E. S. Kim, “Depth extraction of three-dimensional objects in space by the computational integral imaging reconstruction technique,” Appl. Opt. 47(19), D128–D135 (2008).

[Crossref]
[PubMed]

D. H. Shin, E. S. Kim, and B. Lee, “Computational reconstruction of three-dimensional objects in integral imaging using lenslet array,” Jpn. J. Appl. Phys. 44(11), 8016–8018 (2005).

[Crossref]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

X. Li, S. Cho, and S. Kim, “High security and robust optical image encryption approach based on computer-generated integral imaging pickup and iterative back-projection techniques,” Opt. Lasers Eng. 55, 162–182 (2014).

[Crossref]

X. Li, S. Cho, and S. Kim, “Combined use of BP neural network and computational integral imaging reconstruction for optical multiple-image security,” Opt. Commun. 315, 147–158 (2014).

[Crossref]

X. Li, S. Cho, and S. Kim, “Computational integral imaging-based 3D digital watermarking scheme using cellular automata transform and maximum length cellular automata,” Multidim. Syst. Sign. P. 25(3), 405–424 (2014).

[Crossref]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

C. C. Lai, “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,” Digit. Signal Process. 21(4), 522–527 (2011).

[Crossref]

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, “Hierarchical watermarking of semiregular meshes based on wavelet transform,” IEEE T. Inf. Foren. Sec. 3(4), 620–634 (2008).

[Crossref]

B. Lee, H. H. Kang, and E. S. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Res. 1, 6–10 (2010).

D. H. Shin, E. S. Kim, and B. Lee, “Computational reconstruction of three-dimensional objects in integral imaging using lenslet array,” Jpn. J. Appl. Phys. 44(11), 8016–8018 (2005).

[Crossref]

C. Li, S. Li, G. Chen, and W. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image Vis. Comput. 27(8), 1035–1039 (2009).

[Crossref]

C. Li, S. Li, G. Chen, and W. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image Vis. Comput. 27(8), 1035–1039 (2009).

[Crossref]

L. Cui and W. Li, “Adaptive multiwavelet-based watermarking through JPW masking,” IEEE Trans. Image Process. 20(4), 1047–1060 (2011).

[Crossref]
[PubMed]

X. Li, S. Cho, and S. Kim, “Combined use of BP neural network and computational integral imaging reconstruction for optical multiple-image security,” Opt. Commun. 315, 147–158 (2014).

[Crossref]

X. Li, S. Cho, and S. Kim, “High security and robust optical image encryption approach based on computer-generated integral imaging pickup and iterative back-projection techniques,” Opt. Lasers Eng. 55, 162–182 (2014).

[Crossref]

X. Li, S. Cho, and S. Kim, “Computational integral imaging-based 3D digital watermarking scheme using cellular automata transform and maximum length cellular automata,” Multidim. Syst. Sign. P. 25(3), 405–424 (2014).

[Crossref]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE T. Circ. Syst. Vid. 13(8), 776–786 (2003).

[Crossref]

R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimed. 4(1), 121–128 (2002).

[Crossref]

P. Bao and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE T. Circ. Syst. Vid. 15(1), 96–102 (2005).

[Crossref]

D. P. Mukherjee, S. Maitra, and S. T. Acton, “Spatial domain digital watermarking of multimedia objects for buyer authentication,” IEEE Trans. Multimed. 6(1), 1–15 (2004).

[Crossref]

D. P. Mukherjee, S. Maitra, and S. T. Acton, “Spatial domain digital watermarking of multimedia objects for buyer authentication,” IEEE Trans. Multimed. 6(1), 1–15 (2004).

[Crossref]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

B. Surekha, G. Swamy, and K. S. Rao, “A multiple watermarking technique for images based on visual cryptography,” Comput. Appl. Eng. Educ. 1, 77–81 (2010).

X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE T. Circ. Syst. Vid. 13(8), 776–786 (2003).

[Crossref]

Y. Oh, D. H. Shin, B. G. Lee, S. I. Jeong, and H. J. Choi, “Resolution-enhanced integral imaging in focal mode with a time-multiplexed electrical mask array,” Opt. Express 22(15), 17620–17629 (2014).

[Crossref]
[PubMed]

D. H. Shin and H. Yoo, “Scale-variant magnification for computational integral imaging and its application to 3D object correlator,” Opt. Express 16(12), 8855–8867 (2008).

[Crossref]
[PubMed]

D. C. Hwang, D. H. Shin, S. C. Kim, and E. S. Kim, “Depth extraction of three-dimensional objects in space by the computational integral imaging reconstruction technique,” Appl. Opt. 47(19), D128–D135 (2008).

[Crossref]
[PubMed]

D. H. Shin and H. Yoo, “Image quality enhancement in 3D computational integral imaging by use of interpolation methods,” Opt. Express 15(19), 12039–12049 (2007).

[Crossref]
[PubMed]

D. H. Shin, E. S. Kim, and B. Lee, “Computational reconstruction of three-dimensional objects in integral imaging using lenslet array,” Jpn. J. Appl. Phys. 44(11), 8016–8018 (2005).

[Crossref]

X. Xiao, B. Javidi, B. M. Martinez-Corral, and A. Stern, “Advances in three-dimensional integral imaging: sensing, display, and applications,” Appl. Opt. 52(4), 546–560 (2013).

A. Stern and B. Javidi, “Three-dimensional image sensing, visualization, and processing using integral imaging,” Proc. IEEE 94(3), 591–607 (2006).

[Crossref]

A. Stern and B. Javidi, “3-D computational synthetic aperture integral imaging (COMPSAII),” Opt. Express 11(19), 2446–2451 (2003).

[Crossref]
[PubMed]

B. Surekha, G. Swamy, and K. S. Rao, “A multiple watermarking technique for images based on visual cryptography,” Comput. Appl. Eng. Educ. 1, 77–81 (2010).

B. Surekha, G. Swamy, and K. S. Rao, “A multiple watermarking technique for images based on visual cryptography,” Comput. Appl. Eng. Educ. 1, 77–81 (2010).

R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimed. 4(1), 121–128 (2002).

[Crossref]

E. Yavuz and Z. Telatar, “Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,”,” Digit. Signal Process. 23(4), 1335–1336 (2013).

[Crossref]

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, “Hierarchical watermarking of semiregular meshes based on wavelet transform,” IEEE T. Inf. Foren. Sec. 3(4), 620–634 (2008).

[Crossref]

X. W. Wang and H. Zhao, “A novel synchronization invariant audio watermarking scheme based on DWT and DCT,” IEEE T. Signal Process. 54(12), 4835–4840 (2006).

G. Bhatnagar, Q. M. Wu, and P. K. Atrey, “Secure randomized image watermarking based on singular value decomposition,” ACM T. Multim. Comput. 10, 41–421 (2013).

E. Yavuz and Z. Telatar, “Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,”,” Digit. Signal Process. 23(4), 1335–1336 (2013).

[Crossref]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

X. W. Wang and H. Zhao, “A novel synchronization invariant audio watermarking scheme based on DWT and DCT,” IEEE T. Signal Process. 54(12), 4835–4840 (2006).

B. Lee, H. H. Kang, and E. S. Kim, “Occlusion removal method of partially occluded object using variance in computational integral imaging,” 3D Res. 1, 6–10 (2010).

G. Bhatnagar, Q. M. Wu, and P. K. Atrey, “Secure randomized image watermarking based on singular value decomposition,” ACM T. Multim. Comput. 10, 41–421 (2013).

Y. Frauel and B. Javidi, “Digital three-dimensional image correlation by use of computer-reconstructed integral imaging,” Appl. Opt. 41(26), 5488–5496 (2002).

[Crossref]
[PubMed]

D. C. Hwang, D. H. Shin, S. C. Kim, and E. S. Kim, “Depth extraction of three-dimensional objects in space by the computational integral imaging reconstruction technique,” Appl. Opt. 47(19), D128–D135 (2008).

[Crossref]
[PubMed]

X. Xiao, B. Javidi, B. M. Martinez-Corral, and A. Stern, “Advances in three-dimensional integral imaging: sensing, display, and applications,” Appl. Opt. 52(4), 546–560 (2013).

B. Surekha, G. Swamy, and K. S. Rao, “A multiple watermarking technique for images based on visual cryptography,” Comput. Appl. Eng. Educ. 1, 77–81 (2010).

E. Yavuz and Z. Telatar, “Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,”,” Digit. Signal Process. 23(4), 1335–1336 (2013).

[Crossref]

C. C. Lai, “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm,” Digit. Signal Process. 21(4), 522–527 (2011).

[Crossref]

P. Bao and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE T. Circ. Syst. Vid. 15(1), 96–102 (2005).

[Crossref]

X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE T. Circ. Syst. Vid. 13(8), 776–786 (2003).

[Crossref]

K. Wang, G. Lavoué, F. Denis, and A. Baskurt, “Hierarchical watermarking of semiregular meshes based on wavelet transform,” IEEE T. Inf. Foren. Sec. 3(4), 620–634 (2008).

[Crossref]

X. W. Wang and H. Zhao, “A novel synchronization invariant audio watermarking scheme based on DWT and DCT,” IEEE T. Signal Process. 54(12), 4835–4840 (2006).

L. Cui and W. Li, “Adaptive multiwavelet-based watermarking through JPW masking,” IEEE Trans. Image Process. 20(4), 1047–1060 (2011).

[Crossref]
[PubMed]

D. P. Mukherjee, S. Maitra, and S. T. Acton, “Spatial domain digital watermarking of multimedia objects for buyer authentication,” IEEE Trans. Multimed. 6(1), 1–15 (2004).

[Crossref]

R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimed. 4(1), 121–128 (2002).

[Crossref]

C. Li, S. Li, G. Chen, and W. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image Vis. Comput. 27(8), 1035–1039 (2009).

[Crossref]

D. H. Shin, E. S. Kim, and B. Lee, “Computational reconstruction of three-dimensional objects in integral imaging using lenslet array,” Jpn. J. Appl. Phys. 44(11), 8016–8018 (2005).

[Crossref]

X. Li, S. Cho, and S. Kim, “Computational integral imaging-based 3D digital watermarking scheme using cellular automata transform and maximum length cellular automata,” Multidim. Syst. Sign. P. 25(3), 405–424 (2014).

[Crossref]

X. Li, S. Cho, and S. Kim, “Combined use of BP neural network and computational integral imaging reconstruction for optical multiple-image security,” Opt. Commun. 315, 147–158 (2014).

[Crossref]

A. Stern and B. Javidi, “3-D computational synthetic aperture integral imaging (COMPSAII),” Opt. Express 11(19), 2446–2451 (2003).

[Crossref]
[PubMed]

S. H. Hong, J. S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12(3), 483–491 (2004).

[Crossref]
[PubMed]

D. H. Shin and H. Yoo, “Image quality enhancement in 3D computational integral imaging by use of interpolation methods,” Opt. Express 15(19), 12039–12049 (2007).

[Crossref]
[PubMed]

D. H. Shin and H. Yoo, “Scale-variant magnification for computational integral imaging and its application to 3D object correlator,” Opt. Express 16(12), 8855–8867 (2008).

[Crossref]
[PubMed]

K. C. Kwon, C. Park, M. U. Erdenebat, J. S. Jeong, J. H. Choi, N. Kim, J. H. Park, Y. T. Lim, and K. H. Yoo, “High speed image space parallel processing for computer-generated integral imaging system,” Opt. Express 20(2), 732–740 (2012).

[Crossref]
[PubMed]

H. Yoo, “Axially moving a lenslet array for high-resolution 3D images in computational integral imaging,” Opt. Express 21(7), 8873–8878 (2013).

[Crossref]
[PubMed]

Y. Oh, D. H. Shin, B. G. Lee, S. I. Jeong, and H. J. Choi, “Resolution-enhanced integral imaging in focal mode with a time-multiplexed electrical mask array,” Opt. Express 22(15), 17620–17629 (2014).

[Crossref]
[PubMed]

X. Li, S. Cho, and S. Kim, “High security and robust optical image encryption approach based on computer-generated integral imaging pickup and iterative back-projection techniques,” Opt. Lasers Eng. 55, 162–182 (2014).

[Crossref]

B. Javidi, R. Ponce-Díaz, and S. H. Hong, “Three-dimensional recognition of occluded objects by using computational integral imaging,” Opt. Lett. 31(8), 1106–1108 (2006).

[Crossref]
[PubMed]

S. Liansheng, X. Meiting, and T. Ailing, “Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain,” Opt. Lett. 38(11), 1996–1998 (2013).

[Crossref]
[PubMed]

A. Stern and B. Javidi, “Three-dimensional image sensing, visualization, and processing using integral imaging,” Proc. IEEE 94(3), 591–607 (2006).

[Crossref]

O. Lafe, Cellular Automata Transforms: Theory and Applications in Multimedia Compression, Encryption and Modeling, (Kluwer Academic Pub., 2000).

M. Radulescu, F. Ionescu, and R. Dogaru, “Improving multimedia techniques for watermarking color images using cellular automata,” in IEEE International Symposium on Signals, Circuits and Systems (IEEE, 2007) pp. 1–4 (2007).

[Crossref]

R. Shiba, S. Kang, and Y. Aoki, “An image watermarking technique using cellular automata transform,” in IEEE Region 10 Conference (IEEE 2004), pp. 303–306.

[Crossref]